Mi Wen

Orcid: 0000-0003-4328-6507

According to our database1, Mi Wen authored at least 84 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks in Smart Grid.
IEEE Internet Things J., May, 2024

Enhancing the transferability of adversarial samples with random noise techniques.
Comput. Secur., January, 2024

Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024

Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024

AMNeuzz: A Strongly Directed Fuzz Testing Method Based on Attention Mechanism.
Proceedings of the 2024 10th International Conference on Computing and Data Engineering, 2024

2023
DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., April, 2023

Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving.
Peer Peer Netw. Appl., January, 2023

Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023

Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2023

DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
IEEE Trans. Cloud Comput., 2023

MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
CoRR, 2023

Long-term Incentive Mechanism for Federated Learning: A Dynamic Repeated Game Approach.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

An Improved Traffic Forecasting Model based on Efficient Spatiotemporal Graph Convolutional Network.
Proceedings of the 12th International Conference on Informatics, 2023

A Scheme for Robust Federated Learning with Privacy-preserving Based on Krum AGR.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

An Approach for Attack Scenario Construction Based on Dynamic Attack Path Graph.
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023

2022
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids.
Wirel. Pers. Commun., 2022

FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid.
IEEE Internet Things J., 2022

Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices.
IEEE Internet Things J., 2022

MLPNeuzz: A Novel Neural Program Smoothing Method Based on Multi-Layer Perceptron.
Proceedings of the ICCDE 2022: The 8th International Conference on Computing and Data Engineering, Bangkok, Thailand, January 11, 2022

Attribute-Based Collaborative Access Control Scheme with Constant Ciphertext Length for Smart Grid.
Proceedings of the IEEE International Conference on Communications, 2022

2021
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol., 2021

Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021

Traffic sign detection algorithm based on feature expression enhancement.
Multim. Tools Appl., 2021

Text Content Tag Recommendation Algorithm Based on Knowledge Map Fusion Reasoning.
Proceedings of the ICCIR 2021: International Conference on Control and Intelligent Robotics, 2021

2020
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.
Secur. Commun. Networks, 2020

Toward efficient and effective bullying detection in online social network.
Peer-to-Peer Netw. Appl., 2020

Cloud-assisted secure and conjunctive publish/subscribe service in smart grids.
IET Inf. Secur., 2020

An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020

Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection.
IEEE Access, 2020

An Adversarial Attack with Fusion of Polarization for Unmanned Scenes.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2019
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems.
IEEE Trans. Veh. Technol., 2019

Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer-to-Peer Netw. Appl., 2019

Energy Theft Detection With Energy Privacy Preservation in the Smart Grid.
IEEE Internet Things J., 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019

A new VRSA-based pairing-free certificateless signature scheme for fog computing.
Concurr. Comput. Pract. Exp., 2019

Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019

Achieve Revocable Access Control for Fog-Based Smart Grid System.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Adversarial attack against scene recognition system for unmanned vehicles.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
Symmetry, 2018

Efficient steganographer detection over social networks with sampling reconstruction.
Peer-to-Peer Netw. Appl., 2018

Unsupervised steganalysis over social networks based on multi-reference sub-image sets.
Multim. Tools Appl., 2018

Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018

State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2017

A privacy-aware data dissemination scheme for smart grid with abnormal data traceability.
Comput. Networks, 2017

A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles.
IEEE Trans. Inf. Forensics Secur., 2016

CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Secur. Commun. Networks, 2016

PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks, 2016

Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks.
IEEE Internet Things J., 2016

PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS.
IEEE Trans. Comput. Soc. Syst., 2015

EAPA: An efficient authentication protocol against pollution attack for smart grid.
Peer-to-Peer Netw. Appl., 2015

Achieving efficient and privacy-preserving multi-feature search for mobile sensing.
Comput. Commun., 2015

Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

BDO-SD: An efficient scheme for big data outsourcing with secure deduplication.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

A Novel Deduplication-Based Covert Channel in Cloud Storage Service.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

2014
Querying over Encrypted Data in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014

EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market.
KSII Trans. Internet Inf. Syst., 2014

Achieving ranked range query in smart grid auction market.
Proceedings of the IEEE International Conference on Communications, 2014

Secure dynamic searchable symmetric encryption with constant document update cost.
Proceedings of the IEEE Global Communications Conference, 2014

2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

SSE: A Secure Searchable Encryption Scheme for Urban Sensing and Querying.
Int. J. Distributed Sens. Networks, 2013

ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2010
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks.
Wirel. Sens. Netw., 2010

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

2009
When is a key establishment protocol correct?
Secur. Commun. Networks, 2009

Towards Provable Security for Data Transmission Protocols in Sensor Network.
J. Inf. Sci. Eng., 2009

A key management protocol with robust continuity for sensor networks.
Comput. Stand. Interfaces, 2009

A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN.
Proceedings of the Advances in Information Security and Assurance, 2009

2007
Protocol Engineering Principles for Cryptographic Protocols Design.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Secure Time Synchronization Protocol for Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

2006
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006


  Loading...