Mi Wen

According to our database1, Mi Wen authored at least 60 papers between 2006 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.
Secur. Commun. Networks, 2020

Toward efficient and effective bullying detection in online social network.
Peer Peer Netw. Appl., 2020

Cloud-assisted secure and conjunctive publish/subscribe service in smart grids.
IET Inf. Secur., 2020

An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020

Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection.
IEEE Access, 2020

An Adversarial Attack with Fusion of Polarization for Unmanned Scenes.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems.
IEEE Trans. Veh. Technol., 2019

Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer Peer Netw. Appl., 2019

Energy Theft Detection With Energy Privacy Preservation in the Smart Grid.
IEEE Internet Things J., 2019

PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI.
Future Gener. Comput. Syst., 2019

A new VRSA-based pairing-free certificateless signature scheme for fog computing.
Concurr. Comput. Pract. Exp., 2019

Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019

Achieve Revocable Access Control for Fog-Based Smart Grid System.
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019

Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Adversarial attack against scene recognition system for unmanned vehicles.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
Symmetry, 2018

Efficient steganographer detection over social networks with sampling reconstruction.
Peer Peer Netw. Appl., 2018

Unsupervised steganalysis over social networks based on multi-reference sub-image sets.
Multim. Tools Appl., 2018

Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018

State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI.
Proceedings of the IEEE Global Communications Conference, 2018

A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2017

A privacy-aware data dissemination scheme for smart grid with abnormal data traceability.
Comput. Networks, 2017

A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles.
IEEE Trans. Inf. Forensics Secur., 2016

CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid.
Secur. Commun. Networks, 2016

PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks, 2016

Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks.
IEEE Internet Things J., 2016

PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS.
IEEE Trans. Comput. Soc. Syst., 2015

EAPA: An efficient authentication protocol against pollution attack for smart grid.
Peer Peer Netw. Appl., 2015

Achieving efficient and privacy-preserving multi-feature search for mobile sensing.
Comput. Commun., 2015

Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

BDO-SD: An efficient scheme for big data outsourcing with secure deduplication.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

A Novel Deduplication-Based Covert Channel in Cloud Storage Service.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

Querying over Encrypted Data in Smart Grids
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014

SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014

EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market.
KSII Trans. Internet Inf. Syst., 2014

Achieving ranked range query in smart grid auction market.
Proceedings of the IEEE International Conference on Communications, 2014

Secure dynamic searchable symmetric encryption with constant document update cost.
Proceedings of the IEEE Global Communications Conference, 2014

PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013

SSE: A Secure Searchable Encryption Scheme for Urban Sensing and Querying.
Int. J. Distributed Sens. Networks, 2013

ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks.
Wirel. Sens. Netw., 2010

Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010

RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow.
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010

When is a key establishment protocol correct?
Secur. Commun. Networks, 2009

Towards Provable Security for Data Transmission Protocols in Sensor Network.
J. Inf. Sci. Eng., 2009

A key management protocol with robust continuity for sensor networks.
Comput. Stand. Interfaces, 2009

A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN.
Proceedings of the Advances in Information Security and Assurance, 2009

Protocol Engineering Principles for Cryptographic Protocols Design.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Secure Time Synchronization Protocol for Sensor Network.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007

A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006