Mingjun Wang

Orcid: 0000-0002-1020-3915

According to our database1, Mingjun Wang authored at least 41 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation.
IEEE Internet Things J., April, 2024

Aerial IRS-Enabled Secure Mobile Communications: Joint 3-D Trajectory and Beamforming Design.
IEEE Wirel. Commun. Lett., March, 2024

An Integrated Framework for Enablers in Supply Chain Resilience: Model Development and Analysis.
IEEE Access, 2024

2023
A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks.
IEEE Commun. Mag., December, 2023

Using contour loss constraining residual attention U-net on optical remote sensing interpretation.
Vis. Comput., September, 2023

XAuth: Secure and Privacy-Preserving Cross-Domain Handover Authentication for 5G HetNets.
IEEE Internet Things J., April, 2023

Digital Mapping of Root-Zone Soil Moisture Using UAV-Based Multispectral Data in a Kiwifruit Orchard of Northwest China.
Remote. Sens., February, 2023

2022
Fidelity-Guaranteed Entanglement Routing in Quantum Networks.
IEEE Trans. Commun., 2022

Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?
IEEE Netw., 2022

Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems.
Digit. Commun. Networks, 2022

2021
A points of interest matching method using a multivariate weighting function with gradient descent optimization.
Trans. GIS, 2021

A Novel Modeling Strategy of Weighted Mean Temperature in China Using RNN and LSTM.
Remote. Sens., 2021

Is 5G Handover Secure and Private? A Survey.
IEEE Internet Things J., 2021

Fidelity-Guaranteed Entanglement Purification and Routing in Quantum Networks.
CoRR, 2021

2020
Trusted Network Slicing among Multiple Mobile Network Operators.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE.
ACM Trans. Cyber Phys. Syst., 2019

Microphysical Characteristics of Three Convective Events with Intense Rainfall Observed by Polarimetric Radar and Disdrometer in Eastern China.
Remote. Sens., 2019

DDoS detection and defense mechanism based on cognitive-inspired computing in SDN.
Future Gener. Comput. Syst., 2019

AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications.
Proceedings of the 2019 IEEE SmartWorld, 2019

Encrypted Big Data Deduplication in Cloud Storage.
Proceedings of the Smart Data: State-of-the-Art Perspectives in Computing and Applications, 2019

2018
Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications.
IEEE Trans. Ind. Informatics, 2018

结合多信号模型与遗传算法的板级电路测点选取方法 (Measuring Point Selection Method of Board-level Circuit Based on Multi-signal Model and Genetic Algorithm).
计算机科学, 2018

2017
Flexible Data Access Control Based on Trust and Reputation in Cloud Computing.
IEEE Trans. Cloud Comput., 2017

Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels.
IEEE Syst. J., 2017

UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications.
Mob. Networks Appl., 2017

A Survey on Security in D2D Communications.
Mob. Networks Appl., 2017

2016
Encrypted Data Management with Deduplication in Cloud Computing.
IEEE Cloud Comput., 2016

Secure Pervasive Social Communications Based on Trust in a Distributed Way.
IEEE Access, 2016

2015
Towards optimized scheduling for data-intensive scientific workflow in multiple datacenter environment.
Concurr. Comput. Pract. Exp., 2015

GlycoMine: a machine learning-based approach for predicting N-, C- and O-linked glycosylation in the human proteome.
Bioinform., 2015

Security in D2D Communications: A Review.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Using Twitter for Next-Place Prediction, with an Application to Crime Prediction.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2015

2014
Cascleave 2.0, a new approach for predicting caspase and granzyme cleavage targets.
Bioinform., 2014

Data Placement and Task Scheduling Optimization for Data Intensive Scientific Workflow in Multiple Data Centers Environment.
Proceedings of the Second International Conference on Advanced Cloud and Big Data, 2014

A Scheme to Secure Instant Community Data Access Based on Trust and Contexts.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
Secure pervasive social networking based on multi-dimensional trust levels.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Far-Field Terrain Perception Using Max-Margin Markov Networks.
Proceedings of the Intelligent Robotics and Applications - 5th International Conference, 2012

2009
A Combined Chemotaxis-haptotaxis System: The Role of Logistic Source.
SIAM J. Math. Anal., 2009

Robust H<sub>infinity</sub> control based on parameters weak coupling LMI equations set for uncertain singular state delay systems.
Proceedings of the 48th IEEE Conference on Decision and Control, 2009

2008
Global Mild Solution for a Chemotaxis-Haptotaxis Model of Tumor Invasion.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008

2001
An automatic method of location for number-plate using color features.
Proceedings of the 2001 International Conference on Image Processing, 2001


  Loading...