Shengjun Wei

Orcid: 0000-0001-5596-0904

According to our database1, Shengjun Wei authored at least 13 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.
Peer Peer Netw. Appl., March, 2024

TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things.
Computing, 2024

2023
B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme.
IEEE Internet Things J., 2023

TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system.
Future Gener. Comput. Syst., 2023

2021
HBRSS: Providing high-secure data communication and manipulation in insecure cloud environments.
Comput. Commun., 2021

2020
Image Recognition of Small UAVs Based on Faster RCNN.
Proceedings of the ICVISP 2020: 4th International Conference on Vision, 2020

2019
DEPLEST: A blockchain-based privacy-preserving distributed database toward user behaviors in social networks.
Inf. Sci., 2019

Sliding Mode Control for Permanent Magnet Synchronous Motor Drive Based on an Improved Exponential Reaching Law.
IEEE Access, 2019

Software Defect Prediction Model Based On KPCA-SVM.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
Vulnerability Prediction Based on Weighted Software Network for Secure Software Building.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Predicting Vulnerable Software Components Using Software Network Graph.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2013
An asymmetric coplanar waveguide (ACPW) resonant antenna based on the composite right/left-handed transmission line.
Sci. China Inf. Sci., 2013

2009
Modeling and Analyzing the Spread of Worms with Bilinear Incidence Rate.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...