Wei Ren

According to our database1, Wei Ren authored at least 41 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Symmetry, 2019

LMDGW: a novel matrix based dynamic graph watermark.
J. Ambient Intelligence and Humanized Computing, 2019

CaACBIM: A Context-aware Access Control Model for BIM.
Information, 2019

SaaS: A situational awareness and analysis system for massive android malware detection.
Future Generation Comp. Syst., 2019

Reduced Collatz Dynamics Data Reveals Properties for the Future Proof of Collatz Conjecture.
Data, 2019

2018
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Inform., 2018

A Watermark-Based In-Situ Access Control Model for Image Big Data.
Future Internet, 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Generation Comp. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Generation Comp. Syst., 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

Lico: A Lightweight Access Control Model for Inter-Networking Linkages.
IEEE Access, 2018

Collatz Conjecture for 2^100000-1 Is True - Algorithms for Verifying Extremely Large Numbers.
Proceedings of the 2018 IEEE SmartWorld, 2018

MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.
Computer Standards & Interfaces, 2017

DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX.
Proceedings of the Advances in Internetworking, 2017

2016
F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing.
Mobile Information Systems, 2016

LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing.
IJES, 2016

Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal.
Proceedings of the Advances on P2P, 2016

2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

2014
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing.
IJIPT, 2014

A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function.
IJCSE, 2014

2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
IJDSN, 2013

LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
IJDSN, 2013

APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
IJDSN, 2013

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
IJDSN, 2013

2012
uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

2011
QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things.
Int. Journal of Network Management, 2011

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid.
Int. J. Digital Multimedia Broadcasting, 2011

2010
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks.
SCIENCE CHINA Information Sciences, 2010

2009
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
JCM, 2009

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Efficient user revocation for privacy-aware PKI.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Optimized User Revocation for Group Signature Based Privacy-Aware PKI.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

HybridS: A Scheme for Secure Distributed Data Storage in WSNs.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography.
Proceedings of IEEE International Conference on Communications, 2007

2006
A Combination Scheme to Improve TCP Throughput over Multihops Wireless Mobile Ad Hoc Networks.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

2005
Honeynet based distributed adaptive network forensics and active real time investigation.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Congestion Targeted Reduction of Quality of Service DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design .
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...