Weijin Wang

Orcid: 0000-0001-5015-7135

According to our database1, Weijin Wang authored at least 16 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Validity Analysis of Network Big Data.
J. Web Eng., 2023

2022
Sugarcane yields prediction at the row level using a novel cross-validation approach to multi-year multispectral images.
Comput. Electron. Agric., 2022

RETSR: An Effective Review-Enhanced and Time-Aware Sequential Recommendation Framework.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

RI-GCN: Review-aware Interactive Graph Convolutional Network for Review-based Item Recommendation.
Proceedings of the IEEE International Conference on Big Data, 2022

2017
Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Full Version).
IACR Cryptol. ePrint Arch., 2017

An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators.
Proceedings of the Security and Privacy in Communication Networks, 2017

Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Automated Security Proof of Cryptographic Support Commands in TPM 2.0.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

2015
TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems.
IACR Cryptol. ePrint Arch., 2015

Discovering the impact of systemic and idiosyncratic risk factors on credit spread of corporate bond within the framework of intelligent knowledge management.
Ann. Oper. Res., 2015

Formal Analysis of Enhanced Authorization in the TPM 2.0.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model (full version).
IACR Cryptol. ePrint Arch., 2014

Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model.
Proceedings of the Information Security Practice and Experience, 2014

ExBLACR: Extending BLACR System.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Information Properties of Boundary Line Models for N<sub>2</sub>O Emissions from Agricultural Soils.
Entropy, 2013

2012
Efficiency Test in Chinese Plastic Futures Market.
Proceedings of the Fifth International Conference on Business Intelligence and Financial Engineering, 2012


  Loading...