Wen Huang
Orcid: 0000-0002-0519-6407Affiliations:
- Sichuan University, College of Computer Science, Chengdu, China
- University of Electronic Science and Technology of China, UESTC, School of Information and Software Engineering, Chengdu, China (former)
According to our database1,
Wen Huang
authored at least 29 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
An Attribute-Based Pre-Authenticated Secure Communication Protocol Enabling Key Protection and Credential Online-Upgrading for 5G NR V2X.
IEEE Trans. Intell. Transp. Syst., August, 2025
Neurocomputing, 2025
Enhanced Spatio-Temporal Extended Pattern Diffusion Network for Traffic Flow Forecasting.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025
Proceedings of the 41st IEEE International Conference on Data Engineering, 2025
Improving Federated Domain Generalization Through Dynamical Weights Calculated from Data Influences on Global Model Update.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Dynamic graph attention-guided graph clustering with entropy minimization self-supervision.
Appl. Intell., December, 2024
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System.
IEEE Internet Things J., September, 2024
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS.
IEEE Trans. Intell. Transp. Syst., July, 2024
Collect Spatiotemporally Correlated Data in IoT Networks With an Energy-Constrained UAV.
IEEE Internet Things J., June, 2024
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024
IEEE Trans. Serv. Comput., 2024
Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field.
CoRR, 2024
2023
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023
Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023
Proceedings of the Security and Privacy in Communication Networks, 2023
2022
Remote. Sens., 2022
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022
Adversarial attack and defense technologies in natural language processing: A survey.
Neurocomputing, 2022
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022
2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
IEEE Internet Things J., 2019
IEEE Access, 2019
IEEE Access, 2019