Wenjun Fan

Orcid: 0000-0002-7363-9695

According to our database1, Wenjun Fan authored at least 53 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Quantitative Diagnosis of Internal Short Circuit for Lithium-Ion Batteries Using Relaxation Voltage.
IEEE Trans. Ind. Electron., October, 2024

Data-Driven Fault Diagnosis of Internal Short Circuit for Series-Connected Battery Packs Using Partial Voltage Curves.
IEEE Trans. Ind. Informatics, April, 2024

SEAL: Secure and Efficient Authentication using Linkage for Blockchain Networks.
Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, 2024

An SDN-Enabled Elliptic-Curve Diffie-Hellman Key Exchange Towards Secure P2P Networking.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

An Improved Semantic Segmentation Method for Retinal OCT Images Based on High-Resolution Network and Polarized Self-Attention Mechanism.
Proceedings of the 2024 4th International Conference on Bioinformatics and Intelligent Computing, 2024

2023
Readers' reception of translated literary work: <i>Fortress Besieged</i> in the digital English world.
Digit. Scholarsh. Humanit., April, 2023

Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023

Investigation and Countermeasure toward Unintentional Access to Docker Container.
Proceedings of the Silicon Valley Cybersecurity Conference, 2023

An SDN-NFV-enabled Honeypot for Manipulating Command & Control Shell TCP Connection.
Proceedings of the NOMS 2023, 2023

Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

A Chaotic Encryption Approach Improving Digital Image Security.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

Classification and Identification of Phishing Websites based on Machine Learning.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

Privacy-preserving Deep Learning for Grey Scale Image Classification with Pixel-based Encryption.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023

A Honey-imprint enabled Approach for Resisting Social Engineering Attacks.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

A Machine Learning-Based Intrusion Detection Approach for Intelligent Connected Vehicles.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

Machine Learning-based Approach for Enhancing Multi-step Attack Prediction.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

QKD-based Secure Communication for UAV.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking.
IEEE Trans. Netw. Serv. Manag., 2022

Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency.
Comput. Networks, 2022

A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection.
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022

A Measurement of Real-world Attack Connections toward Honeypots.
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022

The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

2021
Different processes for translating expressive versus informative texts? A computer-assisted study of professionals' English-Chinese translation.
Digit. Scholarsh. Humanit., 2021

Blockchain-based root of trust management in security credential management system for vehicular communications.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Blockchain-based Secure Coordination for Distributed SDN Control Plane.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021

Robust P2P Connectivity Estimation for Permissionless Bitcoin Network.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

A Generic Blockchain Framework to Secure Decentralized Applications.
Proceedings of the ICC 2021, 2021

Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Security Analyses of Misbehavior Tracking in Bitcoin Network.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

Performance Analyses for Applying Machine Learning on Bitcoin Miners.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020

Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

A Privacy Preserving E-Voting System Based on Blockchain.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

Voting Credential Management System for Electronic Voting Privacy.
Proceedings of the 2020 IFIP Networking Conference, 2020

Optimizing Social Welfare for Task Offloading in Mobile Edge Computing.
Proceedings of the 2020 IFIP Networking Conference, 2020

Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design.
IEEE J. Sel. Areas Commun., 2019

Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey.
IEEE Syst. J., 2018

2017
Versatile virtual honeynet management framework.
IET Inf. Secur., 2017

A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017

An architecture for privacy-preserving sharing of CTI with 3<sup>rd</sup> party analysis services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017

2015
Adaptive and Flexible Virtual Honeynet.
Proceedings of the Mobile, Secure, and Programmable Networking, 2015

Technology Independent Honeynet Description Language.
Proceedings of the MODELSWARD 2015, 2015

Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

2013
Priori information and sliding window based prediction algorithm for energy-efficient storage systems in cloud.
Simul. Model. Pract. Theory, 2013

Three-state disk model for high quality and energy efficient streaming media servers.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

Using end-to-end data encryption to secure SIP device configuration.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2010
A New Automatic Train Identification System Based on RFID.
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010

Parallelization of RSA Algorithm Based on Compute Unified Device Architecture.
Proceedings of the GCC 2010, 2010


  Loading...