Wenming Wang

Orcid: 0000-0002-5674-5699

According to our database1, Wenming Wang authored at least 29 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption.
J. Cloud Comput., December, 2024

2023
A Verifiable and Efficient Secure Sharing Scheme in Multiowner Multiuser Settings.
IEEE Syst. J., December, 2023

Double Rainbows: A Promising Distributed Data Sharing in Augmented Intelligence of Things.
IEEE Trans. Ind. Informatics, 2023

Children's expression recognition based on a multiscale mixed attention mechanism.
Int. J. Sens. Networks, 2023

2022
An Adaptive Secure Handover Authenticated Key Agreement for Multi-Server Architecture Communication Applications.
IEEE Trans. Veh. Technol., 2022

A Cross-Domain Authentication Scheme Based on Cooperative Blockchains Functioning With Revocation for Medical Consortiums.
IEEE Trans. Netw. Serv. Manag., 2022

Online monitoring of resistance spot welding electrode wear state based on dynamic resistance.
J. Intell. Manuf., 2022

UULPN: An ultra-lightweight network for human pose estimation based on unbiased data processing.
Neurocomputing, 2022

2021
A Lightweight Three-Factor Authentication and Key Agreement Scheme for Multigateway WSNs in IoT.
Secur. Commun. Networks, 2021

Computation-transferable authenticated key agreement protocol for smart healthcare.
J. Syst. Archit., 2021

Blockchain-assisted handover authentication for intelligent telehealth in multi-server edge computing environment.
J. Syst. Archit., 2021

Smooth Path Planning of Mobile Robot Based on Improved Ant Colony Algorithm.
J. Robotics, 2021

Blockchain-based eHealth system for auditable EHRs manipulation in cloud environments.
J. Parallel Distributed Comput., 2021

Fast and Lightweight Human Pose Estimation.
IEEE Access, 2021

2020
An Authentication Scheme Based on Novel Construction of Hash Chains for Smart Mobile Devices.
Wirel. Commun. Mob. Comput., 2020

Location Privacy-Preserving Method Based on Historical Proximity Location.
Wirel. Commun. Mob. Comput., 2020

An Improved Broadcast Authentication Protocol for Wireless Sensor Networks Based on the Self-Reinitializable Hash Chains.
Secur. Commun. Networks, 2020

Classification and recognition of encrypted EEG data based on neural network.
J. Inf. Secur. Appl., 2020

Classification and Recognition of Encrypted EEG Data Neural Network.
CoRR, 2020

Generalized Intrusion Detection Mechanism for Empowered Intruders in Wireless Sensor Networks.
IEEE Access, 2020

Multimodal Emotion Recognition Based on Ensemble Convolutional Neural Network.
IEEE Access, 2020

2019
An Enhanced Virtual Force Algorithm for Diverse <i>k</i>-Coverage Deployment of 3D Underwater Wireless Sensor Networks.
Sensors, 2019

Cryptanalysis and Improvement of an Anonymous Batch Verification Scheme for Mobile Healthcare Crowd Sensing.
IEEE Access, 2019

2018
Text Mining for Educational Literature on Big Data with Hadoop.
Proceedings of the 2018 IEEE International Conference on Smart Cloud, 2018

2017
Research on the Measurement and Transmission Network System of New Launch Vehicle Based on Cloud Computing.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

An indoor AR registration technique based on iBeacons.
Proceedings of the IEEE International Conference on Information and Automation, 2017

Research on the dynamic latent factor model combining attributes of user and item.
Proceedings of the IEEE International Conference on Information and Automation, 2017

2012
Design and Implementation of a Fine-Grained NAND Flash Programmer.
Proceedings of the 13th International Conference on Parallel and Distributed Computing, 2012

2011
Study on vibration and durability testing for motorcycle frame.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011


  Loading...