Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mi Wen
@article{DBLP:journals/cj/WangZLWXN24, author = {Xiwen Wang and Kai Zhang and Jinguo Li and Mi Wen and Shengmin Xu and Jianting Ning}, title = {Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control}, journal = {Comput. J.}, volume = {67}, number = {1}, pages = {179--194}, year = {2024}, url = {https://doi.org/10.1093/comjnl/bxac166}, doi = {10.1093/COMJNL/BXAC166}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/WangZLWXN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangWWB24, author = {Jiahao Huang and Mi Wen and Minjie Wei and Yanbing Bi}, title = {Enhancing the transferability of adversarial samples with random noise techniques}, journal = {Comput. Secur.}, volume = {136}, pages = {103541}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103541}, doi = {10.1016/J.COSE.2023.103541}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HuangWWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccde/ZhangWLWZW24, author = {Lei Zhang and Binbin Wang and Chang Liu and Mi Wen and Yan Zhang and Liangliang Wang}, title = {AMNeuzz: {A} Strongly Directed Fuzz Testing Method Based on Attention Mechanism}, booktitle = {Proceedings of the 2024 10th International Conference on Computing and Data Engineering, {ICCDE} 2024, Bangkok, Thailand, January 15-17, 2024}, pages = {105--110}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3641181.3641182}, doi = {10.1145/3641181.3641182}, timestamp = {Mon, 15 Apr 2024 11:04:10 +0200}, biburl = {https://dblp.org/rec/conf/iccde/ZhangWLWZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/WangZLXW23, author = {Yanfei Wang and Kai Zhang and Kejie Lu and Yun Xiong and Mi Wen}, title = {Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving}, journal = {Peer Peer Netw. Appl.}, volume = {16}, number = {1}, pages = {295--311}, year = {2023}, url = {https://doi.org/10.1007/s12083-022-01390-9}, doi = {10.1007/S12083-022-01390-9}, timestamp = {Wed, 29 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/WangZLXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/DengZWWN23, author = {Minjun Deng and Kai Zhang and Pengfei Wu and Mi Wen and Jianting Ning}, title = {{DCDPI:} Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {4}, pages = {3510--3524}, year = {2023}, url = {https://doi.org/10.1109/TCC.2023.3293134}, doi = {10.1109/TCC.2023.3293134}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcc/DengZWWN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiWSZ23, author = {Weiwei Li and Mi Wen and Zhou Su and Kuan Zhang}, title = {Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {2913--2924}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3197639}, doi = {10.1109/TDSC.2022.3197639}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiWSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWNWL23, author = {Kai Zhang and Xiwen Wang and Jianting Ning and Mi Wen and Rongxing Lu}, title = {Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4621--4636}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3227650}, doi = {10.1109/TDSC.2022.3227650}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWNWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/XuWWLC23, author = {Jiangwei Xu and Liangliang Wang and Mi Wen and Yu Long and Kefei Chen}, title = {{DPB-MA:} Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {4}, pages = {5152--5166}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3225204}, doi = {10.1109/TVT.2022.3225204}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/XuWWLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/HeWLS23, author = {Siying He and Mi Wen and Xiumin Li and Zhou Su}, title = {An Approach for Attack Scenario Construction Based on Dynamic Attack Path Graph}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233417}, doi = {10.1109/ICCC57788.2023.10233417}, timestamp = {Wed, 13 Sep 2023 08:43:35 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/HeWLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccchina/LiWHLW23, author = {Xiumin Li and Mi Wen and Siying He and Rongxing Lu and Liangliang Wang}, title = {A Scheme for Robust Federated Learning with Privacy-preserving Based on Krum {AGR}}, booktitle = {{IEEE/CIC} International Conference on Communications in China, {ICCC} 2023, Dalian, China, August 10-12, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCC57788.2023.10233385}, doi = {10.1109/ICCC57788.2023.10233385}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccchina/LiWHLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieea/LiW23, author = {Bailin Li and Mi Wen}, title = {An Improved Traffic Forecasting Model based on Efficient Spatiotemporal Graph Convolutional Network}, booktitle = {Proceedings of the 12th International Conference on Informatics, Environment, Energy and Applications, {IEEA} 2023, Singapore, February 17-19, 2023}, pages = {48--51}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3594692.3594700}, doi = {10.1145/3594692.3594700}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ieea/LiW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/ZhengLWLSW23, author = {Jinkai Zheng and Guanjie Li and Wencong Wang and Tom H. Luan and Zhou Su and Mi Wen}, title = {Long-term Incentive Mechanism for Federated Learning: {A} Dynamic Repeated Game Approach}, booktitle = {34th {IEEE} Annual International Symposium on Personal, Indoor and Mobile Radio Communications {PIMRC} 2023, Toronto, ON, Canada, September 5-8, 2023}, pages = {1--6}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/PIMRC56721.2023.10294009}, doi = {10.1109/PIMRC56721.2023.10294009}, timestamp = {Mon, 13 Nov 2023 17:50:37 +0100}, biburl = {https://dblp.org/rec/conf/pimrc/ZhengLWLSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-09831, author = {Zian Jia and Yun Xiong and Yuhong Nan and Yao Zhang and Jinjing Zhao and Mi Wen}, title = {{MAGIC:} Detecting Advanced Persistent Threats via Masked Graph Representation Learning}, journal = {CoRR}, volume = {abs/2310.09831}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.09831}, doi = {10.48550/ARXIV.2310.09831}, eprinttype = {arXiv}, eprint = {2310.09831}, timestamp = {Wed, 25 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-09831.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/WenXLWZ22, author = {Mi Wen and Rong Xie and Kejie Lu and Liangliang Wang and Kai Zhang}, title = {FedDetect: {A} Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {8}, pages = {6069--6080}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3110784}, doi = {10.1109/JIOT.2021.3110784}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/WenXLWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/ChenWWZC22, author = {Jiasheng Chen and Liangliang Wang and Mi Wen and Kai Zhang and Kefei Chen}, title = {Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {11}, pages = {8967--8979}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3119513}, doi = {10.1109/JIOT.2021.3119513}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/ChenWWZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/WangWWCL22, author = {Huiwen Wang and Liangliang Wang and Mi Wen and Kefei Chen and Yiyuan Luo}, title = {A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids}, journal = {Wirel. Pers. Commun.}, volume = {126}, number = {2}, pages = {1577--1599}, year = {2022}, url = {https://doi.org/10.1007/s11277-022-09809-5}, doi = {10.1007/S11277-022-09809-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/WangWWCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GeWWX22, author = {Jiangyan Ge and Mi Wen and Liangliang Wang and Rong Xie}, title = {Attribute-Based Collaborative Access Control Scheme with Constant Ciphertext Length for Smart Grid}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul, Korea, May 16-20, 2022}, pages = {540--546}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICC45855.2022.9839086}, doi = {10.1109/ICC45855.2022.9839086}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/GeWWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccde/WangWSWWM22, author = {Binbin Wang and Mi Wen and Yan Song and Liangliang Wang and Zihan Wang and Qifan Mao}, title = {MLPNeuzz: {A} Novel Neural Program Smoothing Method Based on Multi-Layer Perceptron}, booktitle = {{ICCDE} 2022: The 8th International Conference on Computing and Data Engineering, Bangkok, Thailand, January 11 - 13, 2022}, pages = {92--97}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3512850.3512862}, doi = {10.1145/3512850.3512862}, timestamp = {Wed, 20 Apr 2022 19:13:44 +0200}, biburl = {https://dblp.org/rec/conf/iccde/WangWSWWM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/SunWZMC21, author = {Chao Sun and Mi Wen and Kai Zhang and Ping Meng and Rongcheng Cui}, title = {Traffic sign detection algorithm based on feature expression enhancement}, journal = {Multim. Tools Appl.}, volume = {80}, number = {25}, pages = {33593--33614}, year = {2021}, url = {https://doi.org/10.1007/s11042-021-11413-x}, doi = {10.1007/S11042-021-11413-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/SunWZMC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWLC21, author = {Kai Zhang and Mi Wen and Rongxing Lu and Kefei Chen}, title = {Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2875--2887}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.2968425}, doi = {10.1109/TDSC.2020.2968425}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LvWLL21, author = {Huanhuan Lv and Mi Wen and Rongxing Lu and Jinguo Li}, title = {An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {6}, pages = {5254--5264}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3069426}, doi = {10.1109/TVT.2021.3069426}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LvWLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccir/WenZ21, author = {Mi Wen and Mu{-}qing Zhu}, title = {Text Content Tag Recommendation Algorithm Based on Knowledge Map Fusion Reasoning}, booktitle = {{ICCIR} 2021: International Conference on Control and Intelligent Robotics, Guangzhou, China, June 18-20, 2021}, pages = {740--745}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3473714.3473843}, doi = {10.1145/3473714.3473843}, timestamp = {Tue, 17 Aug 2021 14:19:48 +0200}, biburl = {https://dblp.org/rec/conf/iccir/WenZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhouLZWG20, author = {Shaojing Zhou and Jinguo Li and Kai Zhang and Mi Wen and Qijie Guan}, title = {An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With {VMD} and R-Transformer}, journal = {{IEEE} Access}, volume = {8}, pages = {115992--116003}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3004370}, doi = {10.1109/ACCESS.2020.3004370}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhouLZWG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DingLWWL20, author = {Pengpeng Ding and Jinguo Li and Mi Wen and Liangliang Wang and Hongjiao Li}, title = {Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection}, journal = {{IEEE} Access}, volume = {8}, pages = {164414--164427}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3022355}, doi = {10.1109/ACCESS.2020.3022355}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DingLWWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/LiWZ20, author = {Jinguo Li and Mi Wen and Kai Zhang}, title = {Cloud-assisted secure and conjunctive publish/subscribe service in smart grids}, journal = {{IET} Inf. Secur.}, volume = {14}, number = {4}, pages = {470--481}, year = {2020}, url = {https://doi.org/10.1049/iet-ifs.2019.0086}, doi = {10.1049/IET-IFS.2019.0086}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/LiWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/WuWLLL20, author = {Jiale Wu and Mi Wen and Rongxing Lu and Beibei Li and Jinguo Li}, title = {Toward efficient and effective bullying detection in online social network}, journal = {Peer-to-Peer Netw. Appl.}, volume = {13}, number = {5}, pages = {1567--1576}, year = {2020}, url = {https://doi.org/10.1007/s12083-019-00832-1}, doi = {10.1007/S12083-019-00832-1}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ppna/WuWLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DingLWWG20, author = {Pengpeng Ding and Jinguo Li and Liangliang Wang and Mi Wen and Yuyao Guan}, title = {{HYBRID-CNN:} An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid}, journal = {Secur. Commun. Networks}, volume = {2020}, pages = {8850550:1--8850550:20}, year = {2020}, url = {https://doi.org/10.1155/2020/8850550}, doi = {10.1155/2020/8850550}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/DingLWWG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/LvWLWL20, author = {Huanhuan Lv and Mi Wen and Rongxing Lu and Xuankai Wang and Jinguo Li}, title = {An Adversarial Attack with Fusion of Polarization for Unmanned Scenes}, booktitle = {92nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2020, Victoria, BC, Canada, November 18 - December 16, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/VTC2020-Fall49728.2020.9348453}, doi = {10.1109/VTC2020-FALL49728.2020.9348453}, timestamp = {Mon, 20 Dec 2021 11:29:51 +0100}, biburl = {https://dblp.org/rec/conf/vtc/LvWLWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WenCLLC19, author = {Mi Wen and Shan Chen and Rongxing Lu and Beibei Li and Sijia Chen}, title = {Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System}, journal = {{IEEE} Access}, volume = {7}, pages = {137968--137981}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2942414}, doi = {10.1109/ACCESS.2019.2942414}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WenCLLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WangWCBL19, author = {Liangliang Wang and Mi Wen and Kefei Chen and Zhongqin Bi and Yu Long}, title = {A new VRSA-based pairing-free certificateless signature scheme for fog computing}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {22}, year = {2019}, url = {https://doi.org/10.1002/cpe.4919}, doi = {10.1002/CPE.4919}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/WangWCBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/JiangLXWDL19, author = {Wenbo Jiang and Hongwei Li and Guowen Xu and Mi Wen and Guishan Dong and Xiaodong Lin}, title = {{PTAS:} Privacy-preserving Thin-client Authentication Scheme in blockchain-based {PKI}}, journal = {Future Gener. Comput. Syst.}, volume = {96}, pages = {185--195}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.01.026}, doi = {10.1016/J.FUTURE.2019.01.026}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/JiangLXWDL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YaoWLFZY19, author = {Donghuan Yao and Mi Wen and Xiaohui Liang and Zipeng Fu and Kai Zhang and Baojia Yang}, title = {Energy Theft Detection With Energy Privacy Preservation in the Smart Grid}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {7659--7669}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2903312}, doi = {10.1109/JIOT.2019.2903312}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YaoWLFZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LiW0LLL19, author = {Jinguo Li and Mi Wen and Kui Wu and Kejie Lu and Fengyong Li and Hongjiao Li}, title = {Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds}, journal = {Peer-to-Peer Netw. Appl.}, volume = {12}, number = {4}, pages = {893--911}, year = {2019}, url = {https://doi.org/10.1007/s12083-018-0691-8}, doi = {10.1007/S12083-018-0691-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LiW0LLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/XuLLWL19, author = {Guowen Xu and Hongwei Li and Sen Liu and Mi Wen and Rongxing Lu}, title = {Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {68}, number = {4}, pages = {3854--3865}, year = {2019}, url = {https://doi.org/10.1109/TVT.2019.2895834}, doi = {10.1109/TVT.2019.2895834}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/XuLLWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/WangWLFLC19, author = {Xuankai Wang and Mi Wen and Jinguo Li and Zipeng Fu and Rongxing Lu and Kefei Chen}, title = {Adversarial attack against scene recognition system for unmanned vehicles}, booktitle = {Proceedings of the {ACM} Turing Celebration Conference - China, {ACM} {TUR-C} 2019, Chengdu, China, May 17-19, 2019}, pages = {65:1--65:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321408.3321571}, doi = {10.1145/3321408.3321571}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/acmturc/WangWLFLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/GongLXLW19, author = {Li Gong and Hongwei Li and Guowen Xu and Xizhao Luo and Mi Wen}, title = {Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data}, booktitle = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa, HI, USA, December 9-13, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/GLOBECOM38437.2019.9014190}, doi = {10.1109/GLOBECOM38437.2019.9014190}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/GongLXLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/ChenWLLC19, author = {Shan Chen and Mi Wen and Rongxing Lu and Jinguo Li and Sijia Chen}, title = {Achieve Revocable Access Control for Fog-Based Smart Grid System}, booktitle = {90th {IEEE} Vehicular Technology Conference, {VTC} Fall 2019, Honolulu, HI, USA, September 22-25, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/VTCFall.2019.8891162}, doi = {10.1109/VTCFALL.2019.8891162}, timestamp = {Mon, 20 Dec 2021 11:29:04 +0100}, biburl = {https://dblp.org/rec/conf/vtc/ChenWLLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LiWZYLW18, author = {Fengyong Li and Kui Wu and Xinpeng Zhang and Jiang Yu and Jingsheng Lei and Mi Wen}, title = {Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition}, journal = {{IEEE} Access}, volume = {6}, pages = {29912--29925}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2841415}, doi = {10.1109/ACCESS.2018.2841415}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/LiWZYLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/LiWLWR18, author = {Fengyong Li and Kui Wu and Jingsheng Lei and Mi Wen and Yanli Ren}, title = {Unsupervised steganalysis over social networks based on multi-reference sub-image sets}, journal = {Multim. Tools Appl.}, volume = {77}, number = {14}, pages = {17953--17971}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4759-x}, doi = {10.1007/S11042-017-4759-X}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/LiWLWR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LiWLR18, author = {Fengyong Li and Mi Wen and Jingsheng Lei and Yanli Ren}, title = {Efficient steganographer detection over social networks with sampling reconstruction}, journal = {Peer-to-Peer Netw. Appl.}, volume = {11}, number = {5}, pages = {924--939}, year = {2018}, url = {https://doi.org/10.1007/s12083-017-0603-3}, doi = {10.1007/S12083-017-0603-3}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LiWLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/Li0ZLW18, author = {Fengyong Li and Kui Wu and Xinpeng Zhang and Jingsheng Lei and Mi Wen}, title = {Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles}, journal = {Symmetry}, volume = {10}, number = {5}, pages = {128}, year = {2018}, url = {https://doi.org/10.3390/sym10050128}, doi = {10.3390/SYM10050128}, timestamp = {Wed, 03 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/symmetry/Li0ZLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/JiangLXWDL18, author = {Wenbo Jiang and Hongwei Li and Guowen Xu and Mi Wen and Guishan Dong and Xiaodong Lin}, title = {A Privacy-Preserving Thin-Client Scheme in Blockchain-Based {PKI}}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8647852}, doi = {10.1109/GLOCOM.2018.8647852}, timestamp = {Tue, 21 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/JiangLXWDL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WenYLL18, author = {Mi Wen and Donghuan Yao and Beibei Li and Rongxing Lu}, title = {State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422731}, doi = {10.1109/ICC.2018.8422731}, timestamp = {Mon, 12 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WenYLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ZhangWLL17, author = {Xu Zhang and Mi Wen and Kejie Lu and Jingsheng Lei}, title = {A privacy-aware data dissemination scheme for smart grid with abnormal data traceability}, journal = {Comput. Networks}, volume = {117}, pages = {32--41}, year = {2017}, url = {https://doi.org/10.1016/j.comnet.2016.11.009}, doi = {10.1016/J.COMNET.2016.11.009}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ZhangWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/SuXHWG17, author = {Zhou Su and Qichao Xu and Yilong Hui and Mi Wen and Song Guo}, title = {A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {66}, number = {7}, pages = {6461--6474}, year = {2017}, url = {https://doi.org/10.1109/TVT.2016.2630300}, doi = {10.1109/TVT.2016.2630300}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/SuXHWG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WangWCBL17, author = {Liangliang Wang and Mi Wen and Kefei Chen and Zhongqin Bi and Yu Long}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of {RSA}}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {248--266}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_19}, doi = {10.1007/978-3-319-69471-9\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/css/WangWCBL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/WenZLL17, author = {Mi Wen and Xu Zhang and Hongwei Li and Jinguo Li}, title = {A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid}, booktitle = {86th {IEEE} Vehicular Technology Conference, {VTC} Fall 2017, Toronto, ON, Canada, September 24-27, 2017}, pages = {1--5}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/VTCFall.2017.8288161}, doi = {10.1109/VTCFALL.2017.8288161}, timestamp = {Mon, 20 Dec 2021 11:29:16 +0100}, biburl = {https://dblp.org/rec/conf/vtc/WenZLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiWZ16, author = {Jinguo Li and Mi Wen and Tao Zhang}, title = {Group-Based Authentication and Key Agreement With Dynamic Policy Updating for {MTC} in {LTE-A} Networks}, journal = {{IEEE} Internet Things J.}, volume = {3}, number = {3}, pages = {408--417}, year = {2016}, url = {https://doi.org/10.1109/JIOT.2015.2495321}, doi = {10.1109/JIOT.2015.2495321}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/LiWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WenZLLDS16, author = {Mi Wen and Kuan Zhang and Jingsheng Lei and Xiaohui Liang and Ruilong Deng and Xuemin (Sherman) Shen}, title = {{CIT:} {A} credit-based incentive tariff scheme with fraud-traceability for smart grid}, journal = {Secur. Commun. Networks}, volume = {9}, number = {9}, pages = {823--832}, year = {2016}, url = {https://doi.org/10.1002/sec.895}, doi = {10.1002/SEC.895}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WenZLLDS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiWLG16, author = {Jinguo Li and Mi Wen and Kejie Lu and Chunhua Gu}, title = {{PIMRS:} achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data}, journal = {Secur. Commun. Networks}, volume = {9}, number = {16}, pages = {3765--3776}, year = {2016}, url = {https://doi.org/10.1002/sec.1482}, doi = {10.1002/SEC.1482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiWLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiWLWBG16, author = {Fengyong Li and Kui Wu and Jingsheng Lei and Mi Wen and Zhongqin Bi and Chunhua Gu}, title = {Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {2}, pages = {344--357}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2496910}, doi = {10.1109/TIFS.2015.2496910}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiWLWBG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LiWGL16, author = {Jinguo Li and Mi Wen and Chunhua Gu and Hongwei Li}, title = {{PSS:} Achieving high-efficiency and privacy-preserving similarity search in multiple clouds}, booktitle = {2016 {IEEE} International Conference on Communications, {ICC} 2016, Kuala Lumpur, Malaysia, May 22-27, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICC.2016.7511324}, doi = {10.1109/ICC.2016.7511324}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/LiWGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/LiYYW15, author = {Hongwei Li and Yi Yang and Haomiao Yang and Mi Wen}, title = {Achieving efficient and privacy-preserving multi-feature search for mobile sensing}, journal = {Comput. Commun.}, volume = {65}, pages = {35--42}, year = {2015}, url = {https://doi.org/10.1016/j.comcom.2015.02.006}, doi = {10.1016/J.COMCOM.2015.02.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/LiYYW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/WenLBL15, author = {Mi Wen and Jingsheng Lei and Zhongqin Bi and Jing Li}, title = {{EAPA:} An efficient authentication protocol against pollution attack for smart grid}, journal = {Peer-to-Peer Netw. Appl.}, volume = {8}, number = {6}, pages = {1082--1089}, year = {2015}, url = {https://doi.org/10.1007/s12083-014-0283-1}, doi = {10.1007/S12083-014-0283-1}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/WenLBL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/WenOLLGS15, author = {Mi Wen and Kaoru Ota and He Li and Jingsheng Lei and Chunhua Gu and Zhou Su}, title = {Secure Data Deduplication With Reliable Key Management for Dynamic Updates in {CPSS}}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {2}, number = {4}, pages = {137--147}, year = {2015}, url = {https://doi.org/10.1109/TCSS.2015.2514088}, doi = {10.1109/TCSS.2015.2514088}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcss/WenOLLGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/XuWL15, author = {Lin Xu and Mi Wen and Jinguo Li}, title = {A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks}, booktitle = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015, Hangzhou, China, October 27-30, 2015}, pages = {200--204}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIC.2015.16}, doi = {10.1109/CIC.2015.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/XuWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/HovhannisyanLYQ15, author = {Hermine Hovhannisyan and Kejie Lu and Rongwei Yang and Wen Qi and Jianping Wang and Mi Wen}, title = {A Novel Deduplication-Based Covert Channel in Cloud Storage Service}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--6}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417228}, doi = {10.1109/GLOCOM.2014.7417228}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/HovhannisyanLYQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/WenLLLL15, author = {Mi Wen and Kejie Lu and Jingsheng Lei and Fengyong Li and Jing Li}, title = {{BDO-SD:} An efficient scheme for big data outsourcing with secure deduplication}, booktitle = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Hong Kong, China, April 26 - May 1, 2015}, pages = {214--219}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/INFCOMW.2015.7179387}, doi = {10.1109/INFCOMW.2015.7179387}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/WenLLLL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LiLWGY15, author = {Jinguo Li and Yaping Lin and Mi Wen and Chunhua Gu and Bo Yin}, editor = {Kuai Xu and Haojin Zhu}, title = {Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing}, booktitle = {Wireless Algorithms, Systems, and Applications - 10th International Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9204}, pages = {325--334}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-21837-3\_32}, doi = {10.1007/978-3-319-21837-3\_32}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/LiLWGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/WenLLLS14, author = {Mi Wen and Rongxing Lu and Xiaohui Liang and Jingsheng Lei and Xuemin (Sherman) Shen}, title = {Querying over Encrypted Data in Smart Grids}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06355-3}, doi = {10.1007/978-3-319-06355-3}, isbn = {978-3-319-06354-6}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/sbcs/WenLLLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiYWLL14, author = {Hongwei Li and Yi Yang and Mi Wen and Hongwei Luo and Rongxing Lu}, title = {{EMRQ:} An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {8}, number = {11}, pages = {3937--3954}, year = {2014}, url = {https://doi.org/10.3837/tiis.2014.11.015}, doi = {10.3837/TIIS.2014.11.015}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiYWLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WenLLLLS14, author = {Mi Wen and Rongxing Lu and Jingsheng Lei and Hongwei Li and Xiaohui Liang and Xuemin (Sherman) Shen}, title = {{SESA:} an efficient searchable encryption scheme for auction in emerging smart grid marketing}, journal = {Secur. Commun. Networks}, volume = {7}, number = {1}, pages = {234--244}, year = {2014}, url = {https://doi.org/10.1002/sec.699}, doi = {10.1002/SEC.699}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WenLLLLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YangLLYW14, author = {Yi Yang and Hongwei Li and Wenchao Liu and Haomiao Yao and Mi Wen}, title = {Secure dynamic searchable symmetric encryption with constant document update cost}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin, TX, USA, December 8-12, 2014}, pages = {775--780}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GLOCOM.2014.7036902}, doi = {10.1109/GLOCOM.2014.7036902}, timestamp = {Mon, 17 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YangLLYW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/YangLWLL14, author = {Yi Yang and Hongwei Li and Mi Wen and Hongwei Luo and Rongxing Lu}, title = {Achieving ranked range query in smart grid auction market}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney, Australia, June 10-14, 2014}, pages = {951--956}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ICC.2014.6883442}, doi = {10.1109/ICC.2014.6883442}, timestamp = {Wed, 01 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/YangLWLL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WenLB13, author = {Mi Wen and Jingsheng Lei and Zhongqin Bi}, title = {{SSE:} {A} Secure Searchable Encryption Scheme for Urban Sensing and Querying}, journal = {Int. J. Distributed Sens. Networks}, volume = {9}, year = {2013}, url = {https://doi.org/10.1155/2013/302147}, doi = {10.1155/2013/302147}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdsn/WenLB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/WenLZLLS13, author = {Mi Wen and Rongxing Lu and Kuan Zhang and Jingsheng Lei and Xiaohui Liang and Xuemin Shen}, title = {PaRQ: {A} Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {1}, number = {1}, pages = {178--191}, year = {2013}, url = {https://doi.org/10.1109/TETC.2013.2273889}, doi = {10.1109/TETC.2013.2273889}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/WenLZLLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WenLLLLS13, author = {Mi Wen and Rongxing Lu and Jingsheng Lei and Xiaohui Liang and Hongwei Li and Xuemin Shen}, title = {{ECQ:} An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {796--801}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831170}, doi = {10.1109/GLOCOM.2013.6831170}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/WenLLLLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wsn/WenYLW10, author = {Mi Wen and Zhi Yin and Yu Long and Yong Wang}, title = {An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks}, journal = {Wirel. Sens. Netw.}, volume = {2}, number = {9}, pages = {689--697}, year = {2010}, url = {https://doi.org/10.4236/wsn.2010.29083}, doi = {10.4236/WSN.2010.29083}, timestamp = {Wed, 25 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wsn/WenYLW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eforensics/WangGXWD10, author = {Yong Wang and Dawu Gu and Jianping Xu and Mi Wen and Liwen Deng}, editor = {Xuejia Lai and Dawu Gu and Bo Jin and Yongquan Wang and Hui Li}, title = {{RICB:} Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow}, booktitle = {Forensics in Telecommunications, Information, and Multimedia - Third International {ICST} Conference, e-Forensics 2010, Shanghai, China, November 11-12, 2010, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {56}, pages = {99--109}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-23602-0\_9}, doi = {10.1007/978-3-642-23602-0\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eforensics/WangGXWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/WangGWLX10, author = {Yong Wang and Dawu Gu and Mi Wen and Haming Li and Jianping Xu}, editor = {Liqing Zhang and Bao{-}Liang Lu and James Tin{-}Yau Kwok}, title = {Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network}, booktitle = {Advances in Neural Networks - {ISNN} 2010, 7th International Symposium on Neural Networks, {ISNN} 2010, Shanghai, China, June 6-9, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6064}, pages = {556--565}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13318-3\_69}, doi = {10.1007/978-3-642-13318-3\_69}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/isnn/WangGWLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/WangGWXL10, author = {Yong Wang and Dawu Gu and Mi Wen and Jianping Xu and Haming Li}, editor = {Liqing Zhang and Bao{-}Liang Lu and James Tin{-}Yau Kwok}, title = {Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network}, booktitle = {Advances in Neural Networks - {ISNN} 2010, 7th International Symposium on Neural Networks, {ISNN} 2010, Shanghai, China, June 6-9, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6064}, pages = {576--585}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13318-3\_71}, doi = {10.1007/978-3-642-13318-3\_71}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isnn/WangGWXL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/swarm/WangRXWD10, author = {Yong Wang and Da Ruan and Jianping Xu and Mi Wen and Liwen Deng}, editor = {Ying Tan and Yuhui Shi and Kay Chen Tan}, title = {Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security}, booktitle = {Advances in Swarm Intelligence, First International Conference, {ICSI} 2010, Beijing, China, June 12-15, 2010, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {6146}, pages = {77--84}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13498-2\_11}, doi = {10.1007/978-3-642-13498-2\_11}, timestamp = {Tue, 11 Jul 2023 08:21:50 +0200}, biburl = {https://dblp.org/rec/conf/swarm/WangRXWD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/WenZYCQ09, author = {Mi Wen and Yanfei Zheng and Wen{-}jun Ye and Kefei Chen and Weidong Qiu}, title = {A key management protocol with robust continuity for sensor networks}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {4}, pages = {642--647}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.06.005}, doi = {10.1016/J.CSI.2008.06.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/WenZYCQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/WenDZC09, author = {Mi Wen and Ling Dong and Yanfei Zheng and Kefei Chen}, title = {Towards Provable Security for Data Transmission Protocols in Sensor Network}, journal = {J. Inf. Sci. Eng.}, volume = {25}, number = {1}, pages = {319--333}, year = {2009}, url = {http://www.iis.sinica.edu.tw/page/jise/2009/200901\_18.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/WenDZC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DongCLW09, author = {Ling Dong and Kefei Chen and Xuejia Lai and Mi Wen}, title = {When is a key establishment protocol correct?}, journal = {Secur. Commun. Networks}, volume = {2}, number = {6}, pages = {567--579}, year = {2009}, url = {https://doi.org/10.1002/sec.100}, doi = {10.1002/SEC.100}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DongCLW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/QiuZZZWG09, author = {Weidong Qiu and Yaowei Zhou and Bo Zhu and Yanfei Zheng and Mi Wen and Zheng Gong}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Key-Insulated Encryption Based Key Pre-distribution Scheme for {WSN}}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {200--209}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_21}, doi = {10.1007/978-3-642-02617-1\_21}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/QiuZZZWG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wism/WenLTTCQ09, author = {Mi Wen and Jingsheng Lei and Zhong Tang and Xiuxia Tian and Kefei Chen and Weidong Qiu}, editor = {Wenyin Liu and Xiangfeng Luo and Fu Lee Wang and Jingsheng Lei}, title = {A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks}, booktitle = {Web Information Systems and Mining, International Conference, {WISM} 2009, Shanghai, China, November 7-8, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5854}, pages = {413--425}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05250-7\_44}, doi = {10.1007/978-3-642-05250-7\_44}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/wism/WenLTTCQ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/WenDZC07, author = {Mi Wen and Ling Dong and Yanfei Zheng and Kefei Chen}, editor = {Christopher C. Yang and Daniel Dajun Zeng and Michael Chau and Kuiyu Chang and Qing Yang and Xueqi Cheng and Jue Wang and Fei{-}Yue Wang and Hsinchun Chen}, title = {A Framework for Proving the Security of Data Transmission Protocols in Sensor Network}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI} 2007, Chengdu, China, April 11-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4430}, pages = {288--294}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71549-8\_30}, doi = {10.1007/978-3-540-71549-8\_30}, timestamp = {Fri, 18 Oct 2019 12:58:35 +0200}, biburl = {https://dblp.org/rec/conf/paisi/WenDZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/LiZWC07, author = {Hui Li and Yanfei Zheng and Mi Wen and Kefei Chen}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {A Secure Time Synchronization Protocol for Sensor Network}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {515--526}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_52}, doi = {10.1007/978-3-540-77018-3\_52}, timestamp = {Fri, 09 Apr 2021 17:11:17 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/LiZWC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/WenZLC07, author = {Mi Wen and Yanfei Zheng and Hui Li and Kefei Chen}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {A Hierarchical Composition of {LU} Matrix-Based Key Distribution Scheme for Sensor Networks}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {608--620}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_60}, doi = {10.1007/978-3-540-77018-3\_60}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/WenZLC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/DongCWZ07, author = {Ling Dong and Kefei Chen and Mi Wen and Yanfei Zheng}, editor = {Wenying Feng and Feng Gao}, title = {Protocol Engineering Principles for Cryptographic Protocols Design}, booktitle = {Proceedings of the 8th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China}, pages = {641--646}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SNPD.2007.441}, doi = {10.1109/SNPD.2007.441}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/DongCWZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsnc/LiCZW06, author = {Hui Li and Kefei Chen and Yanfei Zheng and Mi Wen}, title = {A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks}, booktitle = {Proceedings of the International Conference on Systems and Networks Communications {(ICSNC} 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia}, pages = {29}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICSNC.2006.3}, doi = {10.1109/ICSNC.2006.3}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icsnc/LiCZW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.