BibTeX records: Mi Wen

download as .bib file

@article{DBLP:journals/cj/WangZLWXN24,
  author       = {Xiwen Wang and
                  Kai Zhang and
                  Jinguo Li and
                  Mi Wen and
                  Shengmin Xu and
                  Jianting Ning},
  title        = {Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral
                  Access Control},
  journal      = {Comput. J.},
  volume       = {67},
  number       = {1},
  pages        = {179--194},
  year         = {2024},
  url          = {https://doi.org/10.1093/comjnl/bxac166},
  doi          = {10.1093/COMJNL/BXAC166},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/WangZLWXN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangWWB24,
  author       = {Jiahao Huang and
                  Mi Wen and
                  Minjie Wei and
                  Yanbing Bi},
  title        = {Enhancing the transferability of adversarial samples with random noise
                  techniques},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103541},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103541},
  doi          = {10.1016/J.COSE.2023.103541},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangWWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccde/ZhangWLWZW24,
  author       = {Lei Zhang and
                  Binbin Wang and
                  Chang Liu and
                  Mi Wen and
                  Yan Zhang and
                  Liangliang Wang},
  title        = {AMNeuzz: {A} Strongly Directed Fuzz Testing Method Based on Attention
                  Mechanism},
  booktitle    = {Proceedings of the 2024 10th International Conference on Computing
                  and Data Engineering, {ICCDE} 2024, Bangkok, Thailand, January 15-17,
                  2024},
  pages        = {105--110},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3641181.3641182},
  doi          = {10.1145/3641181.3641182},
  timestamp    = {Mon, 15 Apr 2024 11:04:10 +0200},
  biburl       = {https://dblp.org/rec/conf/iccde/ZhangWLWZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/WangZLXW23,
  author       = {Yanfei Wang and
                  Kai Zhang and
                  Kejie Lu and
                  Yun Xiong and
                  Mi Wen},
  title        = {Practical black-box adversarial attack on open-set recognition: Towards
                  robust autonomous driving},
  journal      = {Peer Peer Netw. Appl.},
  volume       = {16},
  number       = {1},
  pages        = {295--311},
  year         = {2023},
  url          = {https://doi.org/10.1007/s12083-022-01390-9},
  doi          = {10.1007/S12083-022-01390-9},
  timestamp    = {Wed, 29 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/WangZLXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/DengZWWN23,
  author       = {Minjun Deng and
                  Kai Zhang and
                  Pengfei Wu and
                  Mi Wen and
                  Jianting Ning},
  title        = {{DCDPI:} Dynamic and Continuous Deep Packet Inspection in Secure Outsourced
                  Middleboxes},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {4},
  pages        = {3510--3524},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2023.3293134},
  doi          = {10.1109/TCC.2023.3293134},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/DengZWWN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiWSZ23,
  author       = {Weiwei Li and
                  Mi Wen and
                  Zhou Su and
                  Kuan Zhang},
  title        = {Collusion Detection and Trust Management for Indoor Navigation System
                  With Crowdsourcing},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {2913--2924},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3197639},
  doi          = {10.1109/TDSC.2022.3197639},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiWSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWNWL23,
  author       = {Kai Zhang and
                  Xiwen Wang and
                  Jianting Ning and
                  Mi Wen and
                  Rongxing Lu},
  title        = {Multi-Client Boolean File Retrieval With Adaptable Authorization Switching
                  for Secure Cloud Search Services},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4621--4636},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3227650},
  doi          = {10.1109/TDSC.2022.3227650},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangWNWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/XuWWLC23,
  author       = {Jiangwei Xu and
                  Liangliang Wang and
                  Mi Wen and
                  Yu Long and
                  Kefei Chen},
  title        = {{DPB-MA:} Low-Latency Message Authentication Scheme Based on Distributed
                  Verification and Priority in Vehicular Ad Hoc Network},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {4},
  pages        = {5152--5166},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2022.3225204},
  doi          = {10.1109/TVT.2022.3225204},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/XuWWLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/HeWLS23,
  author       = {Siying He and
                  Mi Wen and
                  Xiumin Li and
                  Zhou Su},
  title        = {An Approach for Attack Scenario Construction Based on Dynamic Attack
                  Path Graph},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233417},
  doi          = {10.1109/ICCC57788.2023.10233417},
  timestamp    = {Wed, 13 Sep 2023 08:43:35 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/HeWLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccchina/LiWHLW23,
  author       = {Xiumin Li and
                  Mi Wen and
                  Siying He and
                  Rongxing Lu and
                  Liangliang Wang},
  title        = {A Scheme for Robust Federated Learning with Privacy-preserving Based
                  on Krum {AGR}},
  booktitle    = {{IEEE/CIC} International Conference on Communications in China, {ICCC}
                  2023, Dalian, China, August 10-12, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCC57788.2023.10233385},
  doi          = {10.1109/ICCC57788.2023.10233385},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccchina/LiWHLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ieea/LiW23,
  author       = {Bailin Li and
                  Mi Wen},
  title        = {An Improved Traffic Forecasting Model based on Efficient Spatiotemporal
                  Graph Convolutional Network},
  booktitle    = {Proceedings of the 12th International Conference on Informatics, Environment,
                  Energy and Applications, {IEEA} 2023, Singapore, February 17-19, 2023},
  pages        = {48--51},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3594692.3594700},
  doi          = {10.1145/3594692.3594700},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ieea/LiW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ZhengLWLSW23,
  author       = {Jinkai Zheng and
                  Guanjie Li and
                  Wencong Wang and
                  Tom H. Luan and
                  Zhou Su and
                  Mi Wen},
  title        = {Long-term Incentive Mechanism for Federated Learning: {A} Dynamic
                  Repeated Game Approach},
  booktitle    = {34th {IEEE} Annual International Symposium on Personal, Indoor and
                  Mobile Radio Communications {PIMRC} 2023, Toronto, ON, Canada, September
                  5-8, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/PIMRC56721.2023.10294009},
  doi          = {10.1109/PIMRC56721.2023.10294009},
  timestamp    = {Mon, 13 Nov 2023 17:50:37 +0100},
  biburl       = {https://dblp.org/rec/conf/pimrc/ZhengLWLSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-09831,
  author       = {Zian Jia and
                  Yun Xiong and
                  Yuhong Nan and
                  Yao Zhang and
                  Jinjing Zhao and
                  Mi Wen},
  title        = {{MAGIC:} Detecting Advanced Persistent Threats via Masked Graph Representation
                  Learning},
  journal      = {CoRR},
  volume       = {abs/2310.09831},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.09831},
  doi          = {10.48550/ARXIV.2310.09831},
  eprinttype    = {arXiv},
  eprint       = {2310.09831},
  timestamp    = {Wed, 25 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-09831.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/WenXLWZ22,
  author       = {Mi Wen and
                  Rong Xie and
                  Kejie Lu and
                  Liangliang Wang and
                  Kai Zhang},
  title        = {FedDetect: {A} Novel Privacy-Preserving Federated Learning Framework
                  for Energy Theft Detection in Smart Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {8},
  pages        = {6069--6080},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3110784},
  doi          = {10.1109/JIOT.2021.3110784},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/WenXLWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/ChenWWZC22,
  author       = {Jiasheng Chen and
                  Liangliang Wang and
                  Mi Wen and
                  Kai Zhang and
                  Kefei Chen},
  title        = {Efficient Certificateless Online/Offline Signcryption Scheme for Edge
                  IoT Devices},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {11},
  pages        = {8967--8979},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3119513},
  doi          = {10.1109/JIOT.2021.3119513},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/ChenWWZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/WangWWCL22,
  author       = {Huiwen Wang and
                  Liangliang Wang and
                  Mi Wen and
                  Kefei Chen and
                  Yiyuan Luo},
  title        = {A Lightweight Certificateless Aggregate Ring Signature Scheme for
                  Privacy Protection in Smart Grids},
  journal      = {Wirel. Pers. Commun.},
  volume       = {126},
  number       = {2},
  pages        = {1577--1599},
  year         = {2022},
  url          = {https://doi.org/10.1007/s11277-022-09809-5},
  doi          = {10.1007/S11277-022-09809-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/WangWWCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GeWWX22,
  author       = {Jiangyan Ge and
                  Mi Wen and
                  Liangliang Wang and
                  Rong Xie},
  title        = {Attribute-Based Collaborative Access Control Scheme with Constant
                  Ciphertext Length for Smart Grid},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2022, Seoul,
                  Korea, May 16-20, 2022},
  pages        = {540--546},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICC45855.2022.9839086},
  doi          = {10.1109/ICC45855.2022.9839086},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GeWWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccde/WangWSWWM22,
  author       = {Binbin Wang and
                  Mi Wen and
                  Yan Song and
                  Liangliang Wang and
                  Zihan Wang and
                  Qifan Mao},
  title        = {MLPNeuzz: {A} Novel Neural Program Smoothing Method Based on Multi-Layer
                  Perceptron},
  booktitle    = {{ICCDE} 2022: The 8th International Conference on Computing and Data
                  Engineering, Bangkok, Thailand, January 11 - 13, 2022},
  pages        = {92--97},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3512850.3512862},
  doi          = {10.1145/3512850.3512862},
  timestamp    = {Wed, 20 Apr 2022 19:13:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iccde/WangWSWWM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/SunWZMC21,
  author       = {Chao Sun and
                  Mi Wen and
                  Kai Zhang and
                  Ping Meng and
                  Rongcheng Cui},
  title        = {Traffic sign detection algorithm based on feature expression enhancement},
  journal      = {Multim. Tools Appl.},
  volume       = {80},
  number       = {25},
  pages        = {33593--33614},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11042-021-11413-x},
  doi          = {10.1007/S11042-021-11413-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/SunWZMC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWLC21,
  author       = {Kai Zhang and
                  Mi Wen and
                  Rongxing Lu and
                  Kefei Chen},
  title        = {Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud
                  Storage with Owner-Enforced Authorization},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2875--2887},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.2968425},
  doi          = {10.1109/TDSC.2020.2968425},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangWLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LvWLL21,
  author       = {Huanhuan Lv and
                  Mi Wen and
                  Rongxing Lu and
                  Jinguo Li},
  title        = {An Adversarial Attack Based on Incremental Learning Techniques for
                  Unmanned in 6G Scenes},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {70},
  number       = {6},
  pages        = {5254--5264},
  year         = {2021},
  url          = {https://doi.org/10.1109/TVT.2021.3069426},
  doi          = {10.1109/TVT.2021.3069426},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/LvWLL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccir/WenZ21,
  author       = {Mi Wen and
                  Mu{-}qing Zhu},
  title        = {Text Content Tag Recommendation Algorithm Based on Knowledge Map Fusion
                  Reasoning},
  booktitle    = {{ICCIR} 2021: International Conference on Control and Intelligent
                  Robotics, Guangzhou, China, June 18-20, 2021},
  pages        = {740--745},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3473714.3473843},
  doi          = {10.1145/3473714.3473843},
  timestamp    = {Tue, 17 Aug 2021 14:19:48 +0200},
  biburl       = {https://dblp.org/rec/conf/iccir/WenZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhouLZWG20,
  author       = {Shaojing Zhou and
                  Jinguo Li and
                  Kai Zhang and
                  Mi Wen and
                  Qijie Guan},
  title        = {An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud
                  Workload With {VMD} and R-Transformer},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {115992--116003},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3004370},
  doi          = {10.1109/ACCESS.2020.3004370},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhouLZWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DingLWWL20,
  author       = {Pengpeng Ding and
                  Jinguo Li and
                  Mi Wen and
                  Liangliang Wang and
                  Hongjiao Li},
  title        = {Efficient BiSRU Combined With Feature Dimensionality Reduction for
                  Abnormal Traffic Detection},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {164414--164427},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3022355},
  doi          = {10.1109/ACCESS.2020.3022355},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DingLWWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/LiWZ20,
  author       = {Jinguo Li and
                  Mi Wen and
                  Kai Zhang},
  title        = {Cloud-assisted secure and conjunctive publish/subscribe service in
                  smart grids},
  journal      = {{IET} Inf. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {470--481},
  year         = {2020},
  url          = {https://doi.org/10.1049/iet-ifs.2019.0086},
  doi          = {10.1049/IET-IFS.2019.0086},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/LiWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/WuWLLL20,
  author       = {Jiale Wu and
                  Mi Wen and
                  Rongxing Lu and
                  Beibei Li and
                  Jinguo Li},
  title        = {Toward efficient and effective bullying detection in online social
                  network},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {13},
  number       = {5},
  pages        = {1567--1576},
  year         = {2020},
  url          = {https://doi.org/10.1007/s12083-019-00832-1},
  doi          = {10.1007/S12083-019-00832-1},
  timestamp    = {Mon, 12 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ppna/WuWLLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DingLWWG20,
  author       = {Pengpeng Ding and
                  Jinguo Li and
                  Liangliang Wang and
                  Mi Wen and
                  Yuyao Guan},
  title        = {{HYBRID-CNN:} An Efficient Scheme for Abnormal Flow Detection in the
                  SDN-Based Smart Grid},
  journal      = {Secur. Commun. Networks},
  volume       = {2020},
  pages        = {8850550:1--8850550:20},
  year         = {2020},
  url          = {https://doi.org/10.1155/2020/8850550},
  doi          = {10.1155/2020/8850550},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/DingLWWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/LvWLWL20,
  author       = {Huanhuan Lv and
                  Mi Wen and
                  Rongxing Lu and
                  Xuankai Wang and
                  Jinguo Li},
  title        = {An Adversarial Attack with Fusion of Polarization for Unmanned Scenes},
  booktitle    = {92nd {IEEE} Vehicular Technology Conference, {VTC} Fall 2020, Victoria,
                  BC, Canada, November 18 - December 16, 2020},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/VTC2020-Fall49728.2020.9348453},
  doi          = {10.1109/VTC2020-FALL49728.2020.9348453},
  timestamp    = {Mon, 20 Dec 2021 11:29:51 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/LvWLWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WenCLLC19,
  author       = {Mi Wen and
                  Shan Chen and
                  Rongxing Lu and
                  Beibei Li and
                  Sijia Chen},
  title        = {Security and Efficiency Enhanced Revocable Access Control for Fog-Based
                  Smart Grid System},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {137968--137981},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2942414},
  doi          = {10.1109/ACCESS.2019.2942414},
  timestamp    = {Mon, 12 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WenCLLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WangWCBL19,
  author       = {Liangliang Wang and
                  Mi Wen and
                  Kefei Chen and
                  Zhongqin Bi and
                  Yu Long},
  title        = {A new VRSA-based pairing-free certificateless signature scheme for
                  fog computing},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4919},
  doi          = {10.1002/CPE.4919},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/WangWCBL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JiangLXWDL19,
  author       = {Wenbo Jiang and
                  Hongwei Li and
                  Guowen Xu and
                  Mi Wen and
                  Guishan Dong and
                  Xiaodong Lin},
  title        = {{PTAS:} Privacy-preserving Thin-client Authentication Scheme in blockchain-based
                  {PKI}},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {96},
  pages        = {185--195},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.01.026},
  doi          = {10.1016/J.FUTURE.2019.01.026},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/JiangLXWDL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/YaoWLFZY19,
  author       = {Donghuan Yao and
                  Mi Wen and
                  Xiaohui Liang and
                  Zipeng Fu and
                  Kai Zhang and
                  Baojia Yang},
  title        = {Energy Theft Detection With Energy Privacy Preservation in the Smart
                  Grid},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {5},
  pages        = {7659--7669},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2903312},
  doi          = {10.1109/JIOT.2019.2903312},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/YaoWLFZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LiW0LLL19,
  author       = {Jinguo Li and
                  Mi Wen and
                  Kui Wu and
                  Kejie Lu and
                  Fengyong Li and
                  Hongjiao Li},
  title        = {Secure, flexible and high-efficient similarity search over encrypted
                  data in multiple clouds},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {12},
  number       = {4},
  pages        = {893--911},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12083-018-0691-8},
  doi          = {10.1007/S12083-018-0691-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LiW0LLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/XuLLWL19,
  author       = {Guowen Xu and
                  Hongwei Li and
                  Sen Liu and
                  Mi Wen and
                  Rongxing Lu},
  title        = {Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing
                  Systems},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {68},
  number       = {4},
  pages        = {3854--3865},
  year         = {2019},
  url          = {https://doi.org/10.1109/TVT.2019.2895834},
  doi          = {10.1109/TVT.2019.2895834},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/XuLLWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/WangWLFLC19,
  author       = {Xuankai Wang and
                  Mi Wen and
                  Jinguo Li and
                  Zipeng Fu and
                  Rongxing Lu and
                  Kefei Chen},
  title        = {Adversarial attack against scene recognition system for unmanned vehicles},
  booktitle    = {Proceedings of the {ACM} Turing Celebration Conference - China, {ACM}
                  {TUR-C} 2019, Chengdu, China, May 17-19, 2019},
  pages        = {65:1--65:6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321408.3321571},
  doi          = {10.1145/3321408.3321571},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/acmturc/WangWLFLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/GongLXLW19,
  author       = {Li Gong and
                  Hongwei Li and
                  Guowen Xu and
                  Xizhao Luo and
                  Mi Wen},
  title        = {Multi-Keyword Search Guaranteeing Forward and Backward Privacy over
                  Large-Scale Cloud Data},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9014190},
  doi          = {10.1109/GLOBECOM38437.2019.9014190},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/GongLXLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/ChenWLLC19,
  author       = {Shan Chen and
                  Mi Wen and
                  Rongxing Lu and
                  Jinguo Li and
                  Sijia Chen},
  title        = {Achieve Revocable Access Control for Fog-Based Smart Grid System},
  booktitle    = {90th {IEEE} Vehicular Technology Conference, {VTC} Fall 2019, Honolulu,
                  HI, USA, September 22-25, 2019},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/VTCFall.2019.8891162},
  doi          = {10.1109/VTCFALL.2019.8891162},
  timestamp    = {Mon, 20 Dec 2021 11:29:04 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/ChenWLLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LiWZYLW18,
  author       = {Fengyong Li and
                  Kui Wu and
                  Xinpeng Zhang and
                  Jiang Yu and
                  Jingsheng Lei and
                  Mi Wen},
  title        = {Robust Batch Steganography in Social Networks With Non-Uniform Payload
                  and Data Decomposition},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {29912--29925},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2841415},
  doi          = {10.1109/ACCESS.2018.2841415},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LiWZYLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/LiWLWR18,
  author       = {Fengyong Li and
                  Kui Wu and
                  Jingsheng Lei and
                  Mi Wen and
                  Yanli Ren},
  title        = {Unsupervised steganalysis over social networks based on multi-reference
                  sub-image sets},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {14},
  pages        = {17953--17971},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4759-x},
  doi          = {10.1007/S11042-017-4759-X},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/LiWLWR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LiWLR18,
  author       = {Fengyong Li and
                  Mi Wen and
                  Jingsheng Lei and
                  Yanli Ren},
  title        = {Efficient steganographer detection over social networks with sampling
                  reconstruction},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {11},
  number       = {5},
  pages        = {924--939},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12083-017-0603-3},
  doi          = {10.1007/S12083-017-0603-3},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LiWLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/Li0ZLW18,
  author       = {Fengyong Li and
                  Kui Wu and
                  Xinpeng Zhang and
                  Jingsheng Lei and
                  Mi Wen},
  title        = {Multi-Source Stego Detection with Low-Dimensional Textural Feature
                  and Clustering Ensembles},
  journal      = {Symmetry},
  volume       = {10},
  number       = {5},
  pages        = {128},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10050128},
  doi          = {10.3390/SYM10050128},
  timestamp    = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/symmetry/Li0ZLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/JiangLXWDL18,
  author       = {Wenbo Jiang and
                  Hongwei Li and
                  Guowen Xu and
                  Mi Wen and
                  Guishan Dong and
                  Xiaodong Lin},
  title        = {A Privacy-Preserving Thin-Client Scheme in Blockchain-Based {PKI}},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8647852},
  doi          = {10.1109/GLOCOM.2018.8647852},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/JiangLXWDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WenYLL18,
  author       = {Mi Wen and
                  Donghuan Yao and
                  Beibei Li and
                  Rongxing Lu},
  title        = {State Estimation Based Energy Theft Detection Scheme with Privacy
                  Preservation in Smart Grid},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422731},
  doi          = {10.1109/ICC.2018.8422731},
  timestamp    = {Mon, 12 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WenYLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ZhangWLL17,
  author       = {Xu Zhang and
                  Mi Wen and
                  Kejie Lu and
                  Jingsheng Lei},
  title        = {A privacy-aware data dissemination scheme for smart grid with abnormal
                  data traceability},
  journal      = {Comput. Networks},
  volume       = {117},
  pages        = {32--41},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2016.11.009},
  doi          = {10.1016/J.COMNET.2016.11.009},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ZhangWLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/SuXHWG17,
  author       = {Zhou Su and
                  Qichao Xu and
                  Yilong Hui and
                  Mi Wen and
                  Song Guo},
  title        = {A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery
                  in Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {66},
  number       = {7},
  pages        = {6461--6474},
  year         = {2017},
  url          = {https://doi.org/10.1109/TVT.2016.2630300},
  doi          = {10.1109/TVT.2016.2630300},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/SuXHWG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WangWCBL17,
  author       = {Liangliang Wang and
                  Mi Wen and
                  Kefei Chen and
                  Zhongqin Bi and
                  Yu Long},
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {An Efficient and Provably Secure Pairing-Free Certificateless Signature
                  Scheme Based on Variant of {RSA}},
  booktitle    = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  pages        = {248--266},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9\_19},
  doi          = {10.1007/978-3-319-69471-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/css/WangWCBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/WenZLL17,
  author       = {Mi Wen and
                  Xu Zhang and
                  Hongwei Li and
                  Jinguo Li},
  title        = {A Data Aggregation Scheme with Fine-Grained Access Control for the
                  Smart Grid},
  booktitle    = {86th {IEEE} Vehicular Technology Conference, {VTC} Fall 2017, Toronto,
                  ON, Canada, September 24-27, 2017},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/VTCFall.2017.8288161},
  doi          = {10.1109/VTCFALL.2017.8288161},
  timestamp    = {Mon, 20 Dec 2021 11:29:16 +0100},
  biburl       = {https://dblp.org/rec/conf/vtc/WenZLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiWZ16,
  author       = {Jinguo Li and
                  Mi Wen and
                  Tao Zhang},
  title        = {Group-Based Authentication and Key Agreement With Dynamic Policy Updating
                  for {MTC} in {LTE-A} Networks},
  journal      = {{IEEE} Internet Things J.},
  volume       = {3},
  number       = {3},
  pages        = {408--417},
  year         = {2016},
  url          = {https://doi.org/10.1109/JIOT.2015.2495321},
  doi          = {10.1109/JIOT.2015.2495321},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/LiWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WenZLLDS16,
  author       = {Mi Wen and
                  Kuan Zhang and
                  Jingsheng Lei and
                  Xiaohui Liang and
                  Ruilong Deng and
                  Xuemin (Sherman) Shen},
  title        = {{CIT:} {A} credit-based incentive tariff scheme with fraud-traceability
                  for smart grid},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {9},
  pages        = {823--832},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.895},
  doi          = {10.1002/SEC.895},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WenZLLDS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiWLG16,
  author       = {Jinguo Li and
                  Mi Wen and
                  Kejie Lu and
                  Chunhua Gu},
  title        = {{PIMRS:} achieving privacy and integrity-preserving multi-owner ranked-keyword
                  search over encrypted cloud data},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {16},
  pages        = {3765--3776},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1482},
  doi          = {10.1002/SEC.1482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiWLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiWLWBG16,
  author       = {Fengyong Li and
                  Kui Wu and
                  Jingsheng Lei and
                  Mi Wen and
                  Zhongqin Bi and
                  Chunhua Gu},
  title        = {Steganalysis Over Large-Scale Social Networks With High-Order Joint
                  Features and Clustering Ensembles},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {2},
  pages        = {344--357},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2496910},
  doi          = {10.1109/TIFS.2015.2496910},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiWLWBG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LiWGL16,
  author       = {Jinguo Li and
                  Mi Wen and
                  Chunhua Gu and
                  Hongwei Li},
  title        = {{PSS:} Achieving high-efficiency and privacy-preserving similarity
                  search in multiple clouds},
  booktitle    = {2016 {IEEE} International Conference on Communications, {ICC} 2016,
                  Kuala Lumpur, Malaysia, May 22-27, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICC.2016.7511324},
  doi          = {10.1109/ICC.2016.7511324},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LiWGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/LiYYW15,
  author       = {Hongwei Li and
                  Yi Yang and
                  Haomiao Yang and
                  Mi Wen},
  title        = {Achieving efficient and privacy-preserving multi-feature search for
                  mobile sensing},
  journal      = {Comput. Commun.},
  volume       = {65},
  pages        = {35--42},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comcom.2015.02.006},
  doi          = {10.1016/J.COMCOM.2015.02.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/LiYYW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/WenLBL15,
  author       = {Mi Wen and
                  Jingsheng Lei and
                  Zhongqin Bi and
                  Jing Li},
  title        = {{EAPA:} An efficient authentication protocol against pollution attack
                  for smart grid},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {8},
  number       = {6},
  pages        = {1082--1089},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12083-014-0283-1},
  doi          = {10.1007/S12083-014-0283-1},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/WenLBL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/WenOLLGS15,
  author       = {Mi Wen and
                  Kaoru Ota and
                  He Li and
                  Jingsheng Lei and
                  Chunhua Gu and
                  Zhou Su},
  title        = {Secure Data Deduplication With Reliable Key Management for Dynamic
                  Updates in {CPSS}},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {2},
  number       = {4},
  pages        = {137--147},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCSS.2015.2514088},
  doi          = {10.1109/TCSS.2015.2514088},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcss/WenOLLGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/XuWL15,
  author       = {Lin Xu and
                  Mi Wen and
                  Jinguo Li},
  title        = {A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor
                  Networks},
  booktitle    = {{IEEE} Conference on Collaboration and Internet Computing, {CIC} 2015,
                  Hangzhou, China, October 27-30, 2015},
  pages        = {200--204},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CIC.2015.16},
  doi          = {10.1109/CIC.2015.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/XuWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/HovhannisyanLYQ15,
  author       = {Hermine Hovhannisyan and
                  Kejie Lu and
                  Rongwei Yang and
                  Wen Qi and
                  Jianping Wang and
                  Mi Wen},
  title        = {A Novel Deduplication-Based Covert Channel in Cloud Storage Service},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417228},
  doi          = {10.1109/GLOCOM.2014.7417228},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/HovhannisyanLYQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/WenLLLL15,
  author       = {Mi Wen and
                  Kejie Lu and
                  Jingsheng Lei and
                  Fengyong Li and
                  Jing Li},
  title        = {{BDO-SD:} An efficient scheme for big data outsourcing with secure
                  deduplication},
  booktitle    = {2015 {IEEE} Conference on Computer Communications Workshops, {INFOCOM}
                  Workshops, Hong Kong, China, April 26 - May 1, 2015},
  pages        = {214--219},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/INFCOMW.2015.7179387},
  doi          = {10.1109/INFCOMW.2015.7179387},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/WenLLLL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/LiLWGY15,
  author       = {Jinguo Li and
                  Yaping Lin and
                  Mi Wen and
                  Chunhua Gu and
                  Bo Yin},
  editor       = {Kuai Xu and
                  Haojin Zhu},
  title        = {Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 10th International
                  Conference, {WASA} 2015, Qufu, China, August 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9204},
  pages        = {325--334},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-21837-3\_32},
  doi          = {10.1007/978-3-319-21837-3\_32},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/LiLWGY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/WenLLLS14,
  author       = {Mi Wen and
                  Rongxing Lu and
                  Xiaohui Liang and
                  Jingsheng Lei and
                  Xuemin (Sherman) Shen},
  title        = {Querying over Encrypted Data in Smart Grids},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06355-3},
  doi          = {10.1007/978-3-319-06355-3},
  isbn         = {978-3-319-06354-6},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/sbcs/WenLLLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itiis/LiYWLL14,
  author       = {Hongwei Li and
                  Yi Yang and
                  Mi Wen and
                  Hongwei Luo and
                  Rongxing Lu},
  title        = {{EMRQ:} An Efficient Multi-keyword Range Query Scheme in Smart Grid
                  Auction Market},
  journal      = {{KSII} Trans. Internet Inf. Syst.},
  volume       = {8},
  number       = {11},
  pages        = {3937--3954},
  year         = {2014},
  url          = {https://doi.org/10.3837/tiis.2014.11.015},
  doi          = {10.3837/TIIS.2014.11.015},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/itiis/LiYWLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WenLLLLS14,
  author       = {Mi Wen and
                  Rongxing Lu and
                  Jingsheng Lei and
                  Hongwei Li and
                  Xiaohui Liang and
                  Xuemin (Sherman) Shen},
  title        = {{SESA:} an efficient searchable encryption scheme for auction in emerging
                  smart grid marketing},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {1},
  pages        = {234--244},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.699},
  doi          = {10.1002/SEC.699},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WenLLLLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YangLLYW14,
  author       = {Yi Yang and
                  Hongwei Li and
                  Wenchao Liu and
                  Haomiao Yao and
                  Mi Wen},
  title        = {Secure dynamic searchable symmetric encryption with constant document
                  update cost},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2014, Austin,
                  TX, USA, December 8-12, 2014},
  pages        = {775--780},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7036902},
  doi          = {10.1109/GLOCOM.2014.7036902},
  timestamp    = {Mon, 17 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YangLLYW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/YangLWLL14,
  author       = {Yi Yang and
                  Hongwei Li and
                  Mi Wen and
                  Hongwei Luo and
                  Rongxing Lu},
  title        = {Achieving ranked range query in smart grid auction market},
  booktitle    = {{IEEE} International Conference on Communications, {ICC} 2014, Sydney,
                  Australia, June 10-14, 2014},
  pages        = {951--956},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICC.2014.6883442},
  doi          = {10.1109/ICC.2014.6883442},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/YangLWLL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/WenLB13,
  author       = {Mi Wen and
                  Jingsheng Lei and
                  Zhongqin Bi},
  title        = {{SSE:} {A} Secure Searchable Encryption Scheme for Urban Sensing and
                  Querying},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {9},
  year         = {2013},
  url          = {https://doi.org/10.1155/2013/302147},
  doi          = {10.1155/2013/302147},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdsn/WenLB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/WenLZLLS13,
  author       = {Mi Wen and
                  Rongxing Lu and
                  Kuan Zhang and
                  Jingsheng Lei and
                  Xiaohui Liang and
                  Xuemin Shen},
  title        = {PaRQ: {A} Privacy-Preserving Range Query Scheme Over Encrypted Metering
                  Data for Smart Grid},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {178--191},
  year         = {2013},
  url          = {https://doi.org/10.1109/TETC.2013.2273889},
  doi          = {10.1109/TETC.2013.2273889},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/WenLZLLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WenLLLLS13,
  author       = {Mi Wen and
                  Rongxing Lu and
                  Jingsheng Lei and
                  Xiaohui Liang and
                  Hongwei Li and
                  Xuemin Shen},
  title        = {{ECQ:} An Efficient Conjunctive Query scheme over encrypted multidimensional
                  data in smart grid},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {796--801},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831170},
  doi          = {10.1109/GLOCOM.2013.6831170},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/WenLLLLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wsn/WenYLW10,
  author       = {Mi Wen and
                  Zhi Yin and
                  Yu Long and
                  Yong Wang},
  title        = {An Adaptive Key Management Framework for the Wireless Mesh and Sensor
                  Networks},
  journal      = {Wirel. Sens. Netw.},
  volume       = {2},
  number       = {9},
  pages        = {689--697},
  year         = {2010},
  url          = {https://doi.org/10.4236/wsn.2010.29083},
  doi          = {10.4236/WSN.2010.29083},
  timestamp    = {Wed, 25 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/wsn/WenYLW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eforensics/WangGXWD10,
  author       = {Yong Wang and
                  Dawu Gu and
                  Jianping Xu and
                  Mi Wen and
                  Liwen Deng},
  editor       = {Xuejia Lai and
                  Dawu Gu and
                  Bo Jin and
                  Yongquan Wang and
                  Hui Li},
  title        = {{RICB:} Integer Overflow Vulnerability Dynamic Analysis via Buffer
                  Overflow},
  booktitle    = {Forensics in Telecommunications, Information, and Multimedia - Third
                  International {ICST} Conference, e-Forensics 2010, Shanghai, China,
                  November 11-12, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {56},
  pages        = {99--109},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-23602-0\_9},
  doi          = {10.1007/978-3-642-23602-0\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eforensics/WangGXWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/WangGWLX10,
  author       = {Yong Wang and
                  Dawu Gu and
                  Mi Wen and
                  Haming Li and
                  Jianping Xu},
  editor       = {Liqing Zhang and
                  Bao{-}Liang Lu and
                  James Tin{-}Yau Kwok},
  title        = {Classification of Malicious Software Behaviour Detection with Hybrid
                  Set Based Feed Forward Neural Network},
  booktitle    = {Advances in Neural Networks - {ISNN} 2010, 7th International Symposium
                  on Neural Networks, {ISNN} 2010, Shanghai, China, June 6-9, 2010,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6064},
  pages        = {556--565},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13318-3\_69},
  doi          = {10.1007/978-3-642-13318-3\_69},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/isnn/WangGWLX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/WangGWXL10,
  author       = {Yong Wang and
                  Dawu Gu and
                  Mi Wen and
                  Jianping Xu and
                  Haming Li},
  editor       = {Liqing Zhang and
                  Bao{-}Liang Lu and
                  James Tin{-}Yau Kwok},
  title        = {Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward
                  Neural Network},
  booktitle    = {Advances in Neural Networks - {ISNN} 2010, 7th International Symposium
                  on Neural Networks, {ISNN} 2010, Shanghai, China, June 6-9, 2010,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6064},
  pages        = {576--585},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13318-3\_71},
  doi          = {10.1007/978-3-642-13318-3\_71},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isnn/WangGWXL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/swarm/WangRXWD10,
  author       = {Yong Wang and
                  Da Ruan and
                  Jianping Xu and
                  Mi Wen and
                  Liwen Deng},
  editor       = {Ying Tan and
                  Yuhui Shi and
                  Kay Chen Tan},
  title        = {Computational Intelligence Algorithms Analysis for Smart Grid Cyber
                  Security},
  booktitle    = {Advances in Swarm Intelligence, First International Conference, {ICSI}
                  2010, Beijing, China, June 12-15, 2010, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6146},
  pages        = {77--84},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13498-2\_11},
  doi          = {10.1007/978-3-642-13498-2\_11},
  timestamp    = {Tue, 11 Jul 2023 08:21:50 +0200},
  biburl       = {https://dblp.org/rec/conf/swarm/WangRXWD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/WenZYCQ09,
  author       = {Mi Wen and
                  Yanfei Zheng and
                  Wen{-}jun Ye and
                  Kefei Chen and
                  Weidong Qiu},
  title        = {A key management protocol with robust continuity for sensor networks},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {4},
  pages        = {642--647},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.06.005},
  doi          = {10.1016/J.CSI.2008.06.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/WenZYCQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/WenDZC09,
  author       = {Mi Wen and
                  Ling Dong and
                  Yanfei Zheng and
                  Kefei Chen},
  title        = {Towards Provable Security for Data Transmission Protocols in Sensor
                  Network},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {25},
  number       = {1},
  pages        = {319--333},
  year         = {2009},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2009/200901\_18.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/WenDZC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DongCLW09,
  author       = {Ling Dong and
                  Kefei Chen and
                  Xuejia Lai and
                  Mi Wen},
  title        = {When is a key establishment protocol correct?},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {6},
  pages        = {567--579},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.100},
  doi          = {10.1002/SEC.100},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DongCLW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/QiuZZZWG09,
  author       = {Weidong Qiu and
                  Yaowei Zhou and
                  Bo Zhu and
                  Yanfei Zheng and
                  Mi Wen and
                  Zheng Gong},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Key-Insulated Encryption Based Key Pre-distribution Scheme for {WSN}},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {200--209},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_21},
  doi          = {10.1007/978-3-642-02617-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/QiuZZZWG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wism/WenLTTCQ09,
  author       = {Mi Wen and
                  Jingsheng Lei and
                  Zhong Tang and
                  Xiuxia Tian and
                  Kefei Chen and
                  Weidong Qiu},
  editor       = {Wenyin Liu and
                  Xiangfeng Luo and
                  Fu Lee Wang and
                  Jingsheng Lei},
  title        = {A Verified Group Key Agreement Protocol for Resource-Constrained Sensor
                  Networks},
  booktitle    = {Web Information Systems and Mining, International Conference, {WISM}
                  2009, Shanghai, China, November 7-8, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5854},
  pages        = {413--425},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05250-7\_44},
  doi          = {10.1007/978-3-642-05250-7\_44},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/wism/WenLTTCQ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/WenDZC07,
  author       = {Mi Wen and
                  Ling Dong and
                  Yanfei Zheng and
                  Kefei Chen},
  editor       = {Christopher C. Yang and
                  Daniel Dajun Zeng and
                  Michael Chau and
                  Kuiyu Chang and
                  Qing Yang and
                  Xueqi Cheng and
                  Jue Wang and
                  Fei{-}Yue Wang and
                  Hsinchun Chen},
  title        = {A Framework for Proving the Security of Data Transmission Protocols
                  in Sensor Network},
  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}
                  2007, Chengdu, China, April 11-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4430},
  pages        = {288--294},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71549-8\_30},
  doi          = {10.1007/978-3-540-71549-8\_30},
  timestamp    = {Fri, 18 Oct 2019 12:58:35 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/WenDZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/LiZWC07,
  author       = {Hui Li and
                  Yanfei Zheng and
                  Mi Wen and
                  Kefei Chen},
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {A Secure Time Synchronization Protocol for Sensor Network},
  booktitle    = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  pages        = {515--526},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3\_52},
  doi          = {10.1007/978-3-540-77018-3\_52},
  timestamp    = {Fri, 09 Apr 2021 17:11:17 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/LiZWC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/WenZLC07,
  author       = {Mi Wen and
                  Yanfei Zheng and
                  Hui Li and
                  Kefei Chen},
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {A Hierarchical Composition of {LU} Matrix-Based Key Distribution Scheme
                  for Sensor Networks},
  booktitle    = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  pages        = {608--620},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3\_60},
  doi          = {10.1007/978-3-540-77018-3\_60},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/WenZLC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/DongCWZ07,
  author       = {Ling Dong and
                  Kefei Chen and
                  Mi Wen and
                  Yanfei Zheng},
  editor       = {Wenying Feng and
                  Feng Gao},
  title        = {Protocol Engineering Principles for Cryptographic Protocols Design},
  booktitle    = {Proceedings of the 8th {ACIS} International Conference on Software
                  Engineering, Artificial Intelligence, Networking and Parallel/Distributed
                  Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China},
  pages        = {641--646},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SNPD.2007.441},
  doi          = {10.1109/SNPD.2007.441},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/DongCWZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icsnc/LiCZW06,
  author       = {Hui Li and
                  Kefei Chen and
                  Yanfei Zheng and
                  Mi Wen},
  title        = {A Locally Group Key Management with Revocation and Self-healing Capability
                  for Sensor Networks},
  booktitle    = {Proceedings of the International Conference on Systems and Networks
                  Communications {(ICSNC} 2006), October 29 - November 3, 2006, Papeete,
                  Tahiti, French Polynesia},
  pages        = {29},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICSNC.2006.3},
  doi          = {10.1109/ICSNC.2006.3},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icsnc/LiCZW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics