フォロー
Anxi Wang
Anxi Wang
確認したメール アドレス: nuist.edu.cn
タイトル
引用先
引用先
An efficient centroid-based routing protocol for energy management in WSN-assisted IoT
J Shen, A Wang, C Wang, PCK Hung, CF Lai
Ieee Access 5, 18469-18479, 2017
1812017
Organized topology based routing protocol in incompletely predictable ad-hoc networks
J Shen, C Wang, A Wang, X Sun, S Moh, PCK Hung
Computer Communications 99, 107-118, 2017
302017
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
J Shen, H Yang, A Wang, T Zhou, C Wang
Peer-to-Peer Networking and Applications 12 (4), 924-933, 2019
182019
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks
D Liu, J Shen, A Wang, C Wang
International Journal of Sensor Networks 27 (2), 95-102, 2018
182018
Performance comparison of typical and improved LEACH protocols in wireless sensor network
J Shen, A Wang, C Wang, Y Ren, J Wang
2015 first international conference on computational intelligence theory …, 2015
182015
Secure big data communication for energy efficient intra-cluster in WSNs
A Wang, J Shen, P Vijayakumar, Y Zhu, L Tian
Information Sciences 505, 586-599, 2019
172019
A searchable and verifiable data protection scheme for scholarly big data
J Shen, C Wang, A Wang, S Ji, Y Zhang
IEEE Transactions on Emerging Topics in Computing 9 (1), 216-225, 2018
162018
Direction density-based secure routing protocol for healthcare data in incompletely predictable networks
J Shen, C Wang, CF Lai, A Wang, HC Chao
IEEE Access 4, 9163-9173, 2016
162016
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security
D Liu, J Shen, P Vijayakumar, A Wang, T Zhou
Multimedia Tools and Applications 79 (15), 10851-10870, 2020
142020
Identity-based fast authentication scheme for smart mobile devices in body area networks
C Wang, W Zheng, S Ji, Q Liu, A Wang
Wireless Communications and Mobile Computing 2018, 2018
132018
Content-centric group user authentication for secure social networks
J Shen, A Wang, C Wang, J Li, Y Zhang
IEEE Transactions on Emerging Topics in Computing 8 (3), 833-844, 2017
132017
Moving centroid based routing protocol for incompletely predictable cyber devices in cyber-physical-social distributed systems
J Shen, C Wang, A Wang, Q Liu, Y Xiang
Future Generation Computer Systems 108, 1129-1139, 2020
112020
Anonymous data collection scheme for cloud-aided mobile edge networks
A Wang, J Shen, C Wang, H Yang, D Liu
Digital Communications and Networks 6 (2), 223-228, 2020
102020
Secure real-time image protection scheme with near-duplicate detection in cloud computing
D Liu, J Shen, A Wang, C Wang
Journal of Real-Time Image Processing 17 (1), 175-184, 2020
102020
Random-forest based adjusting method for wind forecast of WRF model
A Wang, L Xu, Y Li, J Xing, X Chen, K Liu, Y Liang, Z Zhou
Computers & Geosciences 155, 104842, 2021
82021
Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing
D Liu, J Shen, Y Chen, C Wang, T Zhou, A Wang
International conference on information security and cryptology, 223-239, 2018
52018
A RFID based localization algorithm applying trilateration for wireless sensor networks
J Shen, A Wang, C Wang, NN Xiong
Journal of Internet Technology 18 (5), 1167-1175, 2017
52017
A novel clustering solution for wireless sensor networks
A Wang, S Pan, C Wang, J Shen, D Liu
International Conference on Green, Pervasive, and Cloud Computing, 313-322, 2017
52017
A Fibonacci based batch auditing protocol for cloud data
J Shen, J Shen, C Wang, A Wang
International Symposium on Cyberspace Safety and Security, 215-222, 2017
42017
A privacy-protecting and resource-saving scheme for data sharing in smart home
H Yang, W Zheng, T Zhou, X Jin, A Wang
Journal of Internet Technology 20 (2), 607-615, 2019
32019
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20