


default search action
Guojun Wang 0001
Guo-Jun Wang 0001
Person information
- affiliation: Guangzhou University, School of Computer Science and Technology, China
- affiliation (former): Hong Kong Polytechnic University
- affiliation (PhD 2002): Central South University, Changsha, China
Other persons with the same name
- Guojun Wang (aka: Guo-Jun Wang, GuoJun Wang) — disambiguation page
- Guojun Wang 0002
— Jilin University, State Key Laboratory of Automotive Simulation and Control, Changchun, China
- Guojun Wang 0003
— Jilin University, School of Transportation, Changchun, China
- Guojun Wang 0004 — Shaanxi Normal University, Xi'an, China
- Guojun Wang 0005
— Chinese Academy of Sciences, Institute of Semiconductors, Beijing, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j253]Peiqiang Li
, Guojun Wang
, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Yuheng Zhang
:
EAOS: Exposing attacks in smart contracts through analyzing opcode sequences with operands. Comput. Networks 257: 110959 (2025) - [j252]Zhimin Liu
, Shukun Liu, Weijia Jia, Guojun Wang, Mingfeng Su
:
Prediction of k-view coverage for objects in camera sensor networks under complex environments. Comput. Networks 259: 111085 (2025) - [j251]Shaobo Zhang
, Yimeng Pan
, Qin Liu
, Zheng Yan
, Kim-Kwang Raymond Choo
, Guojun Wang
:
Backdoor Attacks and Defenses Targeting Multi-Domain AI Models: A Comprehensive Review. ACM Comput. Surv. 57(4): 87:1-87:35 (2025) - [j250]Zhidong Xie, Tao Peng
, Wei You, Guojun Wang, Qin Liu, Entao Luo:
P2-TaskMP: Privacy-Preserving Task Allocation Optimization Based on Mobility Prediction. Future Gener. Comput. Syst. 167: 107720 (2025) - [j249]Wanyi Gu, Guojun Wang
, Peiqiang Li, Guangxin Zhai, Xubin Li:
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model. Int. J. Inf. Sec. 24(1): 33 (2025) - [j248]Shaobo Zhang
, Wenli Chen, Xiong Li, Qin Liu, Guojun Wang
:
APBAM: Adversarial perturbation-driven backdoor attack in multimodal learning. Inf. Sci. 700: 121847 (2025) - 2024
- [j247]Peiqiang Li
, Guojun Wang, Guangxin Zhai, Wanyi Gu
, Xubin Li, Xiangyong Liu
, Yuheng Zhang
:
Bi-thresholds-based unknown vulnerability detection in smart contracts using multi-classification model. Comput. Electr. Eng. 120: 109682 (2024) - [j246]Zhenshen Ou, Xiaofei Xing
, Siqi He, Guojun Wang:
TDS-NA: Blockchain-based trusted data sharing scheme with PKI authentication. Comput. Commun. 218: 240-252 (2024) - [j245]Peiqiang Li, Guo-Jun Wang, Xiaofei Xing
, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
Detecting abnormal behaviors in smart contracts using opcode sequences. Comput. Commun. 220: 12-22 (2024) - [j244]Peiqiang Li, Guojun Wang, Xiaofei Xing
, Xiangbin Li, Jinyao Zhu:
Detecting unknown vulnerabilities in smart contracts using opcode sequences. Connect. Sci. 36(1) (2024) - [j243]Tao Peng
, Wentao Zhong
, Guojun Wang
, Shaobo Zhang
, Entao Luo, Tian Wang
:
Spatiotemporal-Aware Privacy-Preserving Task Matching in Mobile Crowdsensing. IEEE Internet Things J. 11(2): 2394-2406 (2024) - [j242]Shaobo Zhang
, Qi Liu, Tian Wang, Wei Liang
, Kuan-Ching Li
, Guojun Wang
:
FSAIR: Fine-Grained Secure Approximate Image Retrieval for Mobile Cloud Computing. IEEE Internet Things J. 11(13): 23297-23308 (2024) - [j241]Haroon Elahi
, Guojun Wang
:
Forward-porting and its limitations in fuzzer evaluation. Inf. Sci. 662: 120142 (2024) - [j240]Tao Peng
, Wei You
, Kejian Guan
, Entao Luo
, Shaobo Zhang, Guojun Wang
, Tian Wang
, Youke Wu
:
Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing. J. Netw. Comput. Appl. 224: 103836 (2024) - [j239]Shuhong Chen
, Jiawei Yang, Guojun Wang, Zijia Wang, Haojie Yin, Yinglin Feng:
CLFLDP: Communication-efficient layer clipping federated learning with local differential privacy. J. Syst. Archit. 148: 103067 (2024) - [j238]Jiawei Yang, Shuhong Chen
, Guojun Wang, Zijia Wang, Zhiyong Jie, Muhammad Arif:
GFL-ALDPA: a gradient compression federated learning framework based on adaptive local differential privacy budget allocation. Multim. Tools Appl. 83(9): 26349-26368 (2024) - [j237]Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai:
A smart contract vulnerability detection method based on deep learning with opcode sequences. Peer Peer Netw. Appl. 17(5): 3222-3238 (2024) - [j236]Mingfeng Su
, Guojun Wang
, Jianer Chen:
Efficient task offloading with swarm intelligence evolution for edge-cloud collaboration in vehicular edge computing. Softw. Pract. Exp. 54(10): 1888-1915 (2024) - [j235]Muhammad Faizan Khan
, Guojun Wang
, Zhigao Zheng
, Xiangyong Liu
:
Toward Hybrid Wi-Fi HaLow Radar CSI Coverage Estimation in Collapsed Structures. IEEE Trans. Consumer Electron. 70(3): 5201-5216 (2024) - [j234]Haroon Elahi
, Guojun Wang
, Wenjun Jiang
, Alexandre Bartel, Yves Le Traon
:
A Qualitative Study of App Acquisition and Management. IEEE Trans. Comput. Soc. Syst. 11(2): 1907-1925 (2024) - [j233]Qin Liu
, Yu Peng
, Qian Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
, Shaobo Zhang
:
$\mathsf{MARS}$MARS: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments. IEEE Trans. Dependable Secur. Comput. 21(4): 1994-2011 (2024) - [j232]Lei Zhou
, Fengwei Zhang
, Kevin Leach
, Xuhua Ding
, Zhenyu Ning
, Guojun Wang
, Jidong Xiao
:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 2085-2098 (2024) - [j231]Tao Peng
, Wentao Zhong
, Guojun Wang, Entao Luo
, Shui Yu
, Yi-Ning Liu
, Yi Yang, Xuyun Zhang
:
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing. IEEE Trans. Intell. Transp. Syst. 25(7): 7767-7779 (2024) - [j230]Qin Liu
, Yu Peng
, Ziyi Tang
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
veffChain: Enabling Freshness Authentication of Rich Queries Over Blockchain Databases. IEEE Trans. Knowl. Data Eng. 36(5): 2285-2300 (2024) - [j229]Qin Liu
, Yu Peng
, Mingzuo Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain. IEEE Trans. Knowl. Data Eng. 36(7): 3297-3311 (2024) - [j228]Qin Liu
, Yu Peng
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing. IEEE Trans. Mob. Comput. 23(5): 4181-4195 (2024) - [j227]Shulan Wang
, Qin Liu
, Yang Xu
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
Protecting Inference Privacy With Accuracy Improvement in Mobile-Cloud Deep Learning. IEEE Trans. Mob. Comput. 23(6): 6522-6537 (2024) - [j226]Yang Xu
, Shihao Xiao, Huiling Wang, Cheng Zhang
, Zhifei Ni
, Wenjun Zhao, Guojun Wang
:
Redactable Blockchain-Based Secure and Accountable Data Management. IEEE Trans. Netw. Serv. Manag. 21(2): 1764-1776 (2024) - [c263]Xuelei Liu, Guojun Wang, Mingfei Chen, Peiqiang Li, Jinyao Zhu:
A Vulnerability Detection Method for Smart Contract Using Opcode Sequences with Variable Length. ICIC (8) 2024: 369-380 - [c262]Panyang Zhou, Xiaofei Xing, Xiao Wang, Tian Wang, Guojun Wang:
Adaptive Task Offloading in High-Speed Vehicular Networks Using Enhanced D3QN Algorithm. ISPA 2024: 607-614 - [c261]Hanjun Li, Shuhong Chen, Guojun Wang, Liu Cheng, Haojie Yin, Zhenkun Luo:
Enhancing Few-Shot Malware Classification Through Joint Learning of Malware Images and Opcode Sequences. ISPA 2024: 2060-2068 - [c260]Yuheng Zhang, Guojun Wang, Peiqiang Li, Xubin Li, Wanyi Gu, Mingfei Chen, Houji Chen:
TransFront: Bi-path Feature Fusion for Detecting Front-running Attack in Decentralized Finance. TrustCom 2024: 600-607 - [e34]Guojun Wang
, Haozhe Wang
, Geyong Min
, Nektarios Georgalas
, Weizhi Meng
:
Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers. Communications in Computer and Information Science 2034, Springer 2024, ISBN 978-981-97-1273-1 [contents] - 2023
- [j225]Siqi He, Xiaofei Xing
, Guojun Wang
, Zeyu Sun
:
A Data Integrity Verification Scheme for Centralized Database Using Smart Contract and Game Theory. IEEE Access 11: 59675-59687 (2023) - [j224]Syed Qasim Afser Rizvi
, Guojun Wang
, Asif Khan
, Mohammad Kamrul Hasan
, Taher M. Ghazal
, Atta ur Rehman Khan
:
Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and UEN-PDNet. IEEE Access 11: 107703-107724 (2023) - [j223]Shuhong Chen
, Zhiyong Jie, Guojun Wang, Kuan-Ching Li
, Jiawei Yang, Xulang Liu:
A new federated learning-based wireless communication and client scheduling solution for combating COVID-19. Comput. Commun. 206: 101-109 (2023) - [j222]Tao Peng
, Kejian Guan, Jierong Liu, Jianer Chen, Guojun Wang, Jiawei Zhu:
A blockchain-based mobile crowdsensing scheme with enhanced privacy. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j221]Shaobo Zhang
, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo
, Guojun Wang:
ALPS: Achieving accuracy-aware location privacy service via assisted regions. Future Gener. Comput. Syst. 145: 189-199 (2023) - [j220]Feng Wang
, Jinhua She
, Guojun Wang
, Yasuhiro Ohyama, Min Wu
:
Dual-Task Network Embeddings for Influence Prediction in Social Internet of Things. IEEE Internet Things J. 10(8, April 15): 6586-6597 (2023) - [j219]Yinglong Dai, Zheng Yan, Jiangchang Cheng, Xiaojun Duan, Guojun Wang:
Analysis of multimodal data fusion from an information theory perspective. Inf. Sci. 623: 164-183 (2023) - [j218]Yang Xu, Quanlin Li, Cheng Zhang
, Yunlin Tan
, Ping Zhang, Guojun Wang, Yaoxue Zhang:
A decentralized trust management mechanism for crowdfunding. Inf. Sci. 638: 118969 (2023) - [j217]Wei Liu, Jierong Liu, Tao Peng
, Guojun Wang, Valentina Emilia Balas, Oana Geman, Hung-Wen Chiu:
Prediction of Parkinson's disease based on artificial neural networks using speech datasets. J. Ambient Intell. Humaniz. Comput. 14(10): 13571-13584 (2023) - [j216]Shaobo Zhang, Yuechao Wang, Entao Luo, Qin Liu, Ke Gu, Guojun Wang:
A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse. J. Syst. Archit. 140: 102899 (2023) - [j215]Yipeng Zou, Tao Peng, Guojun Wang, Entao Luo, Jinbo Xiong:
Blockchain-assisted multi-keyword fuzzy search encryption for secure data sharing. J. Syst. Archit. 144: 102984 (2023) - [j214]Shazia Riaz
, Saqib Ali, Guojun Wang
, Muhammad Ahsan Latif, Muhammad Zafar Iqbal:
Membership inference attack on differentially private block coordinate descent. PeerJ Comput. Sci. 9: e1616 (2023) - [j213]Qin Liu
, Yu Peng
, Hongbo Jiang
, Jie Wu
, Tian Wang
, Tao Peng
, Guojun Wang
:
SlimBox: Lightweight Packet Inspection over Encrypted Traffic. IEEE Trans. Dependable Secur. Comput. 20(5): 4359-4371 (2023) - [j212]Md. Zakirul Alam Bhuiyan
, Sy-Yen Kuo
, Guojun Wang
:
Guest Editorial: Trustworthiness of AI/ML/DL Approaches in Industrial Internet of Things and Applications. IEEE Trans. Ind. Informatics 19(1): 969-972 (2023) - [c259]Yuting Li, Guojun Wang, Tian Wang, Weijia Jia:
FL-HSDP: Client-Side Defense for Federated Learning via Hessian Optimization and Shuffled Differential Privacy. HPCC/DSS/SmartCity/DependSys 2023: 696-703 - [c258]Zhidong Xie, Tao Peng, Wei You, Guojun Wang:
Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization. ICA3PP (5) 2023: 56-72 - [c257]Zhenkun Luo, Shuhong Chen, Guojun Wang, Hanjun Li:
Two-Stage Smart Contract Vulnerability Detection Combining Semantic Features and Graph Features. TrustCom 2023: 257-264 - [c256]Jinyao Zhu, Xiaofei Xing, Guojun Wang, Peiqiang Li:
Opcode Sequences-Based Smart Contract Vulnerabilities Detection Using Deep Learning. TrustCom 2023: 284-291 - [c255]Jianming Wu, Shuhong Chen, Guojun Wang, Hao Wang, Hanjun Li:
Multi-Scale Feature Aggregation for Rumor Detection: Unveiling the Truth within Text. TrustCom 2023: 1086-1093 - [c254]Kairen Chen, Shuhong Chen, Guojun Wang, Chenchen Wang:
CGPNet: Enhancing Medical Image Classification through Channel Grouping and Partial Convolution Network. TrustCom 2023: 1827-1834 - [c253]Zheqi Feng, Tao Peng
, Guojun Wang
, Kejian Guan:
Bilateral Personalized Information Fusion in Mobile Crowdsensing. UbiSec 2023: 3-16 - [c252]Yuheng Zhang
, Pin Liu
, Guojun Wang
, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. UbiSec 2023: 63-75 - [c251]Faseeh Iftikhar, Muhammad Faizan Khan
, Guojun Wang
, Fazli Wahid:
Privacy Preserving Elder Fall Detection Using Deep Learning. UbiSec 2023: 335-347 - [e33]Jia Hu, Geyong Min, Guojun Wang, Nektarios Georgalas:
22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023. IEEE 2023, ISBN 979-8-3503-8199-3 [contents] - [e32]Guojun Wang
, Kim-Kwang Raymond Choo
, Jie Wu
, Ernesto Damiani
:
Ubiquitous Security - Second International Conference, UbiSec 2022, Zhangjiajie, China, December 28-31, 2022, Revised Selected Papers. Communications in Computer and Information Science 1768, Springer 2023, ISBN 978-981-99-0271-2 [contents] - [i7]Yuheng Zhang, Pin Liu, Guojun Wang, Peiqiang Li, Wanyi Gu, Houji Chen, Xuelei Liu, Jinyao Zhu:
FRAD: Front-Running Attacks Detection on Ethereum using Ternary Classification Model. CoRR abs/2311.14514 (2023) - 2022
- [j211]Xiaofei Xing, Xiang Jin
, Haroon Elahi, Hai Jiang, Guojun Wang
:
A Malware Detection Approach Using Autoencoder in Deep Learning. IEEE Access 10: 25696-25706 (2022) - [j210]Qin Liu
, Liqiong Chen, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
A collaborative deep learning microservice for backdoor defenses in Industrial IoT networks. Ad Hoc Networks 124: 102727 (2022) - [j209]Xiaoyu Zhu
, Jie Wu, Wei Chang, Md. Zakirul Alam Bhuiyan, Kim-Kwang Raymond Choo
, Fang Qi, Qin Liu, Guojun Wang
:
On authenticated skyline query processing over road networks. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j208]Xiangyong Liu, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Personalised context-aware re-ranking in recommender system. Connect. Sci. 34(1): 319-338 (2022) - [j207]Xiangyong Liu
, Guojun Wang, Md. Zakirul Alam Bhuiyan:
Re-ranking with multiple objective optimization in recommender system. Trans. Emerg. Telecommun. Technol. 33(1) (2022) - [j206]Qin Liu, Guojun Wang, Jiankun Hu, Jie Wu:
Preface of special issue on Artificial Intelligence: The security & privacy opportunities and challenges for emerging applications. Future Gener. Comput. Syst. 133: 169-170 (2022) - [j205]Fengwei Dai, David Wei Zhang, Yangyang Yan, Guojun Wang, Liqiang Cao:
Research on Ni3Sn4 intermetallic compound for 5μm diameter Cu/Ni/Sn-3.0Ag micro bumps. IEICE Electron. Express 19(2): 20210453 (2022) - [j204]Muhammad Arif, Shermin Shamsudheen
, F. Ajesh, Guojun Wang
, Jianer Chen:
AI bot to detect fake COVID-19 vaccine certificate. IET Inf. Secur. 16(5): 362-372 (2022) - [j203]Cong Wang
, Weicheng Lu
, Sancheng Peng
, Youyang Qu
, Guojun Wang
, Shui Yu
:
Modeling on Energy-Efficiency Computation Offloading Using Probabilistic Action Generating. IEEE Internet Things J. 9(20): 20681-20692 (2022) - [j202]Muhammad Arif, Jianer Chen, Guojun Wang, Hafiz Tayyab Rauf:
Cognitive population initialization for swarm intelligence and evolutionary computing. J. Ambient Intell. Humaniz. Comput. 13(12): 5847-5860 (2022) - [j201]Yinglong Dai, Guojun Wang, Khan Muhammad
, Shuai Liu
:
A closed-loop healthcare processing approach based on deep reinforcement learning. Multim. Tools Appl. 81(3): 3107-3129 (2022) - [j200]Amir Javadpour, Guojun Wang:
cTMvSDN: improving resource management using combination of Markov-process and TDMA in software-defined networking. J. Supercomput. 78(3): 3477-3499 (2022) - [j199]Jingjing Wang, Wenjun Jiang
, Kenli Li, Guojun Wang, Keqin Li:
Incremental Group-Level Popularity Prediction in Online Social Networks. ACM Trans. Internet Techn. 22(1): 20:1-20:26 (2022) - [j198]Qin Liu
, Yue Tian
, Jie Wu
, Tao Peng
, Guojun Wang
:
Enabling Verifiable and Dynamic Ranked Search over Outsourced Data. IEEE Trans. Serv. Comput. 15(1): 69-82 (2022) - [j197]Qin Liu
, Yu Peng
, Shuyu Pei, Jie Wu
, Tao Peng
, Guojun Wang
:
Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search. IEEE Trans. Serv. Comput. 15(4): 1799-1812 (2022) - [c250]Qin Liu, Jiamin Yang, Hongbo Jiang, Jie Wu, Tao Peng, Tian Wang, Guojun Wang:
When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark. INFOCOM 2022: 590-599 - [c249]Guanghui Feng, Guojun Wang, Tao Peng, Xiaofei Xing, Shuhong Chen, Peiqiang Li:
A Privacy-Preserving Technique for Data Differencing Using the K-means Clustering Algorithm. ISPA/BDCloud/SocialCom/SustainCom 2022: 945-952 - [c248]Zheqi Feng, Tao Peng, Guo-Jun Wang, Kejian Guan:
Personalized Privacy-Preserving Information Fusion in Mobile Crowdsensing. ISPA/BDCloud/SocialCom/SustainCom 2022: 953-960 - [c247]Wanyi Gu, Guojun Wang
, Peiqiang Li, Xubin Li, Guangxin Zhai, Xiangbin Li, Mingfei Chen:
Detecting Unknown Vulnerabilities in Smart Contracts with Multi-Label Classification Model Using CNN-BiLSTM. UbiSec 2022: 52-63 - [c246]Xiangbin Li, Xiaofei Xing
, Guojun Wang
, Peiqiang Li, Xiangyong Liu:
Detecting Unknown Vulnerabilities in Smart Contracts with Binary Classification Model Using Machine Learning. UbiSec 2022: 179-192 - [c245]Yuting Li, Guojun Wang
, Tao Peng, Guanghui Feng:
FedTA: Locally-Differential Federated Learning with Top-k Mechanism and Adam Optimization. UbiSec 2022: 380-391 - [e31]Guojun Wang
, Kim-Kwang Raymond Choo
, Ryan K. L. Ko
, Yang Xu
, Bruno Crispo
:
Ubiquitous Security - First International Conference, UbiSec 2021, Guangzhou, China, December 28-31, 2021, Revised Selected Papers. Communications in Computer and Information Science 1557, Springer 2022, ISBN 978-981-19-0467-7 [contents] - 2021
- [j196]Qiang Zhang, Guojun Wang, Wenjuan Tang, Karim Alinani
, Qin Liu, Xin Li:
Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. Comput. Commun. 176: 81-90 (2021) - [j195]Guangxue Zhang, Tian Wang
, Guojun Wang, Anfeng Liu, Weijia Jia
:
Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurr. Comput. Pract. Exp. 33(7): 1 (2021) - [j194]Haroon Elahi
, Guojun Wang, Yang Xu
, Aniello Castiglione
, Qiben Yan, Muhammad Naeem Shehzad:
On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications. Comput. Stand. Interfaces 78: 103538 (2021) - [j193]Mehdi Gheisari
, Hamid Esmaeili Najafabadi
, Jafar Ahmad Abed Alzubi, Jiechao Gao
, Guojun Wang, Aaqif Afzaal Abbasi
, Aniello Castiglione:
OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city. Future Gener. Comput. Syst. 123: 1-13 (2021) - [j192]Haroon Elahi, Aniello Castiglione, Guojun Wang, Oana Geman:
A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities. Neurocomputing 444: 189-202 (2021) - [j191]Tian Wang
, Pan Wang, Shaobin Cai, James Xi Zheng
, Ying Ma
, Weijia Jia
, Guojun Wang:
Mobile edge-enabled trust evaluation for the Internet of Things. Inf. Fusion 75: 90-100 (2021) - [j190]Feng Wang
, Jinhua She, Yasuhiro Ohyama, Wenjun Jiang, Geyong Min, Guojun Wang, Min Wu:
Maximizing positive influence in competitive social networks: A trust-based solution. Inf. Sci. 546: 559-572 (2021) - [j189]Lei Zhou, Entao Luo, Guojun Wang, Shui Yu
:
Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks. Inf. Sci. 554: 15-32 (2021) - [j188]Qin Liu
, Zhengzheng Hao, Yu Peng
, Hongbo Jiang, Jie Wu, Tao Peng, Guojun Wang, Shaobo Zhang
:
SecVKQ: Secure and verifiable kNN queries in sensor-cloud systems. J. Syst. Archit. 120: 102300 (2021) - [j187]Hafiz ur Rahman, Guojun Wang
, Md. Zakirul Alam Bhuiyan, Jianer Chen:
In-network generalized trustworthy data collection for event detection in cyber-physical systems. PeerJ Comput. Sci. 7: e504 (2021) - [j186]Lei Zhou, Fengwei Zhang
, Jidong Xiao
, Kevin Leach
, Westley Weimer, Xuhua Ding
, Guojun Wang
:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Trans. Dependable Secur. Comput. 18(4): 1920-1932 (2021) - [j185]Yang Xu
, Cheng Zhang
, Guojun Wang
, Zheng Qin
, Quanrun Zeng:
A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services. IEEE Trans. Emerg. Top. Comput. 9(3): 1421-1432 (2021) - [j184]Peike Xia, Wenjun Jiang
, Jie Wu, Surong Xiao, Guojun Wang:
Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect Level. ACM Trans. Knowl. Discov. Data 15(4): 68:1-68:29 (2021) - [j183]Yang Xu
, Cheng Zhang
, Quanrun Zeng, Guojun Wang
, Ju Ren
, Yaoxue Zhang
:
Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services. IEEE Trans. Netw. Sci. Eng. 8(2): 1202-1213 (2021) - [j182]Qin Liu
, Yu Peng
, Jie Wu
, Tian Wang
, Guojun Wang
:
Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing. IEEE Trans. Netw. Serv. Manag. 18(2): 2046-2062 (2021) - [j181]Jifeng Zhang, Wenjun Jiang, Jinrui Zhang, Jie Wu, Guojun Wang:
Exploring Weather Data to Predict Activity Attendance in Event-based Social Network: From the Organizer's View. ACM Trans. Web 15(2): 10:1-10:25 (2021) - [j180]Wenjun Jiang
, Jing Chen, Xiaofei Ding, Jie Wu, Jiawei He, Guojun Wang:
Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios. ACM Trans. Web 15(3): 13:1-13:33 (2021) - [j179]Amir Javadpour
, Khatereh Saedifar
, Guojun Wang, Kuan-Ching Li
, Fatemeh Saghafi
:
Improving the Efficiency of Customer's Credit Rating with Machine Learning in Big Data Cloud Computing. Wirel. Pers. Commun. 121(4): 2699-2718 (2021) - [c244]Tao Peng, Wentao Zhong, Kejian Guan, Yipeng Zou, Jiawei Zhu, Guojun Wang:
A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks. TrustCom 2021: 413-419 - [c243]Yu Peng, Qin Liu, Yue Tian, Jie Wu, Tian Wang, Tao Peng, Guojun Wang:
Dynamic Searchable Symmetric Encryption with Forward and Backward Privacy. TrustCom 2021: 420-427 - [c242]Yipeng Zou, Tao Peng
, Wentao Zhong, Kejian Guan, Guojun Wang
:
Reliable and Controllable Data Sharing Based on Blockchain. UbiSec 2021: 229-240 - [c241]Shakil, Muhammad Arif, Shahab Saquib Sohail
, Mohammed Talha Alam, Syed Ubaid, Md. Tabrez Nafis, Guojun Wang
:
Towards a Two-Tier Architecture for Privacy-Enabled Recommender Systems (PeRS). UbiSec 2021: 268-278 - [e30]Guojun Wang
, Bing Chen
, Wei Li
, Roberto Di Pietro
, Xuefeng Yan, Hao Han
:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 13th International Conference, SpaCCS 2020, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12382, Springer 2021, ISBN 978-3-030-68850-9 [contents] - [e29]Guojun Wang
, Bing Chen
, Wei Li
, Roberto Di Pietro
, Xuefeng Yan, Hao Han
:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2020 International Workshops, Nanjing, China, December 18-20, 2020, Proceedings. Lecture Notes in Computer Science 12383, Springer 2021, ISBN 978-3-030-68883-7 [contents] - [e28]Sabu M. Thampi, Guojun Wang
, Danda B. Rawat, Ryan K. L. Ko, Chun-I Fan:
Security in Computing and Communications - 8th International Symposium, SSCC 2020, Chennai, India, October 14-17, 2020, Revised Selected Papers. Communications in Computer and Information Science 1364, Springer 2021, ISBN 978-981-16-0421-8 [contents] - 2020
- [j178]Xiangyong Liu
, Guojun Wang
, Md. Zakirul Alam Bhuiyan
, Meijing Shan
:
Towards Recommendation in Internet of Things: An Uncertainty Perspective. IEEE Access 8: 12232-12252 (2020) - [j177]Lei Zhou
, Entao Luo, Guojun Wang
:
RAitc: Securely Auditing the Remotely Executed Applications. IEEE Access 8: 163045-163059 (2020) - [j176]Saqib Ali
, Guojun Wang
, Shazia Riaz
:
Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering. IEEE Access 8: 173186-173196 (2020) - [j175]Karim Alinani
, Deshun Liu, Dong Zhou
, Guojun Wang
:
Service Composition and Optimal Selection in Cloud Manufacturing: State-of-the-Art and Research Challenges. IEEE Access 8: 223988-224005 (2020) - [j174]Mehdi Gheisari
, Guojun Wang, Shuhong Chen:
An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City. Comput. Electr. Eng. 81: 106504 (2020) - [j173]Yang Xu
, Quanrun Zeng, Guojun Wang
, Cheng Zhang, Ju Ren, Yaoxue Zhang:
An efficient privacy-enhanced attribute-based access control mechanism. Concurr. Comput. Pract. Exp. 32(5) (2020) - [j172]Yinglong Dai
, Guojun Wang
, Jianhua Dai, Oana Geman:
A multimodal deep architecture for traditional Chinese medicine diagnosis. Concurr. Comput. Pract. Exp. 32(19) (2020) - [j171]Guojun Wang:
Foreword. IEICE Trans. Inf. Syst. 103-D(2): 186-187 (2020) - [j170]Muhammad Arif, Guojun Wang:
Cloud-based service oriented architecture for social vehicular ad hoc network communications. Int. J. Commun. Networks Distributed Syst. 24(2): 143-166 (2020) - [j169]Muhammad Faizan Khan
, Guojun Wang
, Md. Zakirul Alam Bhuiyan
, Kun Yang
:
Toward Wi-Fi Halow Signal Coverage Modeling in Collapsed Structures. IEEE Internet Things J. 7(3): 2181-2196 (2020) - [j168]Tian Wang
, Md. Zakirul Alam Bhuiyan
, Guojun Wang
, Lianyong Qi
, Jie Wu
, Thaier Hayajneh
:
Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things. IEEE Internet Things J. 7(4): 2679-2689 (2020) - [j167]Guojun Wang, Jianhua Ma, Laurence T. Yang:
Guest Editorial: Special Issue on Safety and Security for Ubiquitous Computing and Communications. Inf. Sci. 522: 317-318 (2020) - [j166]Shaobo Zhang
, Xinjun Mao, Kim-Kwang Raymond Choo
, Tao Peng, Guojun Wang
:
A trajectory privacy-preserving scheme based on a dual-K mechanism for continuous location-based services. Inf. Sci. 527: 406-419 (2020) - [j165]Muhammad Arif, Guojun Wang, Tao Peng, Valentina Emilia Balas
, Oana Geman, Jianer Chen:
Optimization of communication in VANETs using fuzzy logic and artificial Bee colony. J. Intell. Fuzzy Syst. 38(5): 6145-6157 (2020) - [j164]Md. Zakirul Alam Bhuiyan, Guojun Wang, Zhong Fan:
Smart world systems, applications, and technologies. J. Netw. Comput. Appl. 156: 102553 (2020) - [j163]Haroon Elahi, Guojun Wang, Jianer Chen:
Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones. J. Netw. Comput. Appl. 157: 102578 (2020) - [j162]Tian Wang
, Yaxin Mei, Weijia Jia
, Xi Zheng
, Guojun Wang, Mande Xie:
Edge-based differential privacy computing for sensor-cloud systems. J. Parallel Distributed Comput. 136: 75-85 (2020) - [j161]Yinglong Dai
, Guojun Wang:
A deep inference learning framework for healthcare. Pattern Recognit. Lett. 139: 17-25 (2020) - [j160]Muhammad Arif, Guojun Wang
:
Fast curvelet transform through genetic algorithm for multimodal medical image fusion. Soft Comput. 24(3): 1815-1836 (2020) - [j159]Tao Peng, Jierong Liu, Guojun Wang
, Qin Liu, Jianer Chen, Jiawei Zhu, Chenxi Huang:
A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks. Sci. Program. 2020: 7832875:1-7832875:13 (2020) - [j158]Md. Zakirul Alam Bhuiyan
, Jie Wu
, Gary M. Weiss
, Thaier Hayajneh
, Tian Wang
, Guojun Wang
:
Event Detection Through Differential Pattern Mining in Cyber-Physical Systems. IEEE Trans. Big Data 6(4): 652-665 (2020) - [j157]Mohammad Shahriar Rahman
, Abdullah Al Omar
, Md. Zakirul Alam Bhuiyan
, Anirban Basu, Shinsaku Kiyomoto, Guojun Wang
:
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption. IEEE Trans. Engineering Management 67(4): 1476-1486 (2020) - [j156]Md. Zakirul Alam Bhuiyan
, Sy-Yen Kuo
, Jiannong Cao
, Guojun Wang
:
Guest Editorial: Trustworthiness in Industrial Internet of Things Systems and Applications. IEEE Trans. Ind. Informatics 16(9): 6079-6082 (2020) - [j155]Chunli Huang, Wenjun Jiang
, Jie Wu, Guojun Wang:
Personalized Review Recommendation based on Users' Aspect Sentiment. ACM Trans. Internet Techn. 20(4): 42:1-42:26 (2020) - [j154]Muhammad Arif, Guojun Wang
, Valentina Emilia Balas
, Oana Geman, Aniello Castiglione, Jianer Chen:
SDN based communications privacy-preserving architecture for VANETs using fog computing. Veh. Commun. 26: 100265 (2020) - [j153]Amir Javadpour, Khatereh Saedifar, Guojun Wang, Kuan-Ching Li
:
Optimal Execution Strategy for Large Orders in Big Data: Order Type using Q-learning Considerations. Wirel. Pers. Commun. 112(1): 123-148 (2020) - [j152]Amir Javadpour, Guojun Wang, Samira Rezaei:
Resource Management in a Peer to Peer Cloud Network for IoT. Wirel. Pers. Commun. 115(3): 2471-2488 (2020) - [c240]Hafiz ur Rahman, Guihua Duan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System. CSE 2020: 58-65 - [c239]Aqsa Younas
, Raheela Nasim, Saqib Ali
, Guojun Wang, Fang Qi:
Sentiment Analysis of Code-Mixed Roman Urdu-English Social Media Text using Deep Learning Approaches. CSE 2020: 66-71 - [c238]Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang:
KShot: Live Kernel Patching with SMM and SGX. DSN 2020: 1-13 - [c237]Guojun Wang, Tian Wang:
Welcome Messages from IEEE EUC 2020 General Chairs. EUC 2020: vii - [c236]Aroma Tariq, Saqib Ali
, Xiaofei Xing, Guojun Wang:
Intelligent Surveillance in Smart City Using 3D Road Monitoring. iSCI 2020: 31-36 - [c235]Syed Qasim Afser Rizvi, Pin Liu, Guojun Wang, Muhammad Arif:
Prediction of Parkinson's Disease using Principal Component Analysis and the Markov Chains. iSCI 2020: 44-48 - [c234]Xiang Jin, Xiaofei Xing, Haroon Elahi, Guojun Wang, Hai Jiang:
A Malware Detection Approach Using Malware Images and Autoencoders. MASS 2020: 1-6 - [c233]Muhammad Sohaib Yousaf
, Shazia Riaz
, Saqib Ali
, Shuhong Chen
, Guojun Wang
:
The Future Prospects of Adversarial Nets. SpaCCS Workshops 2020: 15-26 - [c232]Muhammad Arif, Jianer Chen, Pin Liu, Guojun Wang:
Location Based Communication Privacy in Internet of Vehicles Using Fog Computing. SpaCCS Workshops 2020: 77-90 - [c231]Muhammad Shakeel Faridi
, Saqib Ali
, Guihua Duan
, Guojun Wang
:
Blockchain and IoT Based Textile Manufacturing Traceability System in Industry 4.0. SpaCCS 2020: 331-344 - [c230]Taiguo Qu, Wenjun Jiang, Dong Liu, Guojun Wang:
Deep Hierarchical App Recommendation with Dynamic Behaviors. SSCC 2020: 62-76 - [c229]Ang Li, Wenjun Jiang, Xueqi Li
, Xinrong Chen, Guojun Wang:
Independent Worker Selection In Crowdsourcing. TrustCom 2020: 1173-1178 - [c228]Min Li, Haroon Elahi, Tao Peng, Fang Qi, Guojun Wang:
A Function-Centric Risk Assessment Approach for Android Applications. TrustCom 2020: 1187-1193 - [c227]Tao Peng, Jierong Liu, Jianer Chen, Guojun Wang:
A Privacy-Preserving Crowdsensing System with Muti-Blockchain. TrustCom 2020: 1944-1949 - [c226]Muhammad Arif, Walter Balzano, Alessandro Fontanella, Silvia Stranieri, Guojun Wang, Xiaofei Xing:
Integration of 5G, VANETs and Blockchain Technology. TrustCom 2020: 2007-2013 - [c225]Xueqi Li
, Wenjun Jiang, Weiguang Chen, Jie Wu, Guojun Wang, Kenli Li:
Directional and Explainable Serendipity Recommendation. WWW 2020: 122-132 - [e27]Guojun Wang
, Xuemin Lin
, James A. Hendler
, Wei Song
, Zhuoming Xu
, Genggeng Liu
:
Web Information Systems and Applications - 17th International Conference, WISA 2020, Guangzhou, China, September 23-25, 2020, Proceedings. Lecture Notes in Computer Science 12432, Springer 2020, ISBN 978-3-030-60028-0 [contents] - [e26]Guojun Wang, Carlos Becker Westphall, Arcangelo Castiglione:
14th IEEE International Conference on Big Data Science and Engineering, BigDataSE 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-0-7381-1114-8 [contents] - [e25]Guojun Wang, Aniello Castiglione, Alberto Huertas Celdrán:
23rd IEEE International Conference on Computational Science and Engineering, CSE 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0398-6 [contents] - [e24]Guojun Wang, Gregorio Martínez Pérez, Scott Fowler, Kuan-Ching Li:
18th IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0400-6 [contents] - [e23]Guojun Wang, Zhong Fan, Md. Zakirul Alam Bhuiyan, Kouichi Sakurai:
8th IEEE International Conference on Smart City and Informatization, iSCI 2020, Guangzhou, China, December 31, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0394-8 [contents] - [e22]Guojun Wang, Ryan K. L. Ko, Md. Zakirul Alam Bhuiyan, Yi Pan:
19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021. IEEE 2020, ISBN 978-1-6654-0392-4 [contents] - [i6]Amir Javadpour, Guojun Wang, Samira Rezaei, Kuan-Ching Li:
Detecting Straggler MapReduce Tasks in Big Data Processing Infrastructure by Neural Network. CoRR abs/2004.05868 (2020) - [i5]Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang:
Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms. CoRR abs/2004.07943 (2020) - [i4]Amir Javadpour, Samira Rezaei, Kuan-Ching Li, Guojun Wang:
A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm. CoRR abs/2004.13121 (2020) - [i3]Amir Javadpour, Guojun Wang, Xiaofei Xing:
Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network. CoRR abs/2005.07261 (2020) - [i2]Weiguang Chen, Wenjun Jiang, Xueqi Li, Kenli Li, Albert Y. Zomaya, Guojun Wang:
Semi-Disentangled Representation Learning in Recommendation System. CoRR abs/2010.13282 (2020)
2010 – 2019
- 2019
- [j151]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang
, Qin Liu:
Efficient Authentication of Multi-Dimensional Top-k Queries. IEEE Access 7: 4748-4762 (2019) - [j150]Pengfei Yin
, Guojun Wang
, Md. Zakirul Alam Bhuiyan
, Meijing Shan
, Fang Qi
:
Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library. IEEE Access 7: 147302-147313 (2019) - [j149]Muhammad Faizan Khan
, Guojun Wang
, Md. Zakirul Alam Bhuiyan
:
Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures. IEEE Access 7: 168075-168090 (2019) - [j148]Tian Wang, Zhen Peng, Sheng Wen, Guojun Wang, Baowei Wang, Anfeng Liu:
A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues. Ad Hoc Sens. Wirel. Networks 44(1-2): 109-130 (2019) - [j147]Mehdi Gheisari
, Guojun Wang, Wazir Zada Khan
, Christian Fernández-Campusano
:
A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking. Comput. Secur. 87 (2019) - [j146]Qing Lu, Congxu Zhu
, Guojun Wang
:
A Novel S-Box Design Algorithm Based on a New Compound Chaotic System. Entropy 21(10): 1004 (2019) - [j145]Yang Xu
, Guojun Wang, Ju Ren, Yaoxue Zhang:
An adaptive and configurable protection framework against android privilege escalation threats. Future Gener. Comput. Syst. 92: 210-224 (2019) - [j144]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang
, Shuhong Chen
:
Multidimensional privacy preservation in location-based services. Future Gener. Comput. Syst. 93: 312-326 (2019) - [j143]Shaobo Zhang
, Xiong Li
, Zhiyuan Tan
, Tao Peng, Guojun Wang:
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services. Future Gener. Comput. Syst. 94: 40-50 (2019) - [j142]Muhammad Faizan Khan
, Guojun Wang, Md. Zakirul Alam Bhuiyan
:
Wi-Fi frequency selection concept for effective coverage in collapsed structures. Future Gener. Comput. Syst. 97: 409-424 (2019) - [j141]Hai Tao
, Md. Zakirul Alam Bhuiyan
, Md. Arafatur Rahman
, Guojun Wang, Tian Wang
, Md. Manjur Ahmed, Jing Li:
Economic perspective analysis of protecting big data security and privacy. Future Gener. Comput. Syst. 98: 660-671 (2019) - [j140]Yuezhong Wu
, Qin Liu, Changyun Li
, Guojun Wang:
A hybrid filtering-based network document recommendation system in cloud storage. Int. J. Comput. Sci. Eng. 20(2): 269-279 (2019) - [j139]Tian Wang
, Jiyuan Zhou
, Anfeng Liu
, Md. Zakirul Alam Bhuiyan
, Guojun Wang, Weijia Jia
:
Fog-Based Computing and Storage Offloading for Data Synchronization in IoT. IEEE Internet Things J. 6(3): 4272-4282 (2019) - [j138]Qiang Zhang
, Guojun Wang
, Qin Liu:
Enabling Cooperative Privacy-preserving Personalized search in cloud environments. Inf. Sci. 480: 1-13 (2019) - [j137]Feng Wang
, Wenjun Jiang, Guojun Wang, Song Guo:
Influence maximization by leveraging the crowdsensing data in information diffusion network. J. Netw. Comput. Appl. 136: 11-21 (2019) - [j136]Qin Liu, Panlin Hou, Guojun Wang
, Tao Peng, Shaobo Zhang
:
Intelligent route planning on large road networks with efficiency and privacy. J. Parallel Distributed Comput. 133: 93-106 (2019) - [j135]Genlang Chen, Zhiqian Xu, Jiajian Zhang
, Guojun Wang, Hai Jiang, Miaoqing Huang:
Generic attribute revocation systems for attribute-based encryption in cloud storage. Frontiers Inf. Technol. Electron. Eng. 20(6): 773-786 (2019) - [j134]Gaocai Wang, Qifei Zhao, Tianxiao Xie, Guojun Wang:
A channel-aware expected energy consumption minimization strategy in wireless networks. Soft Comput. 23(15): 6051-6063 (2019) - [j133]Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu, Jianwei Niu:
An Immunization Framework for Social Networks Through Big Data Based Influence Modeling. IEEE Trans. Dependable Secur. Comput. 16(6): 984-995 (2019) - [j132]Yang Xu
, Ju Ren
, Guojun Wang
, Cheng Zhang
, Jidian Yang
, Yaoxue Zhang
:
A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT. IEEE Trans. Ind. Informatics 15(6): 3632-3641 (2019) - [j131]Yueyue Chen
, Deke Guo, Md. Zakirul Alam Bhuiyan, Ming Xu, Guojun Wang, Pin Lv:
Towards Profit Optimization During Online Participant Selection in Compressive Mobile Crowdsensing. ACM Trans. Sens. Networks 15(4): 38:1-38:29 (2019) - [j130]Tian Wang
, Yang Li
, Guojun Wang
, Jiannong Cao
, Md. Zakirul Alam Bhuiyan
, Weijia Jia
:
Sustainable and Efficient Data Collection from WSNs to Cloud. IEEE Trans. Sustain. Comput. 4(2): 252-262 (2019) - [j129]Muhammad Arif, Guojun Wang, Md. Zakirul Alam Bhuiyan, Tian Wang
, Jianer Chen:
A survey on security attacks in VANETs: Communication, applications and challenges. Veh. Commun. 19 (2019) - [c224]Xueqi Li
, Wenjun Jiang, Weiguang Chen, Jie Wu, Guojun Wang:
HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity. CIKM 2019: 1503-1512 - [c223]Hafiz ur Rahman, Guojun Wang
, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems. DependSys 2019: 54-66 - [c222]Muhammad Arif, Guojun Wang
, Oana Geman
, Jianer Chen:
Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition. DependSys 2019: 158-169 - [c221]Karim Alinani
, Deshun Liu, Dong Zhou
, Guojun Wang
:
Recommender System for Decentralized Cloud Manufacturing. DependSys 2019: 170-179 - [c220]Haroon Elahi, Guojun Wang
, Tao Peng, Jianer Chen
:
AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant. DependSys 2019: 341-355 - [c219]Boya Li, Guojun Wang
, Haroon Elahi, Guihua Duan
:
A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores. DependSys 2019: 356-368 - [c218]Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang:
Nighthawk: Transparent System Introspection from Ring -3. ESORICS (2) 2019: 217-238 - [c217]Md. Zakirul Alam Bhuiyan, Tian Wang, Aliuz Zaman, Guojun Wang:
Data Reduction through Decision-Making Based on Event-Sensitivity in IoT-Enabled Event Monitoring. HPCC/SmartCity/DSS 2019: 2039-2044 - [c216]Amir Javadpour
, Guojun Wang
, Kuan-Ching Li
:
A High Throughput MAC Protocol for Wireless Body Area Networks in Intensive Care. iSCI 2019: 23-34 - [c215]Muhammad Arif, Guojun Wang
, Valentina Emilia Balas
, Shuhong Chen:
Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference System. iSCI 2019: 49-59 - [c214]Pedro Miguel Sánchez Sánchez
, Alberto Huertas Celdrán
, Lorenzo Fernández Maimó
, Gregorio Martínez Pérez
, Guojun Wang
:
Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System. iSCI 2019: 73-85 - [c213]Hafiz ur Rahman, Guojun Wang
, Md. Zakirul Alam Bhuiyan, Jianer Chen:
Trustworthy Data Collection for Cyber Systems: A Taxonomy and Future Directions. iSCI 2019: 152-164 - [c212]Qifan Wang, Lei Zhou, Zhe Tang, Guojun Wang
:
A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles. iSCI 2019: 253-267 - [c211]Saqib Ali
, Guojun Wang
, Komal Fatima
, Pin Liu
:
Semantic Knowledge Based Graph Model in Smart Cities. iSCI 2019: 268-278 - [c210]Syed Qasim Afser Rizvi, Guojun Wang
, Xiaofei Xing:
Early Detection of Parkinson Disease Using Wavelet Transform Along with Fourier Transform. iSCI 2019: 323-333 - [c209]Sorin Curea, Oana Geman, Iuliana Chiuchisan
, Valentina Emilia Balas, Guojun Wang, Muhammad Arif:
Superior Prosthetic Member Based on Assistive Technologies. iSCI 2019: 520-530 - [c208]Saqib Ali
, Guojun Wang
, Bebo White
, Komal Fatima
:
Libra Critique Towards Global Decentralized Financial System. iSCI 2019: 661-672 - [e21]Guojun Wang, Md. Zakirul Alam Bhuiyan, Sabrina De Capitani di Vimercati, Yizhi Ren:
Dependability in Sensor, Cloud, and Big Data Systems and Applications - 5th International Conference, DependSys 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1123, Springer 2019, ISBN 978-981-15-1303-9 [contents] - [e20]Guojun Wang, Abdulmotaleb El-Saddik, Xuejia Lai, Gregorio Martínez Pérez, Kim-Kwang Raymond Choo:
Smart City and Informatization - 7th International Conference, iSCI 2019, Guangzhou, China, November 12-15, 2019, Proceedings. Communications in Computer and Information Science 1122, Springer 2019, ISBN 978-981-15-1300-8 [contents] - [e19]Guojun Wang, Jun Feng, Md. Zakirul Alam Bhuiyan, Rongxing Lu:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings. Lecture Notes in Computer Science 11611, Springer 2019, ISBN 978-3-030-24906-9 [contents] - [e18]Guojun Wang, Jun Feng, Md. Zakirul Alam Bhuiyan, Rongxing Lu:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings. Lecture Notes in Computer Science 11637, Springer 2019, ISBN 978-3-030-24899-4 [contents] - [e17]Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, José M. Alcaraz Calero
:
Security in Computing and Communications - 6th International Symposium, SSCC 2018, Bangalore, India, September 19-22, 2018, Revised Selected Papers. Communications in Computer and Information Science 969, Springer 2019, ISBN 978-981-13-5825-8 [contents] - 2018
- [j128]Yinglong Dai
, Guojun Wang:
Analyzing Tongue Images Using a Conceptual Alignment Deep Autoencoder. IEEE Access 6: 5962-5972 (2018) - [j127]Karim Alinani, Annadil Alinani, Dua Hussain Narejo, Guojun Wang
:
Aggregating Author Profiles from Multiple Publisher Networks to Build a List of Potential Collaborators. IEEE Access 6: 20298-20308 (2018) - [j126]Qiang Zhang, Qin Liu, Guojun Wang
:
PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data. IEEE Access 6: 31541-31552 (2018) - [j125]Entao Luo, Md. Zakirul Alam Bhuiyan
, Guojun Wang, Md. Arafatur Rahman
, Jie Wu, Mohammed Atiquzzaman
:
PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems. IEEE Commun. Mag. 56(2): 163-168 (2018) - [j124]Tian Wang
, Md. Zakirul Alam Bhuiyan
, Guojun Wang, Md. Arafatur Rahman
, Jie Wu, Jiannong Cao:
Big Data Reduction for a Smart City's Critical Infrastructural Health Monitoring. IEEE Commun. Mag. 56(3): 128-133 (2018) - [j123]Shui Yu
, Guojun Wang, Xiting Liu, Jianwei Niu
:
Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective. IEEE Commun. Mag. 56(9): 14-18 (2018) - [j122]Wenyin Yang, Guojun Wang, Kim-Kwang Raymond Choo
, Shuhong Chen
:
HEPart: A balanced hypergraph partitioning algorithm for big data applications. Future Gener. Comput. Syst. 83: 250-268 (2018) - [j121]Shaobo Zhang
, Kim-Kwang Raymond Choo
, Qin Liu, Guojun Wang:
Enhancing privacy through uniform grid and caching in location-based services. Future Gener. Comput. Syst. 86: 881-892 (2018) - [j120]Joarder Kamruzzaman
, Guojun Wang, Gour C. Karmakar, Iftekhar Ahmad
, Md. Zakirul Alam Bhuiyan
:
Acoustic sensor networks in the Internet of Things applications. Future Gener. Comput. Syst. 86: 1167-1169 (2018) - [j119]Feng Wang
, Wenjun Jiang, Xiaolin Li, Guojun Wang:
Maximizing positive influence spread in online social networks via fluid dynamics. Future Gener. Comput. Syst. 86: 1491-1502 (2018) - [j118]Zhibin Zhou
, Pin Liu, Qin Liu, Guojun Wang:
An Anonymous Offline RFID Grouping-Proof Protocol. Future Internet 10(1): 2 (2018) - [j117]Zhimin Liu, Weijia Jia, Guojun Wang:
Area coverage estimation model for directional sensor networks. Int. J. Embed. Syst. 10(1): 13-21 (2018) - [j116]Shaobo Zhang
, Guojun Wang
, Md. Zakirul Alam Bhuiyan
, Qin Liu
:
A Dual Privacy Preserving Scheme in Continuous Location-Based Services. IEEE Internet Things J. 5(5): 4191-4200 (2018) - [j115]Yinglong Dai, Guojun Wang, Kuan-Ching Li
:
Conceptual alignment deep neural networks. J. Intell. Fuzzy Syst. 34(3): 1631-1642 (2018) - [j114]Yang Xu
, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
A Feasible Fuzzy-Extended Attribute-Based Access Control Technique. Secur. Commun. Networks 2018: 6476315:1-6476315:11 (2018) - [j113]Shaobo Zhang
, Guojun Wang, Qin Liu, Jemal H. Abawajy:
A trajectory privacy-preserving scheme based on query exchange in mobile social networks. Soft Comput. 22(18): 6121-6133 (2018) - [j112]Tian Wang
, Jiyuan Zhou, Xinlei Chen
, Guojun Wang
, Anfeng Liu
, Yang Liu:
A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing. IEEE Trans. Emerg. Top. Comput. Intell. 2(1): 3-12 (2018) - [j111]Youyang Qu
, Shui Yu
, Wanlei Zhou
, Sancheng Peng, Guojun Wang, Ke Xiao:
Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things. IEEE Wirel. Commun. 25(6): 91-97 (2018) - [j110]Yang Xu
, Guojun Wang, Jidian Yang, Ju Ren, Yaoxue Zhang, Cheng Zhang
:
Towards Secure Network Computing Services for Lightweight Clients Using Blockchain. Wirel. Commun. Mob. Comput. 2018: 2051693:1-2051693:12 (2018) - [c207]Qin Liu, SiXia Wu, Shuyu Pei, Jie Wu, Tao Peng, Guojun Wang:
Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding. CNS 2018: 1-9 - [c206]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Tao Peng:
Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures. DASC/PiCom/DataCom/CyberSciTech 2018: 626-633 - [c205]Muhammad Arif, Guojun Wang, Shuhong Chen:
Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction. DASC/PiCom/DataCom/CyberSciTech 2018: 681-688 - [c204]Saqib Ali
, Guojun Wang, Xiaofei Xing, Roger Leslie Cottrell:
Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors. DASC/PiCom/DataCom/CyberSciTech 2018: 919-926 - [c203]Wei Zhang, Xiaofei Xing, Saqib Ali
, Guojun Wang:
Internet Performance Prediction Framework Based on PingER Dataset. ICA3PP (3) 2018: 118-131 - [c202]Mehdi Gheisari
, Guojun Wang, Shuhong Chen
, Hamidreza Ghorbani
:
IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking. ICA3PP (4) 2018: 303-312 - [c201]Xu Li, Guojun Wang, Saqib Ali
, QiLin He:
Android Malware Detection Using Category-Based Permission Vectors. ICA3PP (4) 2018: 399-414 - [c200]Md. Zakirul Alam Bhuiyan, Aliuz Zaman, Tian Wang, Guojun Wang, Hai Tao
, Mohammad Mehedi Hassan:
Blockchain and Big Data to Transform the Healthcare. ICDPA 2018: 62-68 - [c199]Amir Javadpour, Guojun Wang, Xiaofei Xing:
Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 316-321 - [c198]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Shuhong Chen:
Wi-Fi Radar Placement for Coverage in Collapsed Structures. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 423-430 - [c197]Mehdi Gheisari
, Guojun Wang, Shuhong Chen
, Ali Seyfollahi
:
A Method for Privacy-Preserving in IoT-SDN Integration Environment. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 895-902 - [c196]Entao Luo
, Guojun Wang
, Kun Tang
, Quanyou Zhao, Chen He, Liyong Guo:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. ISPEC 2018: 495-505 - [c195]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server. IWQoS 2018: 1-6 - [c194]Md. Zakirul Alam Bhuiyan
, Mdaliuz Zaman, Guojun Wang, Tian Wang
, Md. Arafatur Rahman
, Hai Tao
:
Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid. SGIoT 2018: 78-84 - [c193]Hafiz ur Rahman, Muhammad Arif, Sadam Al-Azani, Emad Y. Ramadan
, Guojun Wang, Jianer Chen, Teodora Olariu, Iustin Olariu:
A Survey of Modern Gene Expression Based Techniques for Cancer Detection and Diagnosis. SOFA (2) 2018: 35-50 - [c192]Oana Geman, Iuliana Chiuchisan
, Valentina Emilia Balas, Guojun Wang, Muhammad Arif, Haroon Elahi, Tao Peng:
Portable Non-invasive Device for Measuring Saturated Oxygen of the Blood. SOFA (2) 2018: 457-462 - [c191]Iuliana Chiuchisan
, Oana Geman, Valentina Emilia Balas, Guojun Wang, Muhammad Arif, Haroon Elahi, Tao Peng:
"Smart" Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors. SOFA (2) 2018: 463-468 - [c190]Muhammad Arif, Guojun Wang, Tian Wang
, Tao Peng:
SDN-Based Secure VANETs Communication with Fog Computing. SpaCCS 2018: 46-59 - [c189]Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang, Qin Liu:
Authentication of Skyline Query over Road Networks. SpaCCS 2018: 72-83 - [c188]Syed Qasim Afser Rizvi, Guojun Wang, Jianer Chen:
A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing. SpaCCS 2018: 84-97 - [c187]Yang Xu, Quanrun Zeng, Guojun Wang, Cheng Zhang, Ju Ren, Yaoxue Zhang:
A Privacy-Preserving Attribute-Based Access Control Scheme. SpaCCS 2018: 361-370 - [c186]Md. Zakirul Alam Bhuiyan
, Md. Monirul Islam, Guojun Wang
, Tian Wang
:
Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals. SpaCCS 2018: 511-521 - [c185]Haroon Elahi, Guojun Wang:
A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings. SSCC 2018: 168-182 - [c184]Muhammad Arif, Guojun Wang, Tao Peng:
Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I. TrustCom/BigDataSE 2018: 1091-1096 - [c183]Saqib Ali
, Guojun Wang, Bebo White, Roger Leslie Cottrell:
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER. TrustCom/BigDataSE 2018: 1303-1308 - [c182]Qin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang:
Achieving Secure and Effective Search Services in Cloud Computing. TrustCom/BigDataSE 2018: 1386-1391 - [c181]Yinglong Dai, Xiangyong Liu, Guojun Wang:
A Body Simulator with Delayed Health State Transition. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 635-641 - [c180]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, Xiaofei Xing:
Towards Wi-Fi Radar in Collapsed Structures. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 664-670 - [c179]Hafiz ur Rahman, Guojun Wang, Jianer Chen, Hai Jiang:
Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 772-779 - [c178]Qiang Zhang, Guihua Duan, Guojun Wang:
Personalized Search with Secure Updates in Educational Resources. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 962-969 - [c177]Feng Wang, Wenjun Jiang, Guojun Wang:
Low-Dimensional Vectors Learning for Influence Maximization. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 970-976 - [c176]Saqib Ali
, Guojun Wang, Md. Zakirul Alam Bhuiyan, Hai Jiang:
Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 991-998 - [c175]Mingfeng Su
, Pin Liu, Guojun Wang:
Multidimensional QoS Resource Scheduling Method with Stakeholder Perspective in Clouds. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1045-1051 - [c174]Amir Javadpour, Guojun Wang, Samira Rezaei, Shuhong Chen:
Power Curtailment in Cloud Environment Utilising Load Balancing Machine Allocation. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1364-1370 - [c173]Amir Javadpour, Niusha Adelpour, Guojun Wang, Tao Peng:
Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1371-1377 - [c172]Karim Alinani, Guojun Wang, Annadil Alinani, Dua Hussain Narejo, Mumbere Muyisa Forrest
:
Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1414-1421 - [c171]Wenyin Yang, Li Ma, Ruchun Cui, Guojun Wang:
Hypergraph Partitioning for Big Data Applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1705-1710 - [c170]Yang Xu, Quanrun Zeng, Guojun Wang, Hao Min, Ju Ren, Yaoxue Zhang:
A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1982-1987 - [e16]Guojun Wang, Jinjun Chen, Laurence T. Yang:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings. Lecture Notes in Computer Science 11342, Springer 2018, ISBN 978-3-030-05344-4 [contents] - [e15]Guojun Wang, Qi Han, Md. Zakirul Alam Bhuiyan, Xiaoxing Ma, Frédéric Loulergue, Peng Li, Manuel Roveri, Lei Chen:
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018. IEEE 2018, ISBN 978-1-5386-9380-3 [contents] - 2017
- [j109]Ke Gu
, Weijia Jia
, Guojun Wang, Sheng Wen
:
Efficient and secure attribute-based signature for monotone predicates. Acta Informatica 54(5): 521-541 (2017) - [j108]Qin Liu, Guojun Wang, Xuhui Liu, Tao Peng, Jie Wu:
Achieving reliable and secure services in cloud computing environments. Comput. Electr. Eng. 59: 153-164 (2017) - [j107]Ziran Peng, Guojun Wang, Huabin Jiang, Shuangwu Meng:
Research and improvement of ECG compression algorithm based on EZW. Comput. Methods Programs Biomed. 145: 157-166 (2017) - [j106]Shuhong Chen
, Guojun Wang, Guofeng Yan, Dongqing Xie:
Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j105]Tao Peng, Qin Liu, Guojun Wang:
A Multilevel Access Control Scheme for Data Security in Transparent Computing. Comput. Sci. Eng. 19(1): 46-53 (2017) - [j104]Entao Luo, Qin Liu, Jemal H. Abawajy, Guojun Wang:
Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks. Future Gener. Comput. Syst. 68: 222-233 (2017) - [j103]Qin Liu, Avinash Srinivasan, Jiankun Hu
, Guojun Wang:
Preface: Security and privacy in big data clouds. Future Gener. Comput. Syst. 72: 206-207 (2017) - [j102]Jiaqi Liu, Guojun Wang, Zhigang Chen, Hui Liu:
A cooperation guarantee mechanism based on altruistic punishment for nodes in distributed environments. Int. J. Auton. Adapt. Commun. Syst. 10(1): 23-37 (2017) - [j101]Yinglong Dai, Wang Yang, Guojun Wang:
Package balancing k-means algorithm for physical distribution. Int. J. Comput. Sci. Eng. 14(4): 349-358 (2017) - [j100]Ziran Peng, Guojun Wang:
An optimal energy-saving real-time task-scheduling algorithm for mobile terminals. Int. J. Distributed Sens. Networks 13(5) (2017) - [j99]Pengfei Yin, Guojun Wang, Wenjun Jiang:
U-Search: usage-based search with collective intelligence. Int. J. High Perform. Comput. Netw. 10(4/5): 341-351 (2017) - [j98]Tao Peng, Qin Liu, Dacheng Meng, Guojun Wang:
Collaborative trajectory privacy preserving scheme in location-based services. Inf. Sci. 387: 165-179 (2017) - [j97]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Effective Query Grouping Strategy in Clouds. J. Comput. Sci. Technol. 32(6): 1231-1249 (2017) - [j96]Wenyin Yang, Guojun Wang, Md. Zakirul Alam Bhuiyan
, Kim-Kwang Raymond Choo
:
Hypergraph partitioning for social networks based on information entropy modularity. J. Netw. Comput. Appl. 86: 59-71 (2017) - [j95]Sancheng Peng, Guojun Wang, Dongqing Xie:
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. IEEE Netw. 31(1): 11-17 (2017) - [j94]Tao Peng, Qin Liu, Guojun Wang:
Enhanced Location Privacy Preserving Scheme in Location-Based Services. IEEE Syst. J. 11(1): 219-230 (2017) - [j93]Md. Zakirul Alam Bhuiyan
, Jie Wu, Guojun Wang, Tian Wang, Mohammad Mehedi Hassan:
e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-Cost Monitoring in Networked Sensing Systems. ACM Trans. Auton. Adapt. Syst. 12(1): 1:1-1:29 (2017) - [j92]Md. Zakirul Alam Bhuiyan, Jie Wu, Guojun Wang, Jiannong Cao, Wenjun Jiang, Mohammed Atiquzzaman
:
Towards Cyber-Physical Systems Design for Structural Health Monitoring: Hurdles and Opportunities. ACM Trans. Cyber Phys. Syst. 1(4): 19:1-19:26 (2017) - [j91]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu, Jiannong Cao
, Xuefeng Liu, Tian Wang:
Dependable Structural Health Monitoring Using Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 14(4): 363-376 (2017) - [j90]Md. Zakirul Alam Bhuiyan
, Jie Wu, Guojun Wang, Zhigang Chen, Jianer Chen, Tian Wang:
Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks. IEEE Trans. Ind. Informatics 13(2): 572-583 (2017) - [j89]Qin Liu, Guojun Wang, Feng Li, Shuhui Yang, Jie Wu:
Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks. IEEE Trans. Parallel Distributed Syst. 28(5): 1417-1429 (2017) - [j88]Feng Wang
, Jianbin Li, Wenjun Jiang, Guojun Wang:
Temporal Topic-Based Multi-Dimensional Social Influence Evaluation in Online Social Networks. Wirel. Pers. Commun. 95(3): 2143-2171 (2017) - [j87]Zhufang Kuang
, Zhigang Chen, Guojun Wang, Hui Liu:
A Load-Balanced Multicast Routing Algorithm Using Diversity Rate in CWMNs. Wirel. Pers. Commun. 96(3): 4399-4425 (2017) - [c169]Mehdi Gheisari
, Guojun Wang, Md. Zakirul Alam Bhuiyan
:
A Survey on Deep Learning in Big Data. CSE/EUC (2) 2017: 173-180 - [c168]Md. Zakirul Alam Bhuiyan, Guojun Wang, Tian Wang, Md. Arafatur Rahman
, Jie Wu:
Content-Centric Event-Insensitive Big Data Reduction in Internet of Things. GLOBECOM 2017: 1-6 - [c167]Baishuang Hu, Qin Liu, Xuhui Liu, Tao Peng, Guojun Wang, Jie Wu:
DABKS: Dynamic attribute-based keyword search in cloud computing. ICC 2017: 1-6 - [c166]Tao Peng, Qin Liu, Guojun Wang, Jianer Chen:
A Lightweight Privacy Aware Friend Locator in Mobile Social Networks. ISPA/IUCC 2017: 17-23 - [c165]Lei Zhou, Guojun Wang, Tongshuai Cui, Xiaofei Xing:
Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services. ISPA/IUCC 2017: 101-107 - [c164]Haroon Elahi, Guojun Wang, Wei Zhang:
A Privacy-Aware Conceptual Framework for Coordination. ISPA/IUCC 2017: 190-197 - [c163]Guangxue Zhang, Tian Wang, Md. Zakirul Alam Bhuiyan
, Guojun Wang:
A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure. ISPA/IUCC 2017: 481-485 - [c162]Yuezhong Wu
, Zhihong Wang
, Shuhong Chen, Guojun Wang, Changyun Li
:
Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph. ISPA/IUCC 2017: 715-721 - [c161]Yang Xu
, Guojun Wang, Ju Ren, Yaoxue Zhang:
An Adaptive Android Security Extension against Privilege Escalation Attacks. ISPA/IUCC 2017: 752-760 - [c160]Mehdi Gheisari
, Guojun Wang, Md. Zakirul Alam Bhuiyan
, Wei Zhang:
MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT. ISPA/IUCC 2017: 897-903 - [c159]Yinglong Dai, Guojun Wang, Sihong Chen, Dongqing Xie, Shuhong Chen:
Using Deep Neural Networks to Simulate Human Body. ISPA/IUCC 2017: 959-966 - [c158]Entao Luo, Guojun Wang, Shuhong Chen, Xiangdong Yin, Wen Li:
Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks. ISPA/IUCC 2017: 975-981 - [c157]Saqib Ali
, Guojun Wang, Roger Les Cottrell, Tayyba Anwar:
Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor. ISPA/IUCC 2017: 982-989 - [c156]Shaobo Zhang, Guojun Wang, Qin Liu, Xi Wen, Junguo Liao:
A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services. ISPA/IUCC 2017: 1004-1010 - [c155]Yunhao Mu, Qin Liu, Junhai Zhou, Kang Xie, Guojun Wang:
Achieving Flow-Oriented Reliable Services in Cloud Computing. ISPA/IUCC 2017: 1011-1017 - [c154]Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan
, Xu Li:
Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures. ISPA/IUCC 2017: 1066-1073 - [c153]Muhammad Arif
, Guojun Wang:
Segmentation of Calcification and Brain Hemorrhage with Midline Detection. ISPA/IUCC 2017: 1082-1090 - [c152]Qiang Zhang, Guojun Wang, Qin Liu, Tao Peng:
Attribute-Based Encryption with Personalized Search. ISPA/IUCC 2017: 1172-1178 - [c151]Feng Wang, Wenjun Jiang, Guojun Wang, Dongqing Xie:
Data-Driven Influence Learning in Social Networks. ISPA/IUCC 2017: 1179-1185 - [c150]Saqib Ali
, Guojun Wang, Roger Les Cottrell, Sara Masood:
Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements. ISPA/IUCC 2017: 1319-1326 - [c149]Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang:
Feature Selection and Intrusion Detection in Cloud Environment Based on Machine Learning Algorithms. ISPA/IUCC 2017: 1417-1421 - [c148]Karim Alinani, Guojun Wang, Annadil Alinani, Dua Hussain Narejo:
Who Should Be My Co-Author? Recommender System to Suggest a List of Collaborators. ISPA/IUCC 2017: 1427-1433 - [c147]Xiangyong Liu, Pengfei Yin, Md. Zakirul Alam Bhuiyan
, Guojun Wang:
The Strength of Dithering in Recommender System. ISPAN-FCST-ISCC 2017: 71-78 - [c146]Md. Zakirul Alam Bhuiyan
, Mdaliuz Zaman, Guojun Wang, Tian Wang, Jie Wu:
Privacy-Protected Data Collection in Wireless Medical Sensor Networks. NAS 2017: 1-2 - [c145]Qifan Wang, Guihua Duan, Entao Luo, Guojun Wang:
Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext. SpaCCS 2017: 42-55 - [c144]Haroon Elahi, Guojun Wang, Xu Li:
Smartphone Bloatware: An Overlooked Privacy Problem. SpaCCS 2017: 169-185 - [c143]Zhibin Zhou, Pin Liu, Qin Liu, Guojun Wang:
An ECC-Based Off-line Anonymous Grouping-Proof Protocol. SpaCCS 2017: 186-200 - [c142]Yang Xu, Wuqiang Gao, Quanrun Zeng, Guojun Wang, Ju Ren, Yaoxue Zhang:
FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism. SpaCCS 2017: 332-343 - [c141]Marc Capellupo, Jimmy Liranzo, Md. Zakirul Alam Bhuiyan
, Thaier Hayajneh
, Guojun Wang:
Security and Attack Vector Analysis of IoT Devices. SpaCCS Workshops 2017: 593-606 - [c140]Lian Duan, Fang Qi, Guojun Wang, Zhe Tang:
Module-Level Software Streaming Loading Model Based on Hypervisor. SpaCCS Workshops 2017: 627-636 - [c139]Entao Luo, Guojun Wang, Qin Liu:
Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks. TrustCom/BigDataSE/ICESS 2017: 58-64 - [c138]Shaobo Zhang, Guojun Wang, Qin Liu:
A Dual Privacy Preserving Scheme in Continuous Location-Based Services. TrustCom/BigDataSE/ICESS 2017: 402-408 - [c137]Yinglong Dai, Guojun Wang, Sihong Chen, Xiaofei Xing:
Building deep architectures for traditional chinese medicine diagnosis. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-7 - [c136]Haroon Elahi, Guojun Wang, Dongqing Xie:
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [c135]Athina Rosales, Md. Zakirul Alam Bhuiyan, Guojun Wang, Tian Wang, Xiaofei Xing, Abdulhameed Alelaiwi:
Naturalistic driving data for a smart cloud-based abnormal driving detector. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [c134]Feng Wang, Wenjun Jiang, Shuhong Chen
, Dongqing Xie, Guojun Wang:
Exploring user topic influence for group recommendation on learning resources. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c133]Lei Zhou, Fengwei Zhang, Guojun Wang:
Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [e14]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 10th International Conference, SpaCCS 2017, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10656, Springer 2017, ISBN 978-3-319-72388-4 [contents] - [e13]Guojun Wang, Mohammed Atiquzzaman, Zheng Yan, Kim-Kwang Raymond Choo:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings. Lecture Notes in Computer Science 10658, Springer 2017, ISBN 978-3-319-72394-5 [contents] - 2016
- [j86]Wei Zhou, Yang Xu, Guojun Wang:
Decentralized group key management for hierarchical access control using multilinear forms. Concurr. Comput. Pract. Exp. 28(3): 631-645 (2016) - [j85]Wenjun Jiang
, Guojun Wang, Md. Zakirul Alam Bhuiyan
, Jie Wu:
Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges. ACM Comput. Surv. 49(1): 10:1-10:35 (2016) - [j84]Jemal H. Abawajy, Guojun Wang, Laurence T. Yang, Bahman Javadi:
Trust, Security and Privacy in Emerging Distributed Systems. Future Gener. Comput. Syst. 55: 224-226 (2016) - [j83]Shuhong Chen
, Guojun Wang, Weijia Jia
:
Cluster-group based trusted computing for mobile social networks using implicit social behavioral graph. Future Gener. Comput. Syst. 55: 391-400 (2016) - [j82]Entao Luo, Qin Liu, Guojun Wang:
Hierarchical Multi-Authority and Attribute-Based Encryption Friend Discovery Scheme in Mobile Social Networks. IEEE Commun. Lett. 20(9): 1772-1775 (2016) - [j81]Karim Alinani, Annadil Alinani, Xiangyong Liu, Guojun Wang:
Heterogeneous educational resource recommender system based on user preferences. Int. J. Auton. Adapt. Commun. Syst. 9(1/2): 20-39 (2016) - [j80]Zheng Ma, Jin Zheng, Weijia Jia, Guojun Wang:
An efficient spatial query processing algorithm in multi-sink wireless sensor networks. Int. J. Sens. Networks 22(4): 274-282 (2016) - [j79]Zhenyu Zhou, Mianxiong Dong
, Kaoru Ota
, Guojun Wang, Laurence T. Yang:
Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks. IEEE Internet Things J. 3(3): 428-438 (2016) - [j78]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
Blood typing for families: a novel hybrid human-computer application. Int. J. Parallel Emergent Distributed Syst. 31(4): 354-376 (2016) - [j77]Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, Huanyang Zheng:
Trust Evaluation in Online Social Networks Using Generalized Network Flow. IEEE Trans. Computers 65(3): 952-963 (2016) - [j76]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
Forming Opinions via Trusted Friends: Time-Evolving Rating Prediction Using Fluid Dynamics. IEEE Trans. Computers 65(4): 1211-1224 (2016) - [j75]Md. Zakirul Alam Bhuiyan
, Jie Wu, Guojun Wang, Jiannong Cao
:
Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring. IEEE Trans. Ind. Informatics 12(6): 2103-2114 (2016) - [j74]Li Li, Wang Yang, Md. Zakirul Alam Bhuiyan
, Guojun Wang:
Unsupervised learning of indoor localization based on received signal strength. Wirel. Commun. Mob. Comput. 16(15): 2225-2237 (2016) - [c132]Yinglong Dai, Yinong Long, Xiaofei Xing, Guojun Wang:
Exploring Body Constitution in Traditional Chinese Medicine with K-Means Clustering. APSCC 2016: 52-64 - [c131]Yang Li, Tian Wang, Guojun Wang, Junbin Liang, Hongyu Chen:
Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks. APSCC 2016: 130-143 - [c130]Feng Wang
, Guojun Wang, Dongqing Xie:
Maximizing the Spread of Positive Influence Under LT-MLA Model. APSCC 2016: 450-463 - [c129]Wenyin Yang, Guojun Wang, Li Ma, Shiyang Wu:
A Distributed Algorithm for Balanced Hypergraph Partitioning. APSCC 2016: 477-490 - [c128]Xiangyong Liu, Guojun Wang, Wenjun Jiang, Yinong Long:
DHMRF: A Dynamic Hybrid Movie Recommender Framework. APSCC 2016: 491-503 - [c127]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Kim-Kwang Raymond Choo
:
Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System. HPCC/SmartCity/DSS 2016: 1226-1231 - [c126]Yinglong Dai, Wenjun Jiang, Guojun Wang:
Building Bayesian Inference Graphs for Healthcare Statistic Evidence. ICPP Workshops 2016: 415-420 - [c125]Dacheng Meng, Entao Luo, Guojun Wang:
A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare. MASS 2016: 299-306 - [c124]Tao Peng, Qin Liu, Guojun Wang, Yang Xiang:
Privacy Preserving Scheme for Location and Content Protection in Location-Based Services. SpaCCS 2016: 26-38 - [c123]Shaobo Zhang
, Qin Liu, Guojun Wang:
A Caching-Based Privacy-Preserving Scheme for Continuous Location-Based Services. SpaCCS Workshops 2016: 73-82 - [c122]Lei Zhou, Yang Shu, Guojun Wang:
A Software Detection Mechanism Based on SMM in Network Computing. SpaCCS Workshops 2016: 134-143 - [c121]Dacheng Meng, Wenbo Wang, Entao Luo, Guojun Wang:
Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare. SpaCCS 2016: 178-189 - [c120]Entao Luo, Wenbo Wang, Dacheng Meng, Guojun Wang:
A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks. SpaCCS 2016: 190-203 - [c119]Qiang Zhang, Qin Liu, Guojun Wang:
A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data. SpaCCS 2016: 265-278 - [c118]Xiaoyu Zhu, Guojun Wang, Dongqing Xie:
Fuzzy and Semantic Search over Encrypted Data in the Cloud. SpaCCS Workshops 2016: 332-341 - [c117]Lei Zhou, Xiaowei Liu, Qin Liu, Guojun Wang:
A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation. Trustcom/BigDataSE/ISPA 2016: 451-457 - [c116]Shaobo Zhang
, Qin Liu, Guojun Wang:
Enhancing Location Privacy through User-Defined Grid in Location-Based Services. Trustcom/BigDataSE/ISPA 2016: 730-736 - [c115]Xiaoyu Zhu, Qin Liu, Guojun Wang:
A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing. Trustcom/BigDataSE/ISPA 2016: 845-851 - [c114]Yang Shi, Yaoxue Zhang, Fangfang Zhou, Ying Zhao, Guojun Wang, Ronghua Shi, Xing Liang:
IDSPlanet: A Novel Radial Visualization of Intrusion Detection Alerts. VINCI 2016: 25-29 - [e12]Guojun Wang, Yanbo Han, Gregorio Martínez Pérez:
Advances in Services Computing - 10th Asia-Pacific Services Computing Conference, APSCC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10065, 2016, ISBN 978-3-319-49177-6 [contents] - [e11]Feng Bao, Liqun Chen, Robert H. Deng
, Guojun Wang:
Information Security Practice and Experience - 12th International Conference, ISPEC 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10060, 2016, ISBN 978-3-319-49150-9 [contents] - [e10]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero
, Sabu M. Thampi:
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10066, 2016, ISBN 978-3-319-49147-9 [contents] - [e9]Guojun Wang, Indrakshi Ray, José M. Alcaraz Calero
, Sabu M. Thampi:
Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings. Lecture Notes in Computer Science 10067, 2016, ISBN 978-3-319-49144-8 [contents] - 2015
- [j73]Tian Wang, Yiqiao Cai, Weijia Jia
, Sheng Wen
, Guojun Wang, Hui Tian
, Yonghong Chen, Bineng Zhong:
Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Networks 93: 199-212 (2015) - [j72]Fang Qi, Shaowei Wu, Zhe Tang, Guojun Wang:
Selective partial recovery optimisation strategy for SSL connection migration. Int. J. Auton. Adapt. Commun. Syst. 8(2/3): 213-227 (2015) - [j71]Hussein Walugembe, Tao Peng, Guojun Wang:
A weighted throttled load balancing approach for virtual machines in cloud environment. Int. J. Comput. Sci. Eng. 11(4): 402-408 (2015) - [j70]Xiaofei Xing, Dongqing Xie, Guojun Wang:
Energy-Balanced Data Gathering and Aggregating in WSNs: A Compressed Sensing Scheme. Int. J. Distributed Sens. Networks 11: 585191:1-585191:10 (2015) - [j69]Mir Sajjad Hussain Talpur, Md. Zakirul Alam Bhuiyan
, Guojun Wang:
Shared-node IoT network architecture with ubiquitous homomorphic encryption for healthcare monitoring. Int. J. Embed. Syst. 7(1): 43-54 (2015) - [j68]Mir Sajjad Hussain Talpur, Md. Zakirul Alam Bhuiyan
, Guojun Wang:
Energy-efficient healthcare monitoring with smartphones and IoT technologies. Int. J. High Perform. Comput. Netw. 8(2): 186-194 (2015) - [j67]Xiaofei Xing, Guojun Wang, Jie Li
:
A square-based coverage and connectivity probability model for WSNs. Int. J. Sens. Networks 19(3/4): 161-170 (2015) - [j66]Shuhong Chen
, Guojun Wang, Weijia Jia
:
κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph. Inf. Sci. 318: 123-143 (2015) - [j65]Shui Yu
, Guojun Wang, Wanlei Zhou
:
Modeling malicious activities in cyber space. IEEE Netw. 29(6): 83-87 (2015) - [j64]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring. IEEE Trans. Computers 64(2): 382-395 (2015) - [j63]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Athanasios V. Vasilakos
:
Local Area Prediction-Based Mobile Target Tracking in Wireless Sensor Networks. IEEE Trans. Computers 64(7): 1968-1982 (2015) - [j62]Rajiv Ranjan
, Lizhe Wang, Albert Y. Zomaya
, Dimitrios Georgakopoulos
, Xian-He Sun, Guojun Wang:
Recent advances in autonomic provisioning of big data applications on clouds. IEEE Trans. Cloud Comput. 3(2): 101-104 (2015) - [j61]Wenjun Jiang
, Jie Wu, Guojun Wang:
On Selecting Recommenders for Trust Evaluation in Online Social Networks. ACM Trans. Internet Techn. 15(4): 14:1-14:21 (2015) - [j60]Guojun Wang, Felix Musau, Song Guo
, Muhammad Bashir Abdullahi
:
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce. IEEE Trans. Parallel Distributed Syst. 26(3): 824-833 (2015) - [c113]Binji Mo, Wenjuan Tang, Yang Xu, Guojun Wang:
Design and Implementation of Streaming Application Execution Platform in Android. IEEE WISA 2015: 318-323 - [c112]Qin Liu, Guojun Wang, Jie Wu, Wei Chang:
User-Controlled Security Mechanism in Data-Centric Clouds. HPCC/CSS/ICESS 2015: 647-653 - [c111]Zheng Ma, Jin Zheng, Weijia Jia
, Guojun Wang:
An Efficient Spatial Query Processing Algorithm in Multi-sink Directional Sensor Network. ICA3PP (Workshops and Symposiums) 2015: 13-23 - [c110]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu, Tian Wang, Xiangyong Liu:
Resource-Efficient Vibration Data Collection in Cyber-Physical Systems. ICA3PP (3) 2015: 134-147 - [c109]Wenjuan Tang, Yang Xu, Guojun Wang, Yaoxue Zhang:
An Illegal Indirect Access Prevention Method in Transparent Computing System. ICA3PP (Workshops and Symposiums) 2015: 264-275 - [c108]Wang Yang, Lei Jia, Guojun Wang:
Application Streaming: A Mobile Application Distribution Method. ICA3PP (1) 2015: 303-316 - [c107]Binji Mo, Yang Xu, Guojun Wang:
Streaming Computing Technology for Android Applications: Design Model and Case Study. ICA3PP (Workshops and Symposiums) 2015: 370-381 - [c106]Jiaqi Liu, Guojun Wang, Deng Li, Hui Liu:
ESR: An Efficient, Scalable and Robust Overlay for Autonomic Communications. ICA3PP (1) 2015: 415-429 - [c105]Shaobo Zhang
, Qin Liu, Guojun Wang:
Deviation-Based Location Switching Protocol for Trajectory Privacy Protection. ICA3PP (3) 2015: 417-428 - [c104]Entao Luo, Qin Liu, Guojun Wang:
NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks. ICA3PP (3) 2015: 463-474 - [c103]Zhen Peng, Tian Wang, Md. Zakirul Alam Bhuiyan
, Xiaoqiang Wu, Guojun Wang:
Dependable Cascading Target Tracking in Heterogeneous Mobile Camera Sensor Networks. ICA3PP (Workshops and Symposiums) 2015: 531-540 - [c102]Xiaoyu Zhu, Qin Liu, Guojun Wang:
Verifiable Dynamic Fuzzy Search Over Encrypted Data in Cloud Computing. ICA3PP (3) 2015: 655-666 - [c101]Wenyin Yang, Guojun Wang, Md. Zakirul Alam Bhuiyan
:
Partitioning of Hypergraph Modeled Complex Networks Based on Information Entropy. ICA3PP (2) 2015: 678-690 - [c100]Wei Zhou, Yang Xu, Lijuan Yang, Guojun Wang:
Weight-Based Batch Rekeying Scheme for Dynamic Multi-privileged Group Communications. ICA3PP (Workshops and Symposiums) 2015: 678-690 - [c99]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xiaofei Xing, Xiangyong Liu:
Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring. PRDC 2015: 91-98 - [c98]Wei Zhou, Yang Xu, Guojun Wang:
Research on Key Management for Multi-privileged Group Communications. TrustCom/BigDataSE/ISPA (1) 2015: 151-158 - [e8]Guojun Wang, Albert Y. Zomaya, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9528, Springer 2015, ISBN 978-3-319-27118-7 [contents] - [e7]Guojun Wang, Albert Y. Zomaya
, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9529, Springer 2015, ISBN 978-3-319-27121-7 [contents] - [e6]Guojun Wang, Albert Y. Zomaya
, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part III. Lecture Notes in Computer Science 9530, Springer 2015, ISBN 978-3-319-27136-1 [contents] - [e5]Guojun Wang, Albert Y. Zomaya
, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - 15th International Conference, ICA3PP 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part IV. Lecture Notes in Computer Science 9531, Springer 2015, ISBN 978-3-319-27139-2 [contents] - [e4]Guojun Wang, Albert Y. Zomaya
, Gregorio Martínez Pérez, Kenli Li:
Algorithms and Architectures for Parallel Processing - ICA3PP International Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015, Proceedings. Lecture Notes in Computer Science 9532, Springer 2015, ISBN 978-3-319-27160-6 [contents] - [i1]Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Jiannong Cao:
Dependable Structural Helath Monitoring Using Wireless Sensor Networks. CoRR abs/1509.06065 (2015) - 2014
- [j59]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu
:
Containing smartphone worm propagation with an influence maximization algorithm. Comput. Networks 74: 103-113 (2014) - [j58]Sancheng Peng, Min Wu, Guojun Wang, Shui Yu
:
Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Comput. Secur. 44: 92-103 (2014) - [j57]Zheng Yan
, Guojun Wang, Valtteri Niemi, Robert H. Deng
:
Editorial: Special issue on trust in cyber, physical and social computing. Comput. Secur. 47: 1-2 (2014) - [j56]Wenjun Jiang, Guojun Wang, Jie Wu:
Generating trusted graphs for trust evaluation in online social networks. Future Gener. Comput. Syst. 31: 48-58 (2014) - [j55]Jin Zheng, Md. Zakirul Alam Bhuiyan
, Shaohua Liang, Xiaofei Xing, Guojun Wang:
Auction-based adaptive sensor activation algorithm for target tracking in wireless sensor networks. Future Gener. Comput. Syst. 39: 88-99 (2014) - [j54]Zhufang Kuang, Guojun Wang, Zhigang Chen, Hui Liu:
A distributed resource conservation multicast and spectrum allocation algorithm in cognitive wireless mesh networks. Int. J. Embed. Syst. 6(2/3): 198-206 (2014) - [j53]Pinial Khan Butt
, Wang Yang, Guojun Wang:
Achieving energy efficient advertisements traffic for smartphones. Int. J. Embed. Syst. 6(2/3): 225-232 (2014) - [j52]Qin Liu, Guojun Wang, Jie Wu:
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258: 355-370 (2014) - [j51]Yongming Xie, Guojun Wang:
Message matching-based greedy behavior detection in delay tolerant networks. J. Comput. Syst. Sci. 80(5): 903-915 (2014) - [j50]Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi
:
Group formation with neighbor similarity trust in P2P E-commerce. Peer-to-Peer Netw. Appl. 7(4): 295-310 (2014) - [j49]Qin Liu, Guojun Wang, Jie Wu:
Consistency as a Service: Auditing Cloud Consistency. IEEE Trans. Netw. Serv. Manag. 11(1): 25-35 (2014) - [j48]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Sensor Placement with Multiple Objectives for Structural Health Monitoring. ACM Trans. Sens. Networks 10(4): 68:1-68:45 (2014) - [j47]Zhenfu Cao
, Keqiu Li, Xu Li, Patrick D. McDaniel, Radha Poovendran
, Guojun Wang, Yang Xiang
:
Guest Editors' Introduction: Special Issue on Trust, Security, and Privacy in Parallel and Distributed Systems. IEEE Trans. Parallel Distributed Syst. 25(2): 279-282 (2014) - [j46]Guojun Wang, Md. Zakirul Alam Bhuiyan
, Jiannong Cao
, Jie Wu:
Detecting Movements of a Target Using Face Tracking in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 25(4): 939-949 (2014) - [j45]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Towards Differential Query Services in Cost-Efficient Clouds. IEEE Trans. Parallel Distributed Syst. 25(6): 1648-1658 (2014) - [j44]Guojun Wang, Wenjun Jiang, Jie Wu, Zhengli Xiong:
Fine-Grained Feature-Based Social Influence Evaluation in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(9): 2286-2296 (2014) - [j43]Xiaofei Xing, Guojun Wang, Jie Li
:
Polytype target coverage scheme for heterogeneous wireless sensor networks using linear programming. Wirel. Commun. Mob. Comput. 14(14): 1397-1408 (2014) - [c97]Fang Qi, Weijie Zhang, Guojun Wang, Hui Fang:
Unified Security Architecture Research for 5G Wireless System. IEEE WISA 2014: 91-94 - [c96]Guojun Wang, Qin Liu, Yang Xiang
, Jianer Chen:
Security from the transparent computing aspect. ICNC 2014: 216-220 - [c95]Wenjun Jiang, Jie Wu, Guojun Wang, Huanyang Zheng:
FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics. INFOCOM 2014: 1707-1715 - [c94]Md. Zakirul Alam Bhuiyan
, Guojun Wang:
Reliable Shortest Paths in Wireless Sensor Networks: Refocusing on Link Failure Scenarios from Applications. PRDC 2014: 225-233 - 2013
- [j42]Yongming Xie, Guojun Wang:
Practical distributed secret key generation for delay tolerant networks. Concurr. Comput. Pract. Exp. 25(14): 2067-2079 (2013) - [j41]Yueming Deng, Guojun Wang, Jiannong Cao
, Xin Xiao:
Practical secure and fast handoff framework for pervasive Wi-Fi access. IET Inf. Secur. 7(1): 22-29 (2013) - [j40]Guojun Wang, Fengshun Yue, Qin Liu:
A secure self-destructing scheme for electronic data. J. Comput. Syst. Sci. 79(2): 279-290 (2013) - [j39]Guojun Wang, Jianhua Ma, Xiaolin Andy Li, Athanasios V. Vasilakos
:
Special issue of JCSS on UbiSafe computing and communications. J. Comput. Syst. Sci. 79(5): 515-517 (2013) - [j38]Sancheng Peng, Guojun Wang, Shui Yu
:
Modeling the dynamics of worm propagation using two-dimensional cellular automata in smartphones. J. Comput. Syst. Sci. 79(5): 586-595 (2013) - [j37]Guojun Wang, Wanlei Zhou
, Laurence T. Yang:
Trust, security and privacy for pervasive applications. J. Supercomput. 64(3): 661-663 (2013) - [j36]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
User requirements-aware security ranking in SSL protocol. J. Supercomput. 64(3): 762-776 (2013) - [j35]Guojun Wang, Qiushuang Du, Wei Zhou, Qin Liu:
A scalable encryption scheme for multi-privileged group communications. J. Supercomput. 64(3): 1075-1091 (2013) - [c93]Tao Peng, Qin Liu, Guojun Wang:
Privacy Preserving for Location-Based Services Using Location Transformation. CSS 2013: 14-28 - [c92]Shuhong Chen, Guojun Wang, Weijia Jia
:
A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. CSS 2013: 387-402 - [c91]Juan Li, Wang Yang, Guojun Wang:
A Cross Layer Design for Improving Trivial File Transfer Protocol in Mobile Transparent Computing. HPCC/EUC 2013: 1872-1877 - [c90]Shaoming Guo, Wang Yang, Guojun Wang:
NFS Protocol Performance Analysis and Improvement for Mobile Transparent Computing. HPCC/EUC 2013: 1878-1883 - [c89]Huanying Yin, Wang Yang, Guojun Wang:
Wireless Multicast for Mobile Transparent Computing. HPCC/EUC 2013: 1884-1889 - [c88]Sancheng Peng, Guojun Wang, Shui Yu
:
Mining Mechanism of Top-k Influential Nodes Based on Voting Algorithm in Mobile Social Networks. HPCC/EUC 2013: 2194-2199 - [c87]Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, Jie Wu:
Outsourcing privacy-preserving social networks to a cloud. INFOCOM 2013: 2886-2894 - [c86]Xiaofei Xing, Dongqing Xie, Guojun Wang:
Data Gathering and Processing for Large-Scale Wireless Sensor Networks. MSN 2013: 354-358 - [c85]Wenjun Jiang, Jie Wu, Guojun Wang:
RATE: Recommendation-aware Trust Evaluation in Online Social Networks. NCA 2013: 149-152 - [c84]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Energy and bandwidth-efficient Wireless Sensor Networks for monitoring high-frequency events. SECON 2013: 194-202 - [c83]Sancheng Peng, Guojun Wang, Shui Yu
:
Modeling Malware Propagation in Smartphone Social Networks. TrustCom/ISPA/IUCC 2013: 196-201 - [c82]Wei Zhou, Yang Xu, Guojun Wang:
Distributed Group Key Management Using Multilinear Forms for Multi-privileged Group Communications. TrustCom/ISPA/IUCC 2013: 644-650 - [c81]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
, Jie Wu:
Local Monitoring and Maintenance for Operational Wireless Sensor Networks. TrustCom/ISPA/IUCC 2013: 837-844 - [c80]Li Li, Wang Yang, Guojun Wang:
HIWL: An Unsupervised Learning Algorithm for Indoor Wireless Localization. TrustCom/ISPA/IUCC 2013: 1747-1753 - [e3]Guojun Wang, Indrakshi Ray, Dengguo Feng, Muttukrishnan Rajarajan:
Cyberspace Safety and Security - 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings. Lecture Notes in Computer Science 8300, Springer 2013, ISBN 978-3-319-03583-3 [contents] - 2012
- [j34]Tian Wang, Weijia Jia, Guojun Wang, Minyi Guo, Jie Li:
Hole Avoiding in Advance Routing with Hole Recovery Mechanism in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 16(1-3): 191-138 (2012) - [j33]Gaocai Wang, Guojun Wang, Zhiguang Shan:
Fault tolerance analysis of mesh networks with uniform versus nonuniform node failure probability. Inf. Process. Lett. 112(10): 396-401 (2012) - [j32]Laurence Tianruo Yang, Guojun Wang:
Special issue on trusted computing and communications. J. Netw. Comput. Appl. 35(3): 865-866 (2012) - [j31]Qin Liu, Guojun Wang, Jie Wu:
Secure and privacy preserving keyword searching for cloud storage services. J. Netw. Comput. Appl. 35(3): 927-933 (2012) - [j30]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Cooperative private searching in clouds. J. Parallel Distributed Comput. 72(8): 1019-1031 (2012) - [j29]Felix Musau, Guojun Wang, Shui Yu
, Muhammad Bashir Abdullahi
:
Securing Recommendations in Grouped P2P E-Commerce Trust Model. IEEE Trans. Netw. Serv. Manag. 9(4): 407-420 (2012) - [c79]Qin Liu, Yuhong Guo, Jie Wu, Guojun Wang:
Dynamic Grouping Strategy in Cloud Computing. CGC 2012: 59-66 - [c78]Md. Zakirul Alam Bhuiyan
, Jiannong Cao
, Guojun Wang:
Deploying Wireless Sensor Networks with Fault Tolerance for Structural Health Monitoring. DCOSS 2012: 194-202 - [c77]Muhammad Bashir Abdullahi
, Guojun Wang:
Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks. DCOSS 2012: 297-299 - [c76]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jiannong Cao
:
Sensor Placement with Multiple Objectives for Structural Health Monitoring in WSNs. HPCC-ICESS 2012: 699-706 - [c75]Qin Liu, Guojun Wang, Jie Wu:
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds. ICPP Workshops 2012: 304-305 - [c74]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Efficient information retrieval for ranked queries in cost-effective cloud environments. INFOCOM 2012: 2581-2585 - [c73]Md. Zakirul Alam Bhuiyan
, Jiannong Cao
, Guojun Wang, Xuefeng Liu:
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks. SRDS 2012: 301-310 - [c72]Zhengli Xiong, Wenjun Jiang, Guojun Wang:
Evaluating User Community Influence in Online Social Networks. TrustCom 2012: 640-647 - [c71]Muhammad Bashir Abdullahi
, Guojun Wang:
A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks. TrustCom 2012: 978-985 - [c70]Felix Musau, Guojun Wang, Song Guo
, Muhammad Bashir Abdullahi
:
Neighbor Similarity Trust against Sybil Attack in P2P E-commerce. UIC/ATC 2012: 547-554 - [e2]Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya:
Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part I. Lecture Notes in Computer Science 7439, Springer 2012, ISBN 978-3-642-33077-3 [contents] - [e1]Yang Xiang, Ivan Stojmenovic, Bernady O. Apduhan, Guojun Wang, Koji Nakano, Albert Y. Zomaya:
Algorithms and Architectures for Parallel Processing - 12th International Conference, ICA3PP 2012, Fukuoka, Japan, September 4-7, 2012, Proceedings, Part II. Lecture Notes in Computer Science 7440, Springer 2012, ISBN 978-3-642-33064-3 [contents] - 2011
- [j28]Guojun Wang, Qin Liu, Jie Wu, Minyi Guo:
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. Comput. Secur. 30(5): 320-331 (2011) - [j27]Guojun Wang, Qin Liu, Jie Wu:
Achieving fine-grained access control for secure data sharing on cloud servers. Concurr. Comput. Pract. Exp. 23(12): 1443-1464 (2011) - [j26]Guojun Wang, Jie Wu:
FlowTrust: trust inference with network flows. Frontiers Comput. Sci. China 5(2): 181-194 (2011) - [j25]Guojun Wang, Jie Wu:
Multi-dimensional evidence-based trust management with multi-trusted paths. Future Gener. Comput. Syst. 27(5): 529-538 (2011) - [j24]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Guest editorial: Trusted computing and communications. Secur. Commun. Networks 4(1): 1-2 (2011) - [j23]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
SSL-enabled trusted communication: Spoofing and protecting the non-cautious users. Secur. Commun. Networks 4(4): 372-383 (2011) - [c69]Xuefeng Liu, Jiannong Cao
, Md. Zakirul Alam Bhuiyan
, Steven Lai, Hejun Wu, Guojun Wang:
Fault tolerant WSN-based structural health monitoring. DSN 2011: 37-48 - [c68]Qin Liu, Chiu C. Tan, Jie Wu, Guojun Wang:
Reliable Re-Encryption in Unreliable Clouds. GLOBECOM 2011: 1-5 - [c67]Sancheng Peng, Guojun Wang:
Worm Propagation Modeling Using 2D Cellular Automata in Bluetooth Networks. TrustCom 2011: 282-287 - [c66]Wenjun Jiang, Guojun Wang:
SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks. TrustCom 2011: 320-327 - [c65]Yongming Xie, Guojun Wang:
Distributed Private-Key Generation Scheme with Self-Certified Identity. TrustCom 2011: 501-508 - [c64]Muhammad Bashir Abdullahi
, Guojun Wang, Felix Musau:
A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks. TrustCom 2011: 548-555 - [c63]Felix Musau, Guojun Wang, Muhammad Bashir Abdullahi
:
Group Formation with Neighbor Similarity Trust in P2P E-Commerce. TrustCom 2011: 835-840 - [c62]Shaohua Liang, Md. Zakirul Alam Bhuiyan
, Guojun Wang:
Auction-Based Adaptive Sensor Activation Algorithm for Target Tracking in WSNs. TrustCom 2011: 1217-1223 - [c61]Zheng Ma, Weijia Jia
, Guojun Wang:
Routing with Virtual Region Coordinates in Wireless Sensor Networks. TrustCom 2011: 1657-1661 - 2010
- [j22]Guojun Wang, Md. Zakirul Alam Bhuiyan
, Li Zhang:
Two-level cooperative and energy-efficient tracking algorithm in wireless sensor networks. Concurr. Comput. Pract. Exp. 22(4): 518-537 (2010) - [j21]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai:
Foreword. IEICE Trans. Inf. Syst. 93-D(3): 409-410 (2010) - [j20]Sancheng Peng, Weijia Jia
, Guojun Wang, Jie Wu, Minyi Guo:
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks. IEICE Trans. Inf. Syst. 93-D(3): 510-517 (2010) - [j19]Minyi Guo, Elizabeth Olule, Guojun Wang, Song Guo
:
Designing energy efficient target tracking protocol with quality monitoring in wireless sensor networks. J. Supercomput. 51(2): 131-148 (2010) - [c60]Yongming Xie, Guojun Wang, Jie Wu:
Fuzzy Location Service for Mobile Ad Hoc Networks. CIT 2010: 289-296 - [c59]Qin Liu, Guojun Wang, Jie Wu:
Efficient Sharing of Secure Cloud Storage Services. CIT 2010: 922-929 - [c58]Guojun Wang, Qin Liu, Jie Wu:
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. CCS 2010: 735-737 - [c57]Qiushuang Du, Guojun Wang, Qin Liu:
A Scalable Encryption Scheme for Multi-Privileged Group Communications. EUC 2010: 597-602 - [c56]Fengshun Yue, Guojun Wang, Qin Liu:
A Secure Self-Destructing Scheme for Electronic Data. EUC 2010: 651-658 - [c55]Jin Zheng, Weijia Jia
, Guojun Wang, Jie Wu:
Target Trajectory Querying in Wireless Sensor Networks. ICC 2010: 1-6 - [c54]Xiaofei Xing, Jie Li
, Guojun Wang:
Integer Programming Scheme for Target Coverage in Heterogeneous Wireless Sensor Networks. MSN 2010: 79-84 - [c53]Yun Ge, Guojun Wang, Jie Wu:
Node-Disjoint Multipath Routing with Group Mobility in MANETs. NAS 2010: 181-189
2000 – 2009
- 2009
- [j18]Yun Ge, Guojun Wang, Qing Zhang, Minyi Guo:
Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks. IEICE Trans. Inf. Syst. 92-D(9): 1675-1682 (2009) - [j17]Jiannong Cao
, Lin Liao, Guojun Wang, Hao Ma, Bin Xiao
:
A novel dual-key management protocol based on a hierarchical multicast infrastructure in mobile internet. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 183-190 (2009) - [j16]Wenfeng Du, Weijia Jia
, Guojun Wang, Wenyan Lu:
Analysis of channel allocation scheme for wireless cellular networks. Int. J. Ad Hoc Ubiquitous Comput. 4(3/4): 201-209 (2009) - [j15]Jin Zheng, Weijia Jia
, Guojun Wang:
Data Management of Mobile Object Tracking Applications in Wireless Sensor Networks. J. Comput. 4(9): 845-852 (2009) - [j14]San-Cheng Peng, Weijia Jia
, Guo-Jun Wang:
Survivability Evaluation in Large-Scale Mobile Ad-Hoc Networks. J. Comput. Sci. Technol. 24(4): 761-774 (2009) - [j13]Guojun Wang, Tian Wang, Weijia Jia
, Minyi Guo, Jie Li
:
Adaptive location updates for mobile sinks in wireless sensor networks. J. Supercomput. 47(2): 127-145 (2009) - [c52]Xiaofei Xing, Guojun Wang, Jie Wu, Jie Li
:
Square region-based coverage and connectivity probability model in wireless sensor networks. CollaborateCom 2009: 1-8 - [c51]Qin Liu, Guojun Wang, Jie Wu:
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing. CSE (2) 2009: 715-720 - [c50]Huang Lu
, Jie Li
, Guojun Wang:
A Novel Energy Efficient Routing Algorithm for Hierarchically Clustered Wireless Sensor Networks. FCST 2009: 565-570 - [c49]Weirong Liu, Min Wu, Jun Peng, Guojun Wang:
A Fuzzy Mechanism to Avoid Packet Accumulation in Fair Flow Control. FSKD (3) 2009: 450-454 - [c48]Weirong Liu, Min Wu, Jun Peng, Guojun Wang:
Designing fair flow fuzzy controller using genetic algorithm for computer networks. GEC Summit 2009: 361-368 - [c47]Peiqiang Li, Guojun Wang, Jie Wu, Hong-Chuan Yang:
Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks. GLOBECOM 2009: 1-6 - [c46]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu:
Target Tracking with Monitor and Backup Sensors in Wireless Sensor Networks. ICCCN 2009: 1-6 - [c45]Md. Zakirul Alam Bhuiyan
, Guojun Wang, Jie Wu:
Polygon-Based Tracking Framework in Surveillance Wireless Sensor Networks. ICPADS 2009: 174-181 - [c44]Khoriba Ghada
, Jie Li
, Yusheng Ji, Guojun Wang:
Cross-layer Approach for Energy Efficient Routing in WANETs. MASS 2009: 393-402 - [c43]Fang Qi, Zhe Tang, Guojun Wang, Jie Wu:
QoS-aware Optimization Strategy for Security Ranking in SSL Protocol. MASS 2009: 842-847 - [c42]Xiaofei Xing, Guojun Wang, Jie Wu:
Herd-Based Target Tracking Protocol in Wireless Sensor Networks. WASA 2009: 135-148 - [c41]Yulei Wu, Geyong Min, Guojun Wang, Jianmin Jiang:
Modelling of heterogeneous wireless networks under batch arrival traffic with communication locality. WCNC 2009: 2798-2803 - 2008
- [j12]Guojun Wang, Lifan Zhang, Jiannong Cao
:
Hole-shadowing routing in large-scale MANETs. Int. J. Sens. Networks 4(4): 220-229 (2008) - [c40]Sancheng Peng, Weijia Jia
, Guojun Wang:
Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad Hoc Networks. EUC (2) 2008: 3-9 - [c39]Yun Ge, Guojun Wang, Weijia Jia, Yongming Xie:
Node-Disjoint Multipath Routing with Zoning Method in MANETs. HPCC 2008: 456-462 - [c38]Qingjun Mo, Guojun Wang, Weijia Jia
, Sancheng Peng:
Virtual Ring-Based Hole Avoiding Routing in Mobile Ad Hoc Networks. ICPADS 2008: 377-382 - [c37]Sancheng Peng, Weijia Jia
, Guojun Wang:
Quantitative Evaluation Model for Survivability in Large-Scale MANETs Based on Reliability Theory. ICYCS 2008: 432-438 - [c36]Yuan Lu, Guojun Wang, Weijia Jia
, Sancheng Peng:
Multipath-Based Segment-by-Segment Routing Protocol in MANETs. ICYCS 2008: 527-532 - [c35]Jin Zheng, Weijia Jia, Guojun Wang:
A Novel Link-Segment Storage and Query Scheme for Object Tracking Applications in Wireless Sensor Networks. ICYCS 2008: 545-551 - [c34]Fang Qi, Zhe Tang, Guojun Wang:
Attacks vs. Countermeasures of SSL Protected Trust Model. ICYCS 2008: 1986-1991 - [c33]Yujie Chen, Guojun Wang, Sancheng Peng:
Link Lifetime-Based Segment-by-Segment Routing Protocol in MANETs. ISPA 2008: 387-392 - 2007
- [j11]Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo:
Efficient group key management for multi-privileged groups. Comput. Commun. 30(11-12): 2497-2509 (2007) - [j10]Jianer Chen, GaoCai Wang, Chuang Lin, Tao Wang, Guojun Wang:
Probabilistic analysis on mesh network fault tolerance. J. Parallel Distributed Comput. 67(1): 100-110 (2007) - [j9]Jiannong Cao, Guojun Wang, Keith C. C. Chan:
A Fault-Tolerant Group Communication Protocol in Large Scale and Highly Dynamic Mobile Next-Generation Networks. IEEE Trans. Computers 56(1): 80-94 (2007) - [c32]Guojun Wang, Qiong Wang, Jiannong Cao, Minyi Guo:
An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks. CIT 2007: 749-754 - [c31]Guojun Wang, Qingjun Mo, Minyi Guo, Weijia Jia:
Designing Piecewise QoS Routing Protocol in Large-Scale MANETs. FCST 2007: 1-6 - [c30]Guojun Wang, Jie Ouyang, Hsiao-Hwa Chen, Minyi Guo:
ID-Based Hierarchical Key Graph Scheme in Multi-Privileged Group Communications. GLOBECOM 2007: 172-176 - [c29]Guojun Wang, Jiannong Cao
, Huan Wang, Minyi Guo:
Polynomial Regression for Data Gathering in Environmental Monitoring Applications. GLOBECOM 2007: 1307-1311 - [c28]Jianxin Wang, Liang Rong, Guojun Wang, Weijia Jia, Minyi Guo:
Design of a Stabilizing Second-Order Congestion Controller for Large-Delay Networks. ICC 2007: 287-292 - [c27]Guojun Wang, Tian Wang, Weijia Jia, Minyi Guo, Hsiao-Hwa Chen, Mohsen Guizani:
Local Update-Based Routing Protocol in Wireless Sensor Networks with Mobile Sinks. ICC 2007: 3094-3099 - [c26]Mianxiong Dong
, Kaoru Ota
, Zixue Cheng, Guojun Wang:
A Support Method for Improving Learner's Learning Habit Using Behavior Analysis in a Ubiquitous Environment. ICPP Workshops 2007: 67 - [c25]Elizabeth Olule, Guojun Wang, Minyi Guo, Mianxiong Dong
:
RARE: An Energy-Efficient Target Tracking Protocol for Wireless Sensor Networks. ICPP Workshops 2007: 76 - [c24]Guojun Wang, Huan Wang, Jiannong Cao, Minyi Guo:
Energy-Efficient Dual Prediction-Based Data Gathering for Environmental Monitoring Applications. WCNC 2007: 3513-3518 - [c23]Weijia Jia, Tian Wang, Guojun Wang, Minyi Guo:
Hole Avoiding in Advance Routing in Wireless Sensor Networks. WCNC 2007: 3519-3523 - [c22]Weijia Jia, Dingzhu Lu, Guojun Wang, Lizhuo Zhang:
Local Retransmission-Based Gossip Protocol in Mobile Ad Hoc Networks. WCNC 2007: 4244-4249 - 2006
- [j8]Guojun Wang, Jiannong Cao
, Keith C. C. Chan
:
A self-organizable topology maintenance protocol for mobile group communications in mobile next-generation networks. Comput. Commun. 29(10): 1730-1743 (2006) - [j7]Jiannong Cao
, Lin Liao, Guojun Wang:
Scalable key management for secure multicast communication in the mobile environment. Pervasive Mob. Comput. 2(2): 187-203 (2006) - [c21]Guojun Wang, Jiannong Cao
, Keith C. C. Chan
:
A Proxy-based Mobile Group Membership Protocol for Large Scale and Highly Dynamic Groups. ICC 2006: 1897-1902 - [c20]Guojun Wang, Lifan Zhang, Jiannong Cao
:
Logical Location-based Routing with Hole-shadowing in Large-scale MANETs. ICC 2006: 3560-3565 - [c19]Jiannong Cao
, Lifan Zhang, Guojun Wang, Hui Cheng:
SSR: Segment-by-Segment Routing in Large-Scale Mobile Ad Hoc Networks. MASS 2006: 216-225 - 2005
- [j6]Jianer Chen, Iyad A. Kanj, Guojun Wang:
Hypercube Network Fault Tolerance: A Probabilistic Approach. J. Interconnect. Networks 6(1): 17-34 (2005) - [j5]Guojun Wang, Jiannong Cao
, Keith C. C. Chan
:
A novel group communication protocol using the RingNet hierarchy in mobile Internet. Parallel Algorithms Appl. 20(3-4): 253-280 (2005) - [j4]Guojun Wang, Jiannong Cao
, Keith C. C. Chan
:
A protocol for partitionable group membership service in mobile Internet. Wirel. Commun. Mob. Comput. 5: 773-792 (2005) - [c18]Guojun Wang, Yingjun Lin, Minyi Guo:
A Scalable and Reliable Multiple Home Regions Based Location Service in Mobile Ad Hoc Networks. EUC 2005: 550-559 - [c17]Wenfeng Du, Lidong Lin, Weijia Jia, Guojun Wang:
Modeling and Performance Evaluation of Handover Service in Wireless Networks. ICCNMC 2005: 229-238 - [c16]Guojun Wang, Lifan Zhang, Jiannong Cao:
A Virtual Circle-Based Clustering Algorithm with Mobility Prediction in Large-Scale MANETs. ICCNMC 2005: 364-374 - [c15]Jiannong Cao, Lin Liao, Guojun Wang, Bin Xiao:
A Novel Dual-Key Management Protocol Based on a Hierarchical Multicast Infrastructure in Mobile Internet. ICCNMC 2005: 560-569 - [c14]Fang Qi, Jin Zheng, Weijia Jia, Guojun Wang:
Available Bandwidth Measurement Schemes over Networks. ICCNMC 2005: 931-940 - [c13]Guojun Wang, Jiannong Cao
, Lifan Zhang, Keith C. C. Chan
, Jie Wu:
A Novel QoS Multicast Model in Mobile Ad Hoc Networks. IPDPS 2005 - [c12]Guojun Wang, Zhongshan Gao, Lifan Zhang, Jiannong Cao
:
Prediction-Based Multicast Mobility Management in Mobile Internet. ISPA 2005: 1024-1035 - [c11]Guojun Wang, Dingzhu Lu, Weijia Jia, Jiannong Cao:
Reliable Gossip-Based Broadcast Protocol in Mobile Ad Hoc Networks. MSN 2005: 207-218 - 2004
- [j3]Gao-Cai Wang, Jianer Chen, Guo-Jun Wang:
On Fault Tolerance of 3-Dimensional Mesh Networks. J. Comput. Sci. Technol. 19(2): 183-190 (2004) - [c10]Guojun Wang, Lin Liao, Jiannong Cao, Keith C. C. Chan:
Key Management for Secure Multicast Using the RingNet Hierarchy. CIS 2004: 77-84 - [c9]Guojun Wang, Jiannong Cao, Keith C. C. Chan:
RGB: A Scalable and Reliable Group Membership Protocol in Mobile Internet. ICPP 2004: 326-333 - [c8]Guojun Wang, Jiannong Cao
, Keith C. C. Chan
:
A Reliable Totally-Ordered Group Multicast Protocol for Mobile Internet. ICPP Workshops 2004: 108-115 - [c7]Guojun Wang, Jun Luo, Jiannong Cao, Keith C. C. Chan:
QoSRHMM: A QoS-Aware Ring-Based Hierarchical Multi-path Multicast Routing Protocol. ISPA 2004: 568-577 - [c6]Xiaolin Xiao, Guojun Wang, Jianer Chen:
Fault Tolerant Routing Algorithm in Hypercube Networks with Load Balancing Support. ISPA 2004: 698-704 - [c5]GaoCai Wang, Jianer Chen, Guojun Wang:
On Fault Tolerance of 3-Dimensional Mesh Networks. ISPAN 2004: 149-154 - 2003
- [c4]Gaocai Wang, Jianer Chen, Guojun Wang, Songqiao Chen:
Probability Model for Faults in Large-Scale Multicomputer Systems. Asian Test Symposium 2003: 452-457 - [c3]GaoCai Wang, Jianer Chen, Guojun Wang:
A Probabilistic Approach to Fault Tolerant Broadcast Routing Algorithms on Mesh Networks. IPDPS 2003: 216 - [c2]GaoCai Wang, Jianer Chen, Guojun Wang:
Probabilistic Analysis of Connectivity on Mesh Networks. ITCC 2003: 362-366 - 2002
- [j2]Jianer Chen, Guojun Wang, Songqiao Chen:
Locally Subcube-Connected Hypercube Networks: Theoretical Analysis and Experimental Results. IEEE Trans. Computers 51(5): 530-540 (2002) - [c1]Jianer Chen, Iyad A. Kanj, Guojun Wang:
Hypercube Network Fault Tolerance: A Probabilistic Approach. ICPP 2002: 65-72 - 2001
- [j1]Jianer Chen, Guojun Wang, Songqiao Chen:
Routing in Hypercube Networks with a Constant Fraction of Faulty Nodes. J. Interconnect. Networks 2(3): 283-294 (2001)
Coauthor Index
[j212] [j209] [j208] [j207] [j187] [j178] [j169] [j168] [j164] [j158] [j157] [j156] [c240] [e23] [e22] [j150] [j149] [j142] [j141] [j139] [j131] [j130] [j129] [c223] [c217] [c213] [e21] [e19] [e18] [j125] [j124] [j120] [j116] [c206] [c200] [c198] [c194] [c186] [c180] [c176] [e15] [j96] [j93] [j92] [j91] [j90] [c169] [c168] [c163] [c160] [c154] [c147] [c146] [c141] [c135] [j85] [j75] [j74] [c127] [j69] [j68] [j64] [j63] [c110] [c103] [c101] [c99] [i1] [j55] [j48] [j46] [c94] [c84] [c81] [c78] [c76] [c73] [c69] [c62] [j22] [c46] [c45]
[j251] [j250] [j248] [j233] [j230] [j229] [j228] [j227] [j221] [j216] [j213] [j210] [j209] [j206] [j198] [j197] [c250] [j196] [j188] [j182] [c243] [j159] [j151] [j144] [j140] [j138] [j136] [j126] [j121] [j118] [j116] [j113] [c207] [c195] [c189] [c182] [j108] [j105] [j104] [j103] [j98] [j97] [j94] [j89] [c167] [c166] [c156] [c155] [c152] [c143] [c139] [c138] [j82] [c124] [c123] [c119] [c117] [c116] [c115] [c112] [c105] [c104] [c102] [j52] [j49] [j45] [c96] [j40] [j35] [c93] [c87] [j31] [j30] [c79] [c75] [c74] [j28] [j27] [c68] [c59] [c58] [c57] [c56] [c51]
[j250] [j243] [j240] [j233] [j231] [j230] [j229] [j228] [j227] [j222] [j217] [j215] [j213] [c258] [c253] [j210] [j198] [j197] [c250] [c249] [c248] [c245] [j188] [c244] [c243] [c242] [j166] [j165] [j159] [c228] [c227] [j144] [j143] [j136] [c220] [c207] [c206] [c192] [c191] [c190] [c184] [c182] [c173] [j108] [j105] [j98] [j94] [c167] [c166] [c152] [c124] [j71] [c93]