


default search action
Chenyu Wang 0002
Person information
- affiliation: Beijing University of Posts and Telecommunications (BUPT), School of Cyberspace Security, Beijing, China
Other persons with the same name
- Chenyu Wang (aka: Chen-Yu Wang, Chen-yu Wang) — disambiguation page
- Chenyu Wang 0001
— University of Sydney, Brain and Mind Centre, Australia
- Chenyu Wang 0003 — Massachusetts Institute of Technology (MIT), Computer Science and Artificial Intelligence Laboratory (CSAIL), Cambridge, MA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j24]Shihong Zou, Qiang Cao
, Ruichao Lu, Chenyu Wang, Guoai Xu, Huanhuan Ma, Yingyi Cheng, Jinwen Xi:
A robust and effective 3-factor authentication protocol for smart factory in IIoT. Comput. Commun. 220: 81-93 (2024) - [j23]Pengbo Xu
, Huici Wu
, Xiaofeng Tao
, Chenyu Wang
, Dajiang Chen
, Guoshun Nan
:
Anti-Quantum Certificateless Group Authentication for Massive Accessing IoT Devices. IEEE Internet Things J. 11(9): 16561-16577 (2024) - [j22]Shihong Zou
, Qiang Cao
, Chonghui Huangqi, Anpeng Huang, Yanping Li
, Chenyu Wang
, Guoai Xu:
A Physician's Privacy-Preserving Authentication and Key Agreement Protocol Based on Decentralized Identity for Medical Data Sharing in IoMT. IEEE Internet Things J. 11(17): 29174-29189 (2024) - [j21]Juliang Cai
, Xiaofeng Tao
, Chenyu Wang
:
Cooperative Authentication Scheme for Heterogeneous Networks Based on Identity Group Signature and Blockchain. IEEE Trans. Veh. Technol. 73(1): 1394-1399 (2024) - 2023
- [j20]Boya Liu, Guoai Xu, Guosheng Xu
, Chenyu Wang, Peiliang Zuo
:
Deep Reinforcement Learning-Based Intelligent Security Forwarding Strategy for VANET. Sensors 23(3): 1204 (2023) - [j19]Kaijun Liu, Guosheng Xu
, Qiang Cao
, Chenyu Wang, Jingjing Jia, Yuan Gao, Guoai Xu:
A Rivest-Shamir-Adleman-Based Robust and Effective Three-Factor User Authentication Protocol for Healthcare Use in Wireless Body Area Networks. Sensors 23(21): 8992 (2023) - [j18]Huanhuan Ma
, Chenyu Wang
, Guosheng Xu
, Qiang Cao
, Guoai Xu
, Li Duan
:
Anonymous Authentication Protocol Based on Physical Unclonable Function and Elliptic Curve Cryptography for Smart Grid. IEEE Syst. J. 17(4): 6425-6436 (2023) - [j17]Chenyu Wang
, Ding Wang
, Yihe Duan
, Xiaofeng Tao
:
Secure and Lightweight User Authentication Scheme for Cloud-Assisted Internet of Things. IEEE Trans. Inf. Forensics Secur. 18: 2961-2976 (2023) - [j16]Sixian Yu
, Qiang Cao
, Chenyu Wang
, Guoai Xu
, Huanhuan Ma, Yucheng Zhu, Yihang Peng, Yan Jia:
Efficient ECC-Based Conditional Privacy-Preserving Aggregation Signature Scheme in V2V. IEEE Trans. Veh. Technol. 72(11): 15028-15039 (2023) - [c4]Guosheng Xu
, Xinyu Wang
, Cheng Yu
, Haoran Zhao
, Yanhui Guo
, Jinghong Guo
, Chenyu Wang
:
Research on Cryptographic Misuse Detection for Android Applications Based on Dynamic and Static Combination. AAIA 2023: 364-373 - [c3]Yuxin Zhao, Zixiang Bi, Guosheng Xu, Chenyu Wang, Guoai Xu:
Tree-IDS: An Incremental Intrusion Detection System for Connected Vehicles. LCN 2023: 1-4 - 2022
- [j15]Chenyu Wang, Ding Wang
, Guoai Xu, Debiao He:
Efficient privacy-preserving user authentication scheme with forward secrecy for industry 4.0. Sci. China Inf. Sci. 65(1) (2022) - [j14]Jiangtao Yuan, Jing Yang, Chenyu Wang, Xingxing Jia, Fang-Wei Fu, Guoai Xu:
A new efficient hierarchical multi-secret sharing scheme based on linear homogeneous recurrence relations. Inf. Sci. 592: 36-49 (2022) - [j13]Jianghan Mao, Chenyu Wang, Yanhui Guo, Guoai Xu, Shoufeng Cao, Xuanwen Zhang, Zixiang Bi
:
A novel model for voice command fingerprinting using deep learning. J. Inf. Secur. Appl. 65: 103085 (2022) - [j12]Zixiang Bi
, Guoai Xu, Guosheng Xu
, Chenyu Wang, Sutao Zhang:
Bit-Level Automotive Controller Area Network Message Reverse Framework Based on Linear Regression. Sensors 22(3): 981 (2022) - [j11]Shihong Zou
, Qiang Cao
, Chenyu Wang, Zifu Huang, Guoai Xu
:
A Robust Two-Factor User Authentication Scheme-Based ECC for Smart Home in IoT. IEEE Syst. J. 16(3): 4938-4949 (2022) - [j10]Chenyu Wang, Ding Wang
, Yi Tu
, Guoai Xu
, Huaxiong Wang
:
Understanding Node Capture Attacks in User Authentication Schemes for Wireless Sensor Networks. IEEE Trans. Dependable Secur. Comput. 19(1): 507-523 (2022) - [c2]Yuhao Gao, Guoai Xu, Li Li, Xiapu Luo, Chenyu Wang, Yulei Sui:
Demystifying the underground ecosystem of account registration bots. ESEC/SIGSOFT FSE 2022: 897-909 - 2020
- [j9]Ding Wang
, Ping Wang, Chenyu Wang:
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs. ACM Trans. Cyber Phys. Syst. 4(3): 30:1-30:26 (2020) - [j8]Meijia Xu
, Qiying Dong
, Mai Zhou
, Chenyu Wang
, Yangyang Liu
:
Security Analysis on "Anonymous Authentication Scheme for Smart Home Environment with Provable Security". Wirel. Commun. Mob. Comput. 2020: 8838363:1-8838363:4 (2020) - [i1]Jiangtao Yuan, Jing Yang, Guoai Xu, Xingxing Jia, Fang-Wei Fu, Chenyu Wang:
A New Efficient Hierarchical Multi-secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. IACR Cryptol. ePrint Arch. 2020: 1612 (2020)
2010 – 2019
- 2019
- [j7]Feifei Wang
, Guoai Xu
, Chenyu Wang
, Junhao Peng:
A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment. Secur. Commun. Networks 2019: 2838615:1-2838615:15 (2019) - [c1]Chenyu Wang, Ding Wang
, Haowei Wang, Guoai Xu, Jing Sun, Huaxiong Wang:
Cloud-Aided Privacy Preserving User Authentication and Key Agreement Protocol for Internet of Things. SocialSec 2019: 95-109 - 2018
- [j6]Miao Zhang, Chenyu Wang, Jiteng Wang, Si Tian, Yanwei Li:
A New Approach to Security Analysis of Smart Home Authentication Systems. Fundam. Informaticae 157(1-2): 153-165 (2018) - [j5]Chenyu Wang
, Guoai Xu
, Wenting Li:
A Secure and Anonymous Two-Factor Authentication Protocol in Multiserver Environment. Secur. Commun. Networks 2018: 9062675:1-9062675:15 (2018) - [j4]Chenyu Wang
, Ke Ding, Bin Li, Yiming Zhao
, Guoai Xu
, Yanhui Guo, Ping Wang
:
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment. Wirel. Commun. Mob. Comput. 2018: 3048697:1-3048697:13 (2018) - 2017
- [j3]Chenyu Wang
, Ding Wang
, Guoai Xu, Yanhui Guo:
A lightweight password-based authentication protocol using smart card. Int. J. Commun. Syst. 30(16) (2017) - [j2]Chenyu Wang
, Guoai Xu:
Cryptanalysis of Three Password-Based Remote User Authentication Schemes with Non-Tamper-Resistant Smart Card. Secur. Commun. Networks 2017: 1619741:1-1619741:14 (2017) - [j1]Chenyu Wang
, Guoai Xu, Jing Sun:
An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks. Sensors 17(12): 2946 (2017)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-05-28 20:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint