Jian Wang

Affiliations:
  • Beijing Jiaotong University, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing, China


According to our database1, Jian Wang authored at least 12 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure and Scalable Blockchain for IIoT with Dual Compression Scheme.
Proceedings of the 2023 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2023

2022
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Anonymous Storage and Verification Model of IIoT Based on Blockchain: Anonymous storage and verification model of IIoT production status based on blockchain.
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021

BSS-ITS: Blockchain Scaling Scheme with Sharding for Intelligent Transportation System: Scale Blockchain for Better Data Exchange and Storage with Full Sharding for Intelligent Transportation System.
Proceedings of the ICBTA 2021: 4th International Conference on Blockchain Technology and Applications, Xi'an, China, December 17, 2021

Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
Proceedings of the International Symposium on Reliable Distributed Systems, 2020

Malware Analysis Method Based Random Access Memory in Android.
Proceedings of the Applications and Techniques in Information Security, 2020

2019
Adaptive Quantum Image Encryption Method Based on Wavelet Transform.
CoRR, 2019

IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Intrusion Prediction With System-Call Sequence-to-Sequence Model.
IEEE Access, 2018

Multi-Dimension Threat Situation Assessment Based on Network Security Attributes.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018


  Loading...