Changda Wang

Orcid: 0000-0002-7024-4559

Affiliations:
  • Jiangsu University, School of Computer Science and Communication Engineering, Zhenjiang, China
  • Carleton University, School of Computer Science, Ottawa, Canada


According to our database1, Changda Wang authored at least 49 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes.
J. Supercomput., November, 2024

RAB: A lightweight block cipher algorithm with variable key length.
Peer Peer Netw. Appl., September, 2024

Joint Optimization for Fairness-Revenue Adjustable Network Slices Embedding.
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024

Early DDoS Alerts Based on Optimal Sub-OD Pairs and Markov Model.
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024

Link failure recovery through nested cycles.
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024

2023
A Deep Learning Approach to Online Social Network Account Compromisation.
IEEE Trans. Comput. Soc. Syst., December, 2023

Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning.
J. Netw. Syst. Manag., April, 2023

LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages.
Symmetry, 2023

The core nodes identification method through adjustable network topology information.
Proceedings of the 7th Asia-Pacific Workshop on Networking, 2023

2022
Generating indoor Wi-Fi fingerprint map based on crowdsourcing.
Wirel. Networks, 2022

Network Temperature: A Novel Statistical Index for Networks Measurement and Management.
ACM Trans. Internet Techn., 2022

Compact Provenance Scheme Through Packet Path Index Differences in WSNs.
IEEE Trans. Inf. Forensics Secur., 2022

Stepwise Refinement Provenance Scheme for Wireless Sensor Networks.
IEEE Internet Things J., 2022

Generalized Network Temperature for DDoS Detection through Rényi Entropy.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

2021
RBM: Region-Based Mobile Routing Protocol for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2021

S-DPS: An SDN-Based DDoS Protection System for Smart Grids.
Secur. Commun. Networks, 2021

Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis.
J. Sensors, 2021

Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC.
Comput. Secur., 2021

Searchable Encryption for Integrating Cloud and Sensor Networks with Secure Updates.
Ad Hoc Sens. Wirel. Networks, 2021

An Improved Mean Shift Clustering Algorithm for LFA Detection.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

Traffic Matrix Estimation Based on Incomplete Network Link Loads Measurement.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

A Node Importance Ranking Method Based on the Rate of Network Entropy Changes.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

Wi-Fi Based Indoor Location With Multi-parameter AP Selection and Device Heterogeneity Weakening.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

Entropy Change Rate for Traffic Anomaly Detection.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

2020
Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs.
Mob. Inf. Syst., 2020

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation.
KSII Trans. Internet Inf. Syst., 2020

Detection of Compromised Online Social Network Account with an Enhanced Knn.
Appl. Artif. Intell., 2020

2019
Search Over Encrypted Cloud Data With Secure Updates.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

A Lightweight Hash Function Based on Cellular Automata for Mobile Network.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

Provenance Compression Using Packet-Path-Index Differences in Wireless Sensor Networks.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

2018
Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Architecture for Collision-Free Communication Using Relaxation Technique.
Wirel. Commun. Mob. Comput., 2018

Dynamic searchable encryption with privacy protection for cloud computing.
Int. J. Commun. Syst., 2018

A Lightweight Encryption Method for Privacy Protection in Surveillance Videos.
IEEE Access, 2018

Preserving-Texture Generative Adversarial Networks for Fast Multi-Weighted MRI.
IEEE Access, 2018

A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks.
Proceedings of the 14th International Conference on Mobile Ad-Hoc and Sensor Networks, 2018

2017
Sensor Network Provenance Compression Using Dynamic Bayesian Networks.
ACM Trans. Sens. Networks, 2017

2016
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2016

Base communication model of IP covert timing channels.
Frontiers Comput. Sci., 2016

Provenance for Wireless Sensor Networks: A Survey.
Data Sci. Eng., 2016

Robustness of the Packet Delay Channels.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2014
Secure data provenance compression using arithmetic coding in wireless sensor networks.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

2013
Personalized E-mail Filtering System Based on Usage Control.
J. Softw., 2013

2010
A Novel Method to Implement Book Cipher.
J. Comput., 2010

Information Flow Graph: An Approach to Identifying Covert Storage Channels.
Proceedings of the Trusted Systems - Second International Conference, 2010

2005
The Dilemma of Covert Channels Searching.
Proceedings of the Information Security and Cryptology, 2005

2004
Design and Implementation of a General Decision-making Model in RoboCup Simulation
CoRR, 2004

2003
Research on the Methods of Search and Elimination in Covert Channels.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

The Analysis of Authorization Mechanisms in the Grid.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...