Hui Wang

Orcid: 0000-0002-4085-9050

Affiliations:
  • Henan Polytechnic University, School of Computer Science and Technology, School of Software, China


According to our database1, Hui Wang authored at least 16 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Personalized trajectory privacy data publishing scheme based on differential privacy.
Internet Things, April, 2024

Trust Mechanism Privacy Protection Scheme Combining Blockchain and Multi-Party Evaluation.
IEEE Trans. Intell. Veh., February, 2024

Privacy-protecting predictive cache method based on blockchain and machine learning in Internet of vehicles.
Veh. Commun., 2024

Combining blockchain and crowd-sensing for location privacy protection in Internet of vehicles.
Veh. Commun., 2024

BiGRU-DP: Improved differential privacy protection method for trajectory data publishing.
Expert Syst. Appl., 2024

2023
Learning-based small cell base station selection scheme involving location privacy in service migration.
J. Reliab. Intell. Environ., December, 2023

Trajectory privacy data publishing scheme based on local optimisation and R-tree.
Connect. Sci., December, 2023

DP-STGAT: Traffic statistics publishing with differential privacy and a spatial-temporal graph attention network.
Inf. Sci., April, 2023

A Differential Privacy Budget Allocation Method Combining Privacy Security Level.
J. Commun. Inf. Networks, March, 2023

2022
Enhancing Location Privacy through P2P Network and Caching in Anonymizer.
KSII Trans. Internet Inf. Syst., 2022

2021
A Network Security Risk Assessment Method Based on a B_NAG Model.
Comput. Syst. Sci. Eng., 2021

RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning.
Comput. Syst. Sci. Eng., 2021

KPDR : An Effective Method of Privacy Protection.
Complex., 2021

A MADM Location Privacy Protection Method Based on Blockchain.
IEEE Access, 2021

2020
IKPCA-ELM-based Intrusion Detection Method.
KSII Trans. Internet Inf. Syst., 2020

2009
Research on Security Architecture for Defending Insider Threat.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...