Jia Wang

Orcid: 0000-0002-0861-2496

Affiliations:
  • Shenzhen University, College of Computer Science and Software Engineering, China


According to our database1, Jia Wang authored at least 35 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Boosting Robustness in Deep Neuro-Fuzzy Systems: Uncovering Vulnerabilities, Empirical Insights, and a Multiattack Defense Mechanism.
IEEE Trans. Fuzzy Syst., January, 2025

AI-driven fusion with cybersecurity: Exploring current trends, advanced techniques, future directions, and policy implications for evolving paradigms- A comprehensive review.
Inf. Fusion, 2025

2024
Accelerating Wireless Federated Learning via Nesterov's Momentum and Distributed Principal Component Analysis.
IEEE Trans. Wirel. Commun., June, 2024

Decentralized Ransomware Recovery Network: Enhancing Resilience and Security Through Secret Sharing Schemes.
Proceedings of the 9th International Conference on Internet of Things, 2024

Practical Privacy-Preserving MLaaS: When Compressive Sensing Meets Generative Networks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Defensive strategies against PCC attacks based on ideal (t,n)-secret sharing scheme.
J. King Saud Univ. Comput. Inf. Sci., October, 2023

Accelerating Wireless Federated Learning via Nesterov's Momentum and Distributed Principle Component Analysis.
CoRR, 2023

Eavesdropping Mobile App Activity via Radio-Frequency Energy Harvesting.
Proceedings of the 32nd USENIX Security Symposium, 2023

RRML: Privacy Preserving Machine Learning Based on Random Response Technology.
Proceedings of the Network and System Security - 17th International Conference, 2023

Deep-USIpred: identifying substrates of ubiquitin protein ligases E3 and deubiquitinases with pretrained protein embedding and bayesian neural network.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
CSG: Classifier-Aware Defense Strategy Based on Compressive Sensing and Generative Networks for Visual Recognition in Autonomous Vehicle Systems.
IEEE Trans. Intell. Transp. Syst., 2022

Stroke Risk Prediction With Hybrid Deep Transfer Learning Framework.
IEEE J. Biomed. Health Informatics, 2022

Adversarial attacks and defenses in deep learning for image recognition: A survey.
Neurocomputing, 2022

Heterogeneous graph embedding model for predicting interactions between TF and target gene.
Bioinform., 2022

Phoneme-Aware Adaptation with Discrepancy Minimization and Dynamically-Classified Vector for Text-independent Speaker Verification.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

High Precision Method of Federated Learning Based on Cosine Similarity and Differential Privacy.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022

Capsulated Graph Neural Network for Ubiquitylation Sites Prediction.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
InaudibleKey: Generic Inaudible Acoustic Signal based Key Agreement Protocol for Mobile Devices.
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021

Adversarial Attacks and Defenses in Deep Learning: A Survey.
Proceedings of the Intelligent Computing Theories and Application, 2021

2020
Gait Recognition as a Service for Unobtrusive User Identification in Smart Spaces.
ACM Trans. Internet Things, 2020

A novel edge-enabled SLAM solution using projected depth image information.
Neural Comput. Appl., 2020

TagSort: Accurate Relative Localization Exploring RFID Phase Spectrum Matching for Internet of Things.
IEEE Internet Things J., 2020

A survey of decomposition approaches in multiobjective evolutionary algorithms.
Neurocomputing, 2020

Inaudible acoustic signal based key agreement system for IoT devices: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

2019
Compressed Sensing Based Selective Encryption With Data Hiding Capability.
IEEE Trans. Ind. Informatics, 2019

Dynamic Scalable Elliptic Curve Cryptographic Scheme and Its Application to In-Vehicle Security.
IEEE Internet Things J., 2019

Modular exponential multivariate sequence and its application to lightweight security design.
Future Gener. Comput. Syst., 2019

On Stability of Multi-Valued Nonlinear Feedback Shift Registers.
Complex., 2019

A Constrained Solution Update Strategy for Multiobjective Evolutionary Algorithm Based on Decomposition.
Complex., 2019

A hybridized angle-encouragement-based decomposition approach for many-objective optimization problems.
Appl. Soft Comput., 2019

Energy Harvesting-Based Smart Transportation Mode Detection System via Attention-Based LSTM.
IEEE Access, 2019

A Novel Multiobjective Particle Swarm Optimization Algorithm with Dynamic Resource Allocation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Fractal Research on the Edge Blur Threshold Recognition in Big Data Classification.
Mob. Networks Appl., 2018

A Novel Many-Objective Optimization Algorithm Based on the Hybrid Angle-Encouragement Decomposition.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

2015
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure.
CoRR, 2015


  Loading...