Jian Wang
Orcid: 0000-0002-8376-5898Affiliations:
- Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- University of Tokyo, Japan (2001 - 2003)
- Nanjing University, China (PhD 1998)
According to our database1,
Jian Wang
authored at least 97 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Indexing dynamic encrypted database in cloud for efficient secure k-nearest neighbor query.
Frontiers Comput. Sci., February, 2024
2023
Frontiers Comput. Sci., October, 2023
Appl. Intell., September, 2023
IEEE Trans. Knowl. Data Eng., July, 2023
Detecting backdoor in deep neural networks via intentional adversarial perturbations.
Inf. Sci., July, 2023
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples.
Appl. Intell., March, 2023
IEEE Trans. Serv. Comput., 2023
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption.
IEEE Trans. Emerg. Top. Comput., 2023
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints.
IET Comput. Digit. Tech., 2023
An Anonymous Authenticated Key Agreement Protocol Secure in Partially Trusted Registration Server Scenario for Multi-Server Architectures.
IACR Cryptol. ePrint Arch., 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
Intellectual Property Protection for Deep Learning Models: Taxonomy, Methods, Attacks, and Evaluations.
IEEE Trans. Artif. Intell., 2022
A multi-server biometric authentication scheme based on extended chaotic map for telecare medical information system.
Multim. Tools Appl., 2022
Frontiers Comput. Sci., 2022
CoRR, 2022
Comput. Secur., 2022
Active intellectual property protection for deep neural networks through stealthy backdoor and users' identities authentication.
Appl. Intell., 2022
An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection.
Algorithms, 2022
2021
Wirel. Pers. Commun., 2021
Joint Distribution Estimation and Naïve Bayes Classification Under Local Differential Privacy.
IEEE Trans. Emerg. Top. Comput., 2021
Highly Efficient Privacy Preserving Location-Based Services with Enhanced One-Round Blind Filter.
IEEE Trans. Emerg. Top. Comput., 2021
Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems.
Peer-to-Peer Netw. Appl., 2021
J. Inf. Secur. Appl., 2021
SocialGuard: An adversarial example based privacy-preserving technique for social images.
J. Inf. Secur. Appl., 2021
An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation.
Digit. Commun. Networks, 2021
Protecting the Intellectual Properties of Deep Neural Networks with an Additional Class and Steganographic Images.
CoRR, 2021
CoRR, 2021
Locally differentially private distributed algorithms for set intersection and union.
Sci. China Inf. Sci., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Detect and Remove Watermark in Deep Neural Networks via Generative Adversarial Networks.
Proceedings of the Information Security - 24th International Conference, 2021
DNN Intellectual Property Protection: Taxonomy, Attacks and Evaluations (Invited Paper).
Proceedings of the GLSVLSI '21: Great Lakes Symposium on VLSI 2021, 2021
VAGA: Towards Accurate and Interpretable Outlier Detection Based on Variational Auto-Encoder and Genetic Algorithm for High-Dimensional Data.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021
2020
Soft Comput., 2020
DPAEG: A Dependency Parse-Based Adversarial Examples Generation Method for Intelligent Q&A Robots.
Secur. Commun. Networks, 2020
Efficient authentication protocol with anonymity and key protection for mobile Internet users.
J. Parallel Distributed Comput., 2020
Secure two-factor lightweight authentication protocol using self-certified public key cryptography for multi-server 5G networks.
J. Netw. Comput. Appl., 2020
J. Comput. Sci. Technol., 2020
J. Inf. Secur. Appl., 2020
DNN Intellectual Property Protection: Taxonomy, Methods, Attack Resistance, and Evaluations.
CoRR, 2020
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system.
Comput. Secur., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Active DNN IP Protection: A Novel User Fingerprint Management and DNN Authorization Control Technique.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020
Embedding Backdoors as the Facial Features: Invisible Backdoor Attacks Against Face Recognition Systems.
Proceedings of the ACM TUR-C'20: ACM Turing Celebration Conference, 2020
2019
Wirel. Pers. Commun., 2019
An Efficient Authenticated Key Agreement Scheme for Consumer USB MSDs Resilient to Unauthorized File Decryption.
IEEE Trans. Consumer Electron., 2019
SSL: A Novel Image Hashing Technique Using SIFT Keypoints with Saliency Detection and LBP Feature Extraction against Combinatorial Manipulations.
Secur. Commun. Networks, 2019
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud.
J. Parallel Distributed Comput., 2019
Building an accurate hardware Trojan detection technique from inaccurate simulation models and unlabelled ICs.
IET Comput. Digit. Tech., 2019
Defeating Untrustworthy Testing Parties: A Novel Hybrid Clustering Ensemble Based Golden Models-Free Hardware Trojan Detection Method.
IEEE Access, 2019
Proceedings of the 20th Asia-Pacific Network Operations and Management Symposium, 2019
2018
On the Soundness and Security of Privacy-Preserving SVM for Outsourcing Data Classification.
IEEE Trans. Dependable Secur. Comput., 2018
Secur. Commun. Networks, 2018
Role of Machine Learning and Data Mining in Internet Security: Standing State with Future Directions.
J. Comput. Networks Commun., 2018
Int. J. Grid Util. Comput., 2018
A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation Models.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble Technique.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the VII International Conference on Network, Communication and Computing, 2018
A Novel Golden Models-Free Hardware Trojan Detection Technique Using Unsupervised Clustering Analysis.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
2017
Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers.
ACM Trans. Embed. Comput. Syst., 2017
面向敏感值的层次化多源数据融合隐私保护 (Hierarchical Privacy Protection of Multi-source Data Fusion for Sensitive Value).
计算机科学, 2017
Another Security Evaluation of SPA Countermeasures for AES Key Expansion in IoT Devices.
J. Inf. Sci. Eng., 2017
Int. J. Found. Comput. Sci., 2017
Proceedings of the Provable Security, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
A Strict Key Enumeration Algorithm for Dependent Score Lists of Side-Channel Attacks.
Proceedings of the Smart Card Research and Advanced Applications, 2017
A new key rank estimation method to investigate dependent key lists of side channel attacks.
Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, 2017
2016
Proceedings of the Provable Security, 2016
Collusion-resisting secure nearest neighbor query over encrypted data in cloud, revisited.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
On efficiently harnessing cloud to securely solve linear regression and other matrix operations.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Automated Vulnerability Modeling and Verification for Penetration Testing Using Petri Nets.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
A Technique of High Embedding Rate Text Steganography Based on Whole Poetry of Song Dynasty.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
An enhanced classification-based golden chips-free hardware Trojan detection technique.
Proceedings of the 2016 IEEE Asian Hardware-Oriented Security and Trust, 2016
2015
Security Against Hardware Trojan Attacks Through a Novel Chaos FSM and Delay Chains Array PUF Based Design Obfuscation Scheme.
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Secure and Efficient Protocol for Outsourcing Large-Scale Systems of Linear Equations to the Cloud.
Proceedings of the Cloud Computing and Security - First International Conference, 2015
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015
2014
Int. J. Comput. Sci. Eng., 2014
eXtensible Markup Language access control model with filtering privacy based on matrix storage.
IET Commun., 2014
2013
IET Wirel. Sens. Syst., 2013
2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2006
Proceedings of the Architecture of Computing Systems, 2006
2005
Proceedings of the Parallel and Distributed Processing and Applications, 2005
Dynamic Security Service Negotiation to Ensure Security for Information Sharing on the Internet.
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the Information Systems Security, First International Conference, 2005