Jing Wang
Orcid: 0000-0002-1309-8786Affiliations:
- Huazhong University of Science and Technology, Wuhan, China
- Sun Yat-sen University, School of Data and Computer Science, Guangzhou, China (former)
- Wuhan University, School of Computer Science, China (PhD)
According to our database1,
Jing Wang
authored at least 27 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Internet Things Mag., January, 2024
Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs.
IET Inf. Secur., 2024
An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs.
IET Inf. Secur., 2024
2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023
Proceedings of the IEEE Global Communications Conference, 2023
2022
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022
2021
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
ACM Trans. Sens. Networks, 2021
An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021
2020
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020
White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Secur. Commun. Networks, 2019
An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network.
IEEE Access, 2019
2018
J. Supercomput., 2018
Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system.
Inf. Sci., 2018
2017
Pers. Ubiquitous Comput., 2017
Frontiers Inf. Technol. Electron. Eng., 2017
KSII Trans. Internet Inf. Syst., 2017
An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017
Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks.
Int. J. Distributed Sens. Networks, 2017
2015
Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment.
Comput. Syst. Sci. Eng., 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014