Jing Wang

Orcid: 0000-0002-1309-8786

Affiliations:
  • Huazhong University of Science and Technology, Wuhan, China
  • Sun Yat-sen University, School of Data and Computer Science, Guangzhou, China (former)
  • Wuhan University, School of Computer Science, China (PhD)


According to our database1, Jing Wang authored at least 27 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Key Issues in Wireless Transmission for NTN-Assisted Internet of Things.
IEEE Internet Things Mag., January, 2024

Libras: A Fair, Secure, Verifiable, and Scalable Outsourcing Computation Scheme Based on Blockchain.
IEEE Trans. Inf. Forensics Secur., 2024

An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs.
IET Inf. Secur., 2024

An Efficient Multiparty Threshold ECDSA Protocol against Malicious Adversaries for Blockchain-Based LLMs.
IET Inf. Secur., 2024

2023
PCNN<sub>CEC</sub>: Efficient and Privacy-Preserving Convolutional Neural Network Inference Based on Cloud-Edge-Client Collaboration.
IEEE Trans. Netw. Sci. Eng., 2023

LSFL: A Lightweight and Secure Federated Learning Scheme for Edge Computing.
IEEE Trans. Inf. Forensics Secur., 2023

Lightweight certificateless privacy-preserving integrity verification with conditional anonymity for cloud-assisted medical cyber-physical systems.
J. Syst. Archit., 2023

Hybrid Beamforming Design for Beam-Hopping LEO Satellite Communications.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
IEEE Internet Things J., 2022

2021
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
ACM Trans. Sens. Networks, 2021

An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
IEEE Internet Things J., 2021

2020
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
IEEE Trans. Ind. Informatics, 2020

White-Box Implementation of the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.
IEICE Trans. Inf. Syst., 2020

2019
Secure Key Agreement and Key Protection for Mobile Device User Authentication.
IEEE Trans. Inf. Forensics Secur., 2019

Anonymous and Efficient Message Authentication Scheme for Smart Grid.
Secur. Commun. Networks, 2019

An Efficient Privacy-Preserving Mutual Authentication Scheme for Secure V2V Communication in Vehicular Ad Hoc Network.
IEEE Access, 2019

2018
Privacy-preserving auditing scheme for shared data in public clouds.
J. Supercomput., 2018

Blocked linear secret sharing scheme for scalable attribute based encryption in manageable cloud storage system.
Inf. Sci., 2018

2017
Secure public data auditing scheme for cloud storage in smart city.
Pers. Ubiquitous Comput., 2017

Cryptanalysis of an identity-based public auditing protocol for cloud storage.
Frontiers Inf. Technol. Electron. Eng., 2017

An Improved Authentication and Key Agreement scheme for Session Initial Protocol.
KSII Trans. Internet Inf. Syst., 2017

An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network.
J. Inf. Secur. Appl., 2017

Efficient location-based conditional privacy-preserving authentication scheme for vehicle ad hoc networks.
Int. J. Distributed Sens. Networks, 2017

2015
Dynamic resource allocation based on energy utility maximization using virtual machines in cloud environment.
Comput. Syst. Sci. Eng., 2015

Scalable Access Policy for Attribute Based Encryption in Cloud Storage.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
An Optimization VM Deployment for Maximizing Energy Utility in Cloud Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

An Access Control Scheme with Direct Cloud-Aided Attribute Revocation Using Version Key.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014


  Loading...