Juan Wang

Orcid: 0000-0001-8813-7842

Affiliations:
  • Wuhan University, School of Computer, China
  • Key Laboratory of Aerospace Information Security and Trusted Computing, Wuhan, China


According to our database1, Juan Wang authored at least 28 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Real-Time Collaborative Intrusion Detection System in UAV Networks Using Deep Learning.
IEEE Internet Things J., October, 2024

Privacy-Preserving and Secure Industrial Big Data Analytics: A Survey and the Research Framework.
IEEE Internet Things J., June, 2024

CAT: A Consensus-Adaptive Trust Management Based on the Group Decision Making in IoVs.
IEEE Trans. Inf. Forensics Secur., 2024

Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge.
Future Gener. Comput. Syst., 2024

A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024

Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Enhance the trust between IoT devices, mobile apps, and the cloud based on blockchain.
J. Netw. Comput. Appl., September, 2023

SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing.
IEEE Trans. Cloud Comput., 2023

GAN You See Me? Enhanced Data Reconstruction Attacks against Split Inference.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Online Rule-Based Classifier Learning on Dynamic Unlabeled Multivariate Time Series Data.
IEEE Trans. Syst. Man Cybern. Syst., 2022

S-Blocks: Lightweight and Trusted Virtual Security Function With SGX.
IEEE Trans. Cloud Comput., 2022

ProcGuard: Process Injection Behaviours Detection Using Fine-grained Analysis of API Call Chain with Deep Learning.
Proceedings of the IEEE International Conference on Trust, 2022

Measuring Data Reconstruction Defenses in Collaborative Inference Systems.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

2021
Intelligent system for interactive online education based on cloud big data analytics.
J. Intell. Fuzzy Syst., 2021

IoT-Praetor: Undesired Behaviors Detection for IoT Devices.
IEEE Internet Things J., 2021

Design and Implementation of Virtual Security Function Based on Multiple Enclaves.
Future Internet, 2021

2019
Detecting and Mitigating Target Link-Flooding Attacks Using SDN.
IEEE Trans. Dependable Secur. Comput., 2019

SvTPM: A Secure and Efficient vTPM in the Cloud.
CoRR, 2019

Towards a reliable firewall for software-defined networks.
Comput. Secur., 2019

2018
Enabling Security-Enhanced Attestation With Intel SGX for Remote Terminal and IoT.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Challenges Towards Protecting VNF With SGX.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

2017
CHAOS: An SDN-Based Moving Target Defense System.
Secur. Commun. Networks, 2017

CHAOS: an SDN-based Moving Target Defense System.
CoRR, 2017

A Security-Enhanced vTPM 2.0 for Cloud Computing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
A formal analysis of Trusted Platform Module 2.0 hash-based message authentication code authorization under digital rights management scenario.
Secur. Commun. Networks, 2016

2014
POSTER: An E2E Trusted Cloud Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Towards a Security-Enhanced Firewall Application for OpenFlow Networks.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing.
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013


  Loading...