Liangmin Wang

Orcid: 0000-0001-8905-3456

Affiliations:
  • Southeast University, School of Cyber Science and Engineering, Nanjing, China
  • Xidian University, Xi'an, China (PhD 2007)
  • Jiangsu University, School of Computer Science and Communication Engineering, Zhenjiang, China


According to our database1, Liangmin Wang authored at least 145 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
VP$^{2}$2-Match: Verifiable Privacy-Aware and Personalized Crowdsourcing Task Matching via Blockchain.
IEEE Trans. Mob. Comput., October, 2024

PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol With Global-Updated Commitment in IoVs.
IEEE Trans. Intell. Transp. Syst., October, 2024

A Privacy-Preserving Aggregation Scheme With Continuous Authentication for Federated Learning in VANETs.
IEEE Trans. Veh. Technol., July, 2024

Android malware detection dataset.
Dataset, July, 2024

MPC+: Secure, Compatible and Efficient Off-Blockchain Multi-Node Payment Channel.
IEEE Trans. Netw. Serv. Manag., June, 2024

Co-Sharding: A Sharding Scheme for Large-Scale Internet of Things Application.
Distributed Ledger Technol. Res. Pract., March, 2024

Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture.
ACM Comput. Surv., March, 2024

Physical Layer Covert Communication in B5G Wireless Networks - its Research, Applications, and Challenges.
Proc. IEEE, January, 2024

WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks.
IEEE Trans. Inf. Forensics Secur., 2024

FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination.
IEEE Trans. Dependable Secur. Comput., 2024

Batch-Aggregate: Efficient Aggregation for Private Federated Learning in VANETs.
IEEE Trans. Dependable Secur. Comput., 2024

Federated Unlearning in the Internet of Vehicles.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

2023
Recording Behaviors of Artificial Intelligence in Blockchains.
IEEE Trans. Artif. Intell., December, 2023

A distributed message authentication scheme with reputation mechanism for Internet of Vehicles.
J. Syst. Archit., December, 2023

Security and privacy issues in blockchain and its applications.
IET Blockchain, December, 2023

SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique.
IEEE Trans. Veh. Technol., November, 2023

Logical Topology Inference via CPGCN Joint Optimizing With Pedestrian Re-Id.
IEEE Trans. Neural Networks Learn. Syst., August, 2023

Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023

FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial-temporal modelling.
IET Inf. Secur., July, 2023

A Source Authentication Scheme for Road Condition Monitoring Using Consortium Blockchain.
IEEE Trans. Veh. Technol., May, 2023

An effective end-to-end android malware detection method.
Expert Syst. Appl., May, 2023

Fair Outsourcing Paid in Fiat Money Using Blockchain.
IEEE Trans. Serv. Comput., 2023

Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data.
IEEE Trans. Serv. Comput., 2023

Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks.
IEEE Trans. Inf. Forensics Secur., 2023

FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023

Secure Similar Sequence Query over Multi-source Genomic Data on Cloud.
IEEE Trans. Cloud Comput., 2023

Android malware detection based on multi-head squeeze-and-excitation residual network.
Expert Syst. Appl., 2023

DIVRS: Data integrity verification based on ring signature in cloud storage.
Comput. Secur., 2023

GraBit: A Sequential Model-Based Framework for Smart Contract Vulnerability Detection.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

2022
Privacy-Enhanced and Practical Truth Discovery in Two-Server Mobile Crowdsensing.
IEEE Trans. Netw. Sci. Eng., 2022

A Hybrid Deep Network Framework for Android Malware Detection.
IEEE Trans. Knowl. Data Eng., 2022

SMA: SRv6-Based Multidomain Integrated Architecture for Industrial Internet.
IEEE Trans. Ind. Informatics, 2022

Guest Editorial: Reliability and Security for Intelligent Wireless Sensing and Control Systems.
IEEE Trans. Ind. Informatics, 2022

DCIV: Decentralized cross-chain data integrity verification with blockchain.
J. King Saud Univ. Comput. Inf. Sci., 2022

Blockchain-Based Reliable and Privacy-Aware Crowdsourcing With Truth and Fairness Assurance.
IEEE Internet Things J., 2022

PBAG: A Privacy-Preserving Blockchain-based Authentication Protocol with Global-updated Commitment in IoV.
CoRR, 2022

MPC: Multi-node Payment Channel for Off-chain Transactions.
Proceedings of the IEEE International Conference on Communications, 2022

2021
Physical Layer Security Assisted Computation Offloading in Intelligently Connected Vehicle Networks.
IEEE Trans. Wirel. Commun., 2021

Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA.
IEEE Trans. Veh. Technol., 2021

ReliableBox: Secure and Verifiable Cloud Storage With Location-Aware Backup.
IEEE Trans. Parallel Distributed Syst., 2021

Multilevel Identification and Classification Analysis of Tor on Mobile and PC Platforms.
IEEE Trans. Ind. Informatics, 2021

P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys.
IEEE Trans. Big Data, 2021

RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks.
J. Cloud Comput., 2021

Multi-timescale and multi-centrality layered node selection for efficient traffic monitoring in SDNs.
Comput. Networks, 2021

Elastic Scheduling of Virtual Machines in Cloudlet Networks.
Proceedings of the IEEE International Performance, 2021

2020
A Truthful Online Incentive Mechanism for Nondeterministic Spectrum Allocation.
IEEE Trans. Wirel. Commun., 2020

Location Based Joint Spectrum Sensing and Radio Resource Allocation in Cognitive Radio Enabled LTE-U Systems.
IEEE Trans. Veh. Technol., 2020

Secrecy Rate Maximization via Radio Resource Allocation in Cellular Underlaying V2V Communications.
IEEE Trans. Veh. Technol., 2020

Covert Communications in D2D Underlaying Cellular Networks With Antenna Array Assisted Artificial Noise Transmission.
IEEE Trans. Veh. Technol., 2020

ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking.
IEEE Trans. Veh. Technol., 2020

Secure and Efficient Cloud Data Deduplication with Ownership Management.
IEEE Trans. Serv. Comput., 2020

Privacy-Aware Task Allocation and Data Aggregation in Fog-Assisted Spatial Crowdsourcing.
IEEE Trans. Netw. Sci. Eng., 2020

Artificial Noisy MIMO Systems Under Correlated Scattering Rayleigh Fading - A Physical Layer Security Approach.
IEEE Syst. J., 2020

Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA.
IEEE Syst. J., 2020

Using Machine Learning Methods to Provision Virtual Sensors in Sensor-Cloud.
Sensors, 2020

SEM-ACSIT: Secure and Efficient Multiauthority Access Control for IoT Cloud Storage.
IEEE Internet Things J., 2020

SHAMC: A Secure and highly available database system in multi-cloud environment.
Future Gener. Comput. Syst., 2020

Design of Educational Resources-oriented Fair Recommendation System Based on Consortium Blockchain.
Proceedings of the International Conference on Networking and Network Applications, 2020

Adaptive Meek Technology for Anti-Traffic Analysis.
Proceedings of the International Conference on Networking and Network Applications, 2020

Resilient Data Retrieval in Vehicular Named Data Networking.
Proceedings of the International Conference on Networking and Network Applications, 2020

CPWF: Cross-Platform Website Fingerprinting Based on Multi-Similarity Loss.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Enabling Data Trustworthiness and User Privacy in Mobile Crowdsensing.
IEEE/ACM Trans. Netw., 2019

A hierarchical mobility management scheme based on software defined networking.
Peer-to-Peer Netw. Appl., 2019

Multi-hop interpersonal trust assessment in vehicular <i>ad-hoc</i> networks using three-valued subjective logic.
IET Inf. Secur., 2019

A Robust Security Architecture for SDN-Based 5G Networks.
Future Internet, 2019

PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks.
Future Gener. Comput. Syst., 2019

Liver CT sequence segmentation based with improved U-Net and graph cut.
Expert Syst. Appl., 2019

Multi-Attribute Crowdsourcing Task Assignment With Stability and Satisfactory.
IEEE Access, 2019

Optimizing Fast Near Collision Attack on Grain Using Linear Programming.
IEEE Access, 2019

Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Privacy-Preserving and Trustworthy Mobile Sensing with Fair Incentives.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Towards Efficient Privacy-Preserving Auction Mechanism for Two-Sided Cloud Markets.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Patients-Controlled Secure and Privacy-Preserving EHRs Sharing Scheme Based on Consortium Blockchain.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Sensor-Cloud Based Precision Sprinkler Irrigation Management System.
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019

Improving Division Property Based Cube Attacks by Removing Invalid Monomials.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Flexibly and Securely Shape Your Data Disclosed to Others.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
Secure cooperative communication scheme for vehicular heterogeneous networks.
Veh. Commun., 2018

Answering Multiattribute Top-k Queries in Fog-Supported Wireless Sensor Networks Leveraging Priority Assignment Technology.
IEEE Trans. Ind. Informatics, 2018

3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.
Sensors, 2018

NOTSA: Novel OBU With Three-Level Security Architecture for Internet of Vehicles.
IEEE Internet Things J., 2018

Toward Privacy-Preserving Symptoms Matching in SDN-Based Mobile Healthcare Social Networks.
IEEE Internet Things J., 2018

Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments.
Comput. J., 2018

Secure and efficient <i>k</i>-nearest neighbor query for location-based services in outsourced environments.
Sci. China Inf. Sci., 2018

S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks.
IEEE Access, 2018

SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory Publishing.
Proceedings of the International Conference on Networking and Network Applications, 2018

A Secure Data Forwarding Scheme in Vehicular Named Data Networking.
Proceedings of the IEEE Global Communications Conference, 2018

Secure and Privacy-Preserving Report De-duplication in the Fog-Based Vehicular Crowdsensing System.
Proceedings of the IEEE Global Communications Conference, 2018

Secure Similar Sequence Query on Outsourced Genomic Data.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices.
IEEE Trans. Inf. Forensics Secur., 2017

Security and Privacy in Internet of Things with Crowd-Sensing.
J. Electr. Comput. Eng., 2017

Exploring Fog Computing-Based Adaptive Vehicular Data Scheduling Policies Through a Compositional Formal Method - PEPA.
IEEE Commun. Lett., 2017

Personalized extended (<i>α</i>, <i>k</i>)-anonymity model for privacy-preserving data publishing.
Concurr. Comput. Pract. Exp., 2017

Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges.
IEEE Commun. Surv. Tutorials, 2017

Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data.
IEEE Access, 2017

An Energy-Aware Spatial Index Tree for Multi-Region Attribute Query Aggregation Processing in Wireless Sensor Networks.
IEEE Access, 2017

A Cloud-Based Trust Management Framework for Vehicular Social Networks.
IEEE Access, 2017

A Fast Handover Scheme for SDN Based Vehicular Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

A trust evaluation framework using in a vehicular social environment.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Trust Model Based Uncertainty Analysis Between Multi-path Routes in MANET Using Subjective Logic.
Proceedings of the Wireless Sensor Networks, 2017

A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment.
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017

2016
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.
IEEE Trans. Intell. Transp. Syst., 2016

Secure Nearest Neighbor Query on Crowd-Sensing Data.
Sensors, 2016

Power allocation design and optimization for secure transmission in cognitive relay networks.
Secur. Commun. Networks, 2016

Efficient and Secure Top-k Query Processing on Hybrid Sensed Data.
Mob. Inf. Syst., 2016

Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
Int. J. Netw. Secur., 2016

ECDS: Efficient collaborative downloading scheme for popular content distribution in urban vehicular networks.
Comput. Networks, 2016

Patient Flow Scheduling and Capacity Planning in a Smart Hospital Environment.
IEEE Access, 2016

Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile Cloud.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

Exploring Trusted Data Dissemination in a Vehicular Social Network with a Formal Compositional Approach.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data.
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016

2015
Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2015

Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
Sensors, 2015

EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
Sensors, 2015

基于信任距离的车联网恶意节点检测方法 (Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network).
计算机科学, 2015

A Critique of a Lightweight Identity Authentication Protocol for Vehicular Networks.
J. Inf. Hiding Multim. Signal Process., 2015

A New AES S-Box Equation System Based on BES.
J. Inf. Hiding Multim. Signal Process., 2015

Fault-tolerant topology evolution and analysis of sensing systems in IoT based on complex networks.
Int. J. Sens. Networks, 2015

Lightweight and privacy-preserving agent data transmission for mobile Healthcare.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Block-Based Method and Its System for Outsourcing Data by Using Onions of Encryption.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

A Personalized Extended (a, k)-Anonymity Model.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Efficient Privacy-Preserving Authentication for Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2014

Credit-Based Incentives in Vehicular Ad Hoc Networks.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

2013
Wireless Sensor Networks for the Internet of Things.
Int. J. Distributed Sens. Networks, 2013

A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

2012
Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Probablity Flow Model Based Route Optimization Method for VANET.
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012

2011
Patrol Detection for Replica Attacks on Wireless Sensor Networks.
Sensors, 2011

Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network.
Proceedings of the Global Communications Conference, 2011

Recovering Coverage Holes by Using Mobile Sensors in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration.
EURASIP J. Wirel. Commun. Netw., 2010

2009
Application Research of WSN in Precise Agriculture Irrigation.
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009

2008
Node-failure Tolerance of Topology in Wireless Sensor Networks.
Int. J. Netw. Secur., 2008

Ant Colony Optimization and Ad-hoc On-demand Multipath Distance Vector (AOMDV) Based Routing Protocol.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor.
Int. J. Autom. Control., 2007

2006
Fault and intrusion tolerance of wireless sensor networks.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

2004
A real-time approach to the lip-motion extraction in video sequence.
Proceedings of the IEEE International Conference on Systems, 2004

Enhancing the Content of the Intrusion Alerts Using Logic Correlation.
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004


  Loading...