Liangmin Wang
Orcid: 0000-0001-8905-3456Affiliations:
- Southeast University, School of Cyber Science and Engineering, Nanjing, China
- Xidian University, Xi'an, China (PhD 2007)
- Jiangsu University, School of Computer Science and Communication Engineering, Zhenjiang, China
According to our database1,
Liangmin Wang
authored at least 145 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
VP$^{2}$2-Match: Verifiable Privacy-Aware and Personalized Crowdsourcing Task Matching via Blockchain.
IEEE Trans. Mob. Comput., October, 2024
PBAG: A Privacy-Preserving Blockchain-Based Authentication Protocol With Global-Updated Commitment in IoVs.
IEEE Trans. Intell. Transp. Syst., October, 2024
A Privacy-Preserving Aggregation Scheme With Continuous Authentication for Federated Learning in VANETs.
IEEE Trans. Veh. Technol., July, 2024
IEEE Trans. Netw. Serv. Manag., June, 2024
Distributed Ledger Technol. Res. Pract., March, 2024
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture.
ACM Comput. Surv., March, 2024
Physical Layer Covert Communication in B5G Wireless Networks - its Research, Applications, and Challenges.
Proc. IEEE, January, 2024
WF-Transformer: Learning Temporal Features for Accurate Anonymous Traffic Identification by Using Transformer Networks.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
IEEE Trans. Artif. Intell., December, 2023
A distributed message authentication scheme with reputation mechanism for Internet of Vehicles.
J. Syst. Archit., December, 2023
IET Blockchain, December, 2023
SecuCar: Data Loss Prevention for Cloud Assisted VSS Based on Public Auditing Technique.
IEEE Trans. Veh. Technol., November, 2023
IEEE Trans. Neural Networks Learn. Syst., August, 2023
Load Balancing of Double Queues and Utility-Workload Tradeoff in Heterogeneous Mobile Edge Computing.
IEEE Trans. Wirel. Commun., July, 2023
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial-temporal modelling.
IET Inf. Secur., July, 2023
A Source Authentication Scheme for Road Condition Monitoring Using Consortium Blockchain.
IEEE Trans. Veh. Technol., May, 2023
Expert Syst. Appl., May, 2023
IEEE Trans. Serv. Comput., 2023
Query Integrity Meets Blockchain: A Privacy-Preserving Verification Framework for Outsourced Encrypted Data.
IEEE Trans. Serv. Comput., 2023
Covert Communications With Randomly Distributed Adversaries in Wireless Energy Harvesting Enabled D2D Underlaying Cellular Networks.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
BeDCV: Blockchain-Enabled Decentralized Consistency Verification for Cross-Chain Calculation.
IEEE Trans. Cloud Comput., 2023
IEEE Trans. Cloud Comput., 2023
Android malware detection based on multi-head squeeze-and-excitation residual network.
Expert Syst. Appl., 2023
Comput. Secur., 2023
GraBit: A Sequential Model-Based Framework for Smart Contract Vulnerability Detection.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Ind. Informatics, 2022
Guest Editorial: Reliability and Security for Intelligent Wireless Sensing and Control Systems.
IEEE Trans. Ind. Informatics, 2022
J. King Saud Univ. Comput. Inf. Sci., 2022
Blockchain-Based Reliable and Privacy-Aware Crowdsourcing With Truth and Fairness Assurance.
IEEE Internet Things J., 2022
PBAG: A Privacy-Preserving Blockchain-based Authentication Protocol with Global-updated Commitment in IoV.
CoRR, 2022
Proceedings of the IEEE International Conference on Communications, 2022
2021
Physical Layer Security Assisted Computation Offloading in Intelligently Connected Vehicle Networks.
IEEE Trans. Wirel. Commun., 2021
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Parallel Distributed Syst., 2021
Multilevel Identification and Classification Analysis of Tor on Mobile and PC Platforms.
IEEE Trans. Ind. Informatics, 2021
P2BA: A Privacy-Preserving Protocol With Batch Authentication Against Semi-Trusted RSUs in Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Big Data, 2021
RBP: a website fingerprinting obfuscation method against intelligent fingerprinting attacks.
J. Cloud Comput., 2021
Multi-timescale and multi-centrality layered node selection for efficient traffic monitoring in SDNs.
Comput. Networks, 2021
Proceedings of the IEEE International Performance, 2021
2020
IEEE Trans. Wirel. Commun., 2020
Location Based Joint Spectrum Sensing and Radio Resource Allocation in Cognitive Radio Enabled LTE-U Systems.
IEEE Trans. Veh. Technol., 2020
Secrecy Rate Maximization via Radio Resource Allocation in Cellular Underlaying V2V Communications.
IEEE Trans. Veh. Technol., 2020
Covert Communications in D2D Underlaying Cellular Networks With Antenna Array Assisted Artificial Noise Transmission.
IEEE Trans. Veh. Technol., 2020
ESAC: An Efficient and Secure Access Control Scheme in Vehicular Named Data Networking.
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Serv. Comput., 2020
Privacy-Aware Task Allocation and Data Aggregation in Fog-Assisted Spatial Crowdsourcing.
IEEE Trans. Netw. Sci. Eng., 2020
Artificial Noisy MIMO Systems Under Correlated Scattering Rayleigh Fading - A Physical Layer Security Approach.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
Sensors, 2020
IEEE Internet Things J., 2020
Future Gener. Comput. Syst., 2020
Design of Educational Resources-oriented Fair Recommendation System Based on Consortium Blockchain.
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
IEEE/ACM Trans. Netw., 2019
Peer-to-Peer Netw. Appl., 2019
Multi-hop interpersonal trust assessment in vehicular <i>ad-hoc</i> networks using three-valued subjective logic.
IET Inf. Secur., 2019
PAU: Privacy Assessment method with Uncertainty consideration for cloud-based vehicular networks.
Future Gener. Comput. Syst., 2019
Expert Syst. Appl., 2019
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Verifiable Search Meets Blockchain: A Privacy-Preserving Framework for Outsourced Encrypted Data.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Patients-Controlled Secure and Privacy-Preserving EHRs Sharing Scheme Based on Consortium Blockchain.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the Wireless Sensor Networks - 13th China Conference, 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
Veh. Commun., 2018
Answering Multiattribute Top-k Queries in Fog-Supported Wireless Sensor Networks Leveraging Priority Assignment Technology.
IEEE Trans. Ind. Informatics, 2018
3VSR: Three Valued Secure Routing for Vehicular Ad Hoc Networks using Sensing Logic in Adversarial Environment.
Sensors, 2018
IEEE Internet Things J., 2018
Toward Privacy-Preserving Symptoms Matching in SDN-Based Mobile Healthcare Social Networks.
IEEE Internet Things J., 2018
Secure Top-k Preference Query for Location-based Services in Crowd-outsourcing Environments.
Comput. J., 2018
Secure and efficient <i>k</i>-nearest neighbor query for location-based services in outsourced environments.
Sci. China Inf. Sci., 2018
IEEE Access, 2018
SLAT: Sub-Trajectory Linkage Attack Tolerance Framework for Privacy-Preserving Trajectory Publishing.
Proceedings of the International Conference on Networking and Network Applications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Secure and Privacy-Preserving Report De-duplication in the Fog-Based Vehicular Crowdsensing System.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices.
IEEE Trans. Inf. Forensics Secur., 2017
J. Electr. Comput. Eng., 2017
Exploring Fog Computing-Based Adaptive Vehicular Data Scheduling Policies Through a Compositional Formal Method - PEPA.
IEEE Commun. Lett., 2017
Personalized extended (<i>α</i>, <i>k</i>)-anonymity model for privacy-preserving data publishing.
Concurr. Comput. Pract. Exp., 2017
Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges.
IEEE Commun. Surv. Tutorials, 2017
IEEE Access, 2017
An Energy-Aware Spatial Index Tree for Multi-Region Attribute Query Aggregation Processing in Wireless Sensor Networks.
IEEE Access, 2017
IEEE Access, 2017
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
Trust Model Based Uncertainty Analysis Between Multi-path Routes in MANET Using Subjective Logic.
Proceedings of the Wireless Sensor Networks, 2017
Proceedings of the 24th Asia-Pacific Software Engineering Conference, 2017
2016
IEEE Trans. Intell. Transp. Syst., 2016
Power allocation design and optimization for secure transmission in cognitive relay networks.
Secur. Commun. Networks, 2016
Mob. Inf. Syst., 2016
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.
Int. J. Netw. Secur., 2016
ECDS: Efficient collaborative downloading scheme for popular content distribution in urban vehicular networks.
Comput. Networks, 2016
IEEE Access, 2016
Efficient Privacy-Preserving Processing Scheme for Location-Based Queries in Mobile Cloud.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
Exploring Trusted Data Dissemination in a Vehicular Social Network with a Formal Compositional Approach.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the International Conference on Advanced Cloud and Big Data, 2016
2015
IEEE Trans. Veh. Technol., 2015
Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks.
Sensors, 2015
EPPS: Efficient and Privacy-Preserving Personal Health Information Sharing in Mobile Healthcare Social Networks.
Sensors, 2015
基于信任距离的车联网恶意节点检测方法 (Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network).
计算机科学, 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Fault-tolerant topology evolution and analysis of sensing systems in IoT based on complex networks.
Int. J. Sens. Networks, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Block-Based Method and Its System for Outsourcing Data by Using Onions of Encryption.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015
2014
IEEE Trans. Veh. Technol., 2014
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014
2013
Int. J. Distributed Sens. Networks, 2013
A conditional privacy scheme based on anonymized batch authentication in Vehicular Ad Hoc Networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
2012
Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 IEEE International Conference on Green Computing and Communications, 2012
2011
Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network.
Proceedings of the Global Communications Conference, 2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011
2010
Security Topology Control Method for Wireless Sensor Networks with Node-Failure Tolerance Based on Self-Regeneration.
EURASIP J. Wirel. Commun. Netw., 2010
2009
Proceedings of the 2009 International Conference on Environmental Science and Information Application Technology, 2009
2008
Int. J. Netw. Secur., 2008
Ant Colony Optimization and Ad-hoc On-demand Multipath Distance Vector (AOMDV) Based Routing Protocol.
Proceedings of the Fourth International Conference on Natural Computation, 2008
2007
Modelling intrusion for intrusion tolerance system by correlating alerts from IDS sensor.
Int. J. Autom. Control., 2007
2006
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006
2004
Proceedings of the IEEE International Conference on Systems, 2004
Proceedings of the Content Computing, Advanced Workshop on Content Computing, 2004