Licheng Wang
Orcid: 0000-0002-7216-8721
According to our database1,
Licheng Wang
authored at least 215 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., November, 2024
IoTAuth: A Decentralized Cross-Chain Identity Authentication Scheme for 6G Non-Terrestrial IoT Networks.
IEEE Netw., July, 2024
Recursive Filtering for Discrete-Time Stochastic Complex Networks Under Bit-Rate Constraints: A Locally Minimum Variance Approach.
IEEE Trans. Autom. Control., May, 2024
Quantum Inf. Process., May, 2024
IEEE Netw., May, 2024
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Frontiers Inf. Technol. Electron. Eng., 2024
2023
IEEE Syst. J., December, 2023
PP-DDP: a privacy-preserving outsourcing framework for solving the double digest problem.
BMC Bioinform., December, 2023
IEEE Internet Things J., October, 2023
Stabilization of linear discrete-time systems over resource-constrained networks under dynamical multiple description coding scheme.
Autom., October, 2023
IEEE Trans. Veh. Technol., September, 2023
Distributed Online Voltage Control With Fast PV Power Fluctuations and Imperfect Communication.
IEEE Trans. Smart Grid, September, 2023
Finite-Horizon $H_{\infty }$ Filtering via a High-Rate Network With the FlexRay Protocol.
IEEE Trans. Autom. Control., June, 2023
Security-Ensured State of Charge Estimation of Lithium-Ion Batteries Subject to Malicious Attacks.
IEEE Trans. Smart Grid, May, 2023
A Joint Online Strategy of Measurement Outliers Diagnosis and State of Charge Estimation for Lithium-Ion Batteries.
IEEE Trans. Ind. Informatics, May, 2023
Privacy-Preserved Distributed Optimization for Multi-Agent Systems With Antagonistic Interactions.
IEEE Trans. Circuits Syst. I Regul. Pap., March, 2023
Analysis of Soil Moisture Change Characteristics and Influencing Factors of Grassland on the Tibetan Plateau.
Remote. Sens., January, 2023
IEEE Trans. Multim., 2023
IEEE Trans. Inf. Forensics Secur., 2023
Proportional-Integral Observer Design for Multirate-Networked Systems Under Constrained Bit Rate: An Encoding-Decoding Mechanism.
IEEE Trans. Cybern., 2023
A Soft Coordination Method of Heterogeneous Devices in Distribution System Voltage Control.
CoRR, 2023
Proceedings of the Emerging Information Security and Applications, 2023
2022
IEEE Trans. Syst. Man Cybern. Syst., 2022
State-of-Charge Estimation of Lithium-Ion Batteries Subject to Random Sensor Data Unavailability: A Recursive Filtering Approach.
IEEE Trans. Ind. Electron., 2022
H∞ Pinning Control of Complex Dynamical Networks Under Dynamic Quantization Effects: A Coupled Backward Riccati Equation Approach.
IEEE Trans. Cybern., 2022
Secure Estimation Against Malicious Attacks for Lithium-Ion Batteries Under Cloud Environments.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022
Quantum Inf. Process., 2022
Stateless forward-secure key-insulated linkable ring signature scheme in ID-based setting.
J. Syst. Archit., 2022
Inf. Sci., 2022
Non-fragile <i>l</i><sub>2</sub>-<i>l</i><sub>∞</sub> state estimation for time-delayed artificial neural networks: an adaptive event-triggered approach.
Int. J. Syst. Sci., 2022
Gain-scheduled state estimation for discrete-time complex networks under bit-rate constraints.
Neurocomputing, 2022
Partial-neurons-based state estimation for artificial neural networks under constrained bit rate: The finite-time case.
Neurocomputing, 2022
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
Sci. China Inf. Sci., 2022
Event-based state estimation under constrained bit rate: An encoding-decoding approach.
Autom., 2022
"This article is interesting, however": exploring the language use in the peer review comment of articles published in the BMJ.
Aslib J. Inf. Manag., 2022
Appl. Math. Comput., 2022
Proceedings of the Advances in Swarm Intelligence - 13th International Conference, 2022
2021
IEEE Trans. Netw. Serv. Manag., 2021
Nondestructive Defect Detection in Castings by Using Spatial Attention Bilinear Convolutional Neural Network.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Ind. Informatics, 2021
CRLEDD: Regularized Causalities Learning for Early Detection of Diseases Using Electronic Health Record (EHR) Data.
IEEE Trans. Emerg. Top. Comput. Intell., 2021
Finite-Horizon H<sub>∞</sub> State Estimation for Stochastic Coupled Networks With Random Inner Couplings Using Round-Robin Protocol.
IEEE Trans. Cybern., 2021
IEEE Trans. Autom. Control., 2021
Fine-Grained Attribute-Based Multikeyword Search for Shared Multiowner in Internet of Things.
Secur. Commun. Networks, 2021
Peer-to-Peer Netw. Appl., 2021
Generalising combinatorial discriminant analysis through conditioning truncated Rayleigh flow.
Knowl. Inf. Syst., 2021
Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach.
Inf. Sci., 2021
Federated Data Cleaning: Collaborative and Privacy-Preserving Data Cleaning for Edge Intelligence.
IEEE Internet Things J., 2021
Physical layer authentication for automotive cyber physical systems based on modified HB protocol.
Frontiers Comput. Sci., 2021
Pinning Synchronization Control for a Class of Dynamical Networks with Coupled Time-Varying Delays: An Interval-Observer-Based Approach.
Circuits Syst. Signal Process., 2021
State of Charge Estimation of Composite Energy Storage Systems with Supercapacitors and Lithium Batteries.
Complex., 2021
Improving covariance-regularized discriminant analysis for EHR-based predictive analytics of diseases.
Appl. Intell., 2021
A Closed-Form Target Localization Method for FDA-MIMO Based on root-MUSIC and ESPRIT Algorithm.
Proceedings of the SSPS 2021: The 3rd International Symposium on Signal Processing Systems, Beijing China, March 26, 2021
2020
Mixed $H_2/H_\infty$ State Estimation for Discrete-Time Switched Complex Networks With Random Coupling Strengths Through Redundant Channels.
IEEE Trans. Neural Networks Learn. Syst., 2020
Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes.
Secur. Commun. Networks, 2020
Quantum Inf. Process., 2020
Kybernetika, 2020
Mismatch Removal Based on Gaussian Mixture Model for Aircraft Surface Texture Mapping.
Inf. Technol. Control., 2020
IEEE Internet Things J., 2020
Event-triggered control for discrete-time systems with unknown nonlinearities: an interval observer-based approach.
Int. J. Syst. Sci., 2020
Wireless-sensor-network-based target localization: A semidefinite relaxation approach with adaptive threshold correction.
Neurocomputing, 2020
IACR Cryptol. ePrint Arch., 2020
Entropy, 2020
Entropy, 2020
Entropy, 2020
Privacy-Preserving and Efficient Public Key Encryption with Keyword Search Based on CP-ABE in Cloud.
Cryptogr., 2020
Provably Secure Encryption Schemes With Zero Setup and Linear Speed by Using Rubik's Cubes.
IEEE Access, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Impacts of large-scale PV integration on power distribution systems and investigation of possible solutions
PhD thesis, 2019
Observer-Based Consensus Control for Discrete-Time Multiagent Systems With Coding-Decoding Communication Protocol.
IEEE Trans. Cybern., 2019
Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing.
J. Parallel Distributed Comput., 2019
Variance-constrained <i>H</i><sub>∞</sub> state estimation for time-varying multi-rate systems with redundant channels: The finite-horizon case.
Inf. Sci., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Verifiable Chebyshev maps-based chaotic encryption schemes with outsourcing computations in the cloud/fog scenarios.
Concurr. Comput. Pract. Exp., 2019
Complex., 2019
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019
DDmap: a MATLAB package for the double digest problem using multiple genetic operators.
BMC Bioinform., 2019
IEEE Access, 2019
Secure Remote Sensing Image Registration Based on Compressed Sensing in Cloud Setting.
IEEE Access, 2019
Secure and Efficient Multi-Authority Attribute-Based Encryption Scheme From Lattices.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Security and Privacy in Communication Networks, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices.
World Wide Web, 2018
Wirel. Commun. Mob. Comput., 2018
Modeling and Analysis of Open-Delta Step Voltage Regulators for Unbalanced Distribution Network With Photovoltaic Power Generation.
IEEE Trans. Smart Grid, 2018
IEEE Trans. Smart Grid, 2018
IACR Trans. Symmetric Cryptol., 2018
Finite-Time State Estimation for Recurrent Delayed Neural Networks With Component-Based Event-Triggering Protocol.
IEEE Trans. Neural Networks Learn. Syst., 2018
Synchronization Control for a Class of Discrete-Time Dynamical Networks With Packet Dropouts: A Coding-Decoding-Based Approach.
IEEE Trans. Cybern., 2018
Event-Based Variance-Constrained ${\mathcal {H}}_{\infty }$ Filtering for Stochastic Parameter Systems Over Sensor Networks With Successive Missing Measurements.
IEEE Trans. Cybern., 2018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018
BeeKeeper 2.0: Confidential Blockchain-Enabled IoT System with Fully Homomorphic Computation.
Sensors, 2018
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems.
KSII Trans. Internet Inf. Syst., 2018
On quantized H∞ filtering for multi-rate systems under stochastic communication protocols: The finite-horizon case.
Inf. Sci., 2018
Encoding-Decoding-Based control and filtering of networked systems: insights, developments and opportunities.
IEEE CAA J. Autom. Sinica, 2018
IACR Cryptol. ePrint Arch., 2018
An Efficient Construction of Quantum Attack Resistant Proxy Re-Encryption Based on (Semi)group Factorization Problems.
Fundam. Informaticae, 2018
Fundam. Informaticae, 2018
IEEE Commun. Mag., 2018
BeeKeeper: A Blockchain-Based IoT System With Secure Storage and Homomorphic Computation.
IEEE Access, 2018
A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems.
IEEE Access, 2018
Correction to "Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things".
IEEE Access, 2018
2017
Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities.
Secur. Commun. Networks, 2017
Int. J. Distributed Sens. Networks, 2017
CP-consensus: a Blockchain Protocol Based on Synchronous Timestamps of Compass Satellite.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature.
Concurr. Comput. Pract. Exp., 2017
IEEE Access, 2017
Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things.
IEEE Access, 2017
Appl. Algebra Eng. Commun. Comput., 2017
Event-triggered variance-constrained finite-horizon state estimation for discrete-time systems with redundant channels.
Proceedings of the 23rd International Conference on Automation and Computing, 2017
2016
An Event-Triggered Approach to State Estimation for a Class of Complex Networks With Mixed Time Delays and Nonlinearities.
IEEE Trans. Cybern., 2016
Event-based distributed set-membership filtering for a class of time-varying non-linear systems over sensor networks with saturation effects.
Int. J. Gen. Syst., 2016
IEICE Trans. Inf. Syst., 2016
IACR Cryptol. ePrint Arch., 2016
Finite Fields Their Appl., 2016
Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
A Heuristic Stream Order Scheduling Algorithm for Intra-Superframe Power Management in WPANs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015
2014
J. Commun. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
KSII Trans. Internet Inf. Syst., 2014
Probability-dependent H<sub>∞</sub> synchronization control for dynamical networks with randomly varying nonlinearities.
Neurocomputing, 2014
Reliable <i>H</i><sub>∞</sub> filtering for discrete piecewise linear systems with infinite distributed delays.
Int. J. Gen. Syst., 2014
Efficient threshold public key encryption with full security based on dual pairing vector spaces.
Int. J. Commun. Syst., 2014
Frontiers Comput. Sci., 2014
Appl. Algebra Eng. Commun. Comput., 2014
2013
Secur. Commun. Networks, 2013
CCA Secure Threshold KEM Scheme Against Adaptive Corruption Attacks in Standard Model.
J. Softw., 2013
Inf. Sci., 2013
Neurocomputing, 2013
Publicly Verifiable Secret Sharing Scheme with Provable Security against Chosen Secret Attacks.
Int. J. Distributed Sens. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.
Fundam. Informaticae, 2013
Efficient Construction of CCA-Secure Threshold PKE Based on Hashed Diffie-Hellman Assumption.
Comput. J., 2013
2012
Secur. Commun. Networks, 2012
Provably Secure and Efficient Identity-based Signature Scheme Based on Cubic Residues.
Int. J. Netw. Secur., 2012
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
: An Efficient Privacy-Preserving Data-Forwarding Scheme for Service-Oriented Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2011
Discrete logarithm based additively homomorphic encryption and secure data aggregation.
Inf. Sci., 2011
Comput. Secur., 2011
2010
Inf. Sci., 2010
Int. J. Netw. Secur., 2010
Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Measurement Error Compensation Using Data Fusion Technique for Laser Scanner on AACMMs.
Proceedings of the Intelligent Robotics and Applications - Third International Conference, 2010
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
2009
Int. J. Model. Identif. Control., 2009
IACR Cryptol. ePrint Arch., 2009
Discrete-Log-Based Additively Homomorphic Encryption and Secure WSN Data Aggregation.
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009
Proceedings of the High Performance Computing and Applications, 2009
2008
Sci. China Ser. F Inf. Sci., 2008
2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks.
Comput. Stand. Interfaces, 2007
Proceedings of the Progress in Cryptology, 2007
2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006
2005
Hybrid Genetic Algorithm for Solving the Degree-Constrained Minimal Bandwidth Multicast Routing Problem.
Proceedings of the Computational Intelligence and Security, International Conference, 2005