Mi Wen
Orcid: 0000-0003-4328-6507
According to our database1,
Mi Wen
authored at least 89 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Mach. Learn., July, 2024
An improved multi-scale and knowledge distillation method for efficient pedestrian detection in dense scenes.
J. Real Time Image Process., July, 2024
A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks in Smart Grid.
IEEE Internet Things J., May, 2024
Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation.
IEEE Trans. Consumer Electron., February, 2024
Comput. Secur., January, 2024
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
Comput. J., January, 2024
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
Comput. J., 2024
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024
Proceedings of the 2024 10th International Conference on Computing and Data Engineering, 2024
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning.
Proceedings of the IEEE International Conference on Communications, 2024
2023
DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network.
IEEE Trans. Veh. Technol., April, 2023
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving.
Peer Peer Netw. Appl., January, 2023
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services.
IEEE Trans. Dependable Secur. Comput., 2023
Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing.
IEEE Trans. Dependable Secur. Comput., 2023
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes.
IEEE Trans. Cloud Comput., 2023
Long-term Incentive Mechanism for Federated Learning: A Dynamic Repeated Game Approach.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023
An Improved Traffic Forecasting Model based on Efficient Spatiotemporal Graph Convolutional Network.
Proceedings of the 12th International Conference on Informatics, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
Proceedings of the IEEE/CIC International Conference on Communications in China, 2023
2022
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids.
Wirel. Pers. Commun., 2022
FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid.
IEEE Internet Things J., 2022
IEEE Internet Things J., 2022
Proceedings of the ICCDE 2022: The 8th International Conference on Computing and Data Engineering, Bangkok, Thailand, January 11, 2022
Attribute-Based Collaborative Access Control Scheme with Constant Ciphertext Length for Smart Grid.
Proceedings of the IEEE International Conference on Communications, 2022
2021
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes.
IEEE Trans. Veh. Technol., 2021
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization.
IEEE Trans. Dependable Secur. Comput., 2021
Multim. Tools Appl., 2021
Proceedings of the ICCIR 2021: International Conference on Control and Intelligent Robotics, 2021
2020
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid.
Secur. Commun. Networks, 2020
Peer-to-Peer Netw. Appl., 2020
IET Inf. Secur., 2020
An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer.
IEEE Access, 2020
Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection.
IEEE Access, 2020
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2019
IEEE Trans. Veh. Technol., 2019
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds.
Peer-to-Peer Netw. Appl., 2019
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System.
IEEE Access, 2019
Proceedings of the 90th IEEE Vehicular Technology Conference, 2019
Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles.
Symmetry, 2018
Efficient steganographer detection over social networks with sampling reconstruction.
Peer-to-Peer Netw. Appl., 2018
Unsupervised steganalysis over social networks based on multi-reference sub-image sets.
Multim. Tools Appl., 2018
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition.
IEEE Access, 2018
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2017
A privacy-aware data dissemination scheme for smart grid with abnormal data traceability.
Comput. Networks, 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles.
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data.
Secur. Commun. Networks, 2016
Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks.
IEEE Internet Things J., 2016
PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
IEEE Trans. Comput. Soc. Syst., 2015
Peer-to-Peer Netw. Appl., 2015
Comput. Commun., 2015
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-06355-3, 2014
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing.
Secur. Commun. Networks, 2014
KSII Trans. Internet Inf. Syst., 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Global Communications Conference, 2014
2013
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid.
IEEE Trans. Emerg. Top. Comput., 2013
Int. J. Distributed Sens. Networks, 2013
ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2010
Wirel. Sens. Netw., 2010
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
Proceedings of the Advances in Neural Networks, 2010
Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network.
Proceedings of the Advances in Neural Networks, 2010
Proceedings of the Forensics in Telecommunications, Information, and Multimedia, 2010
2009
J. Inf. Sci. Eng., 2009
Comput. Stand. Interfaces, 2009
Proceedings of the Web Information Systems and Mining, International Conference, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2007
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
2006
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006