Na Wang

Orcid: 0000-0002-8687-8820

Affiliations:
  • Xiamen University, School of Mathematical Science, China


According to our database1, Na Wang authored at least 33 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2017
2018
2019
2020
2021
2022
2023
2024
0
1
2
3
4
5
6
7
8
6
4
3
3
5
7
2
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT.
Concurr. Comput. Pract. Exp., November, 2024

Certificateless Aggregate Signature Scheme With Security Proofs in the Standard Model Suitable for Internet of Vehicles.
IEEE Internet Things J., September, 2024

Secure and Distributed IoV Data Sharing Scheme Based on a Hybrid PoS Blockchain Protocol.
IEEE Trans. Veh. Technol., August, 2024

Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain.
Veh. Commun., 2024

Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2024

A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory.
IEEE Trans. Dependable Secur. Comput., 2024

GroupCover: A Secure, Efficient and Scalable Inference Framework for On-device Model Protection based on TEEs.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

2023
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain.
IEEE/ACM Trans. Netw., August, 2023

Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems.
IEEE J. Biomed. Health Informatics, February, 2023

Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Multiuser Personalized Ciphertext Retrieval Scheme Based on Deep Learning.
IEEE Internet Things J., 2023

2022
A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Defending Trace-Back Attack in 3D Wireless Internet of Things.
IEEE/ACM Trans. Netw., 2022

An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things.
Int. J. Intell. Syst., 2022

Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application.
Proceedings of the Machine Learning for Cyber Security - 4th International Conference, 2022

2021
Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet.
Mob. Networks Appl., 2021

A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation.
Mob. Networks Appl., 2021

Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing.
Complex., 2021

2020
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing.
Sensors, 2020

Simulation algorithm on the quantum BB84 protocol based on Monte Carlo method in classical computer environment.
Quantum Inf. Process., 2020

Quantum algorithm for Help-Training semi-supervised support vector machine.
Quantum Inf. Process., 2020

Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme.
IEEE Access, 2020

2019
A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2019

An Untraceable Data Sharing Scheme in Wireless Sensor Networks.
Sensors, 2019

Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks.
IEEE Access, 2019

Deterministic Quantum Secure Direct Communication Protocol Based on Hyper-Entangled State.
IEEE Access, 2019

One Step Quantum Key Distribution Protocol Based on the Hyperentangled Bell State.
IEEE Access, 2019

A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing.
IEEE Access, 2019

An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages.
IEEE Access, 2019

2018
Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Source-location privacy full protection in wireless sensor networks.
Inf. Sci., 2018

2017
All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks.
Sensors, 2017


  Loading...