Qiuhua Wang

Orcid: 0000-0002-0017-9026

According to our database1, Qiuhua Wang authored at least 29 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Differential Cryptanalysis of Bloom Filters for Privacy-Preserving Record Linkage.
IEEE Trans. Inf. Forensics Secur., 2024

Optimal Selfish Mining-Based Denial-of-Service Attack.
IEEE Trans. Inf. Forensics Secur., 2024

Advances and challenges of carbon storage estimation in tea plantation.
Ecol. Informatics, 2024

2023
S-DeepTrust: A deep trust prediction method based on sentiment polarity perception.
Inf. Sci., July, 2023

2022
SDoS: Selfish Mining-Based Denial-of-Service Attack.
IEEE Trans. Inf. Forensics Secur., 2022

Black-box adversarial attacks on XSS attack detection model.
Comput. Secur., 2022

Label Semantic Extension for Chinese Event Extraction.
Proceedings of the Natural Language Processing and Chinese Computing, 2022

2021
A Novel Threshold Changeable Secret Image Sharing Scheme.
Symmetry, 2021

Reversible Data Hiding in Encrypted Images Using Median Edge Detector and Two's Complement.
Symmetry, 2021

On the Application of Channel Characteristic-Based Physical Layer Authentication in Industrial Wireless Networks.
KSII Trans. Internet Inf. Syst., 2021

2020
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
Sensors, 2020

A Heterogeneous Network Modeling Method Based on Public Goods Game Theory to Explore Cooperative Behavior in VANETs.
Sensors, 2020

SBAC: A secure blockchain-based access control framework for information-centric networking.
J. Netw. Comput. Appl., 2020

A Practical Secret Key Generation Scheme Based on Wireless Channel Characteristics for 5G Networks.
IEICE Trans. Inf. Syst., 2020

2019
SPS and DPS: Two New Grid-Based Source Location Privacy Protection Schemes in Wireless Sensor Networks.
Sensors, 2019

A Classification Algorithm Based on Data Clustering and Data Reduction for Intrusion Detection System over Big Data.
KSII Trans. Internet Inf. Syst., 2019

2018
A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication.
Int. J. Netw. Secur., 2018

2017
A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.
Sensors, 2017

Digital Closed-Loop Driving Technique Using the PFD-Based CORDIC Algorithm for a Biaxial Resonant Microaccelerometer.
J. Sensors, 2017

A New Low-BMR Quantization Method for Wireless Channel Characteristics-based Secret Key Generation.
KSII Trans. Internet Inf. Syst., 2017

An IDL-Based Parallel Model for Scientific Computations on Multi-core Computers.
Proceedings of the Data Mining and Big Data - Second International Conference, 2017

2016
Methods for Improving the Rate of Secret Key Generation based on Wireless Channel Characteristics.
J. Networks, 2016

2015
Analysis of the information theoretically secret key agreement by public discussion.
Secur. Commun. Networks, 2015

A Key Distribution Scheme for WSN Based on Hash Chains and Deployment Knowledge.
Int. J. Distributed Sens. Networks, 2015

2013
One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks.
Ad Hoc Networks, 2013

2012
Access-polynomial-based self-healing group key distribution scheme for resource-constrained wireless networks.
Secur. Commun. Networks, 2012

Long-lived Self-healing Group Key Distribution Scheme in Wireless Sensor Networks.
J. Networks, 2012

2011
Practicality Analysis of the Self-Healing Group Key Distribution Schemes for Resource-Constricted Wireless Sensor Networks.
Proceedings of the Third International Conference on Communications and Mobile Computing, 2011

2010
Self-healing key distribution for large-scale wireless sensor networks.
Proceedings of the Third International Workshop on Advanced Computational Intelligence, 2010


  Loading...