Shan Wang

Orcid: 0000-0001-7742-8679

Affiliations:
  • Southeast University, School of Computer Science and Engineering, China
  • University of Massachusetts Lowell, MA, USA


According to our database1, Shan Wang authored at least 14 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BBS: A secure and autonomous blockchain-based big-data sharing system.
J. Syst. Archit., 2024

Deanonymizing Ethereum Users behind Third-Party RPC Services.
Proceedings of the IEEE INFOCOM 2024, 2024

Sharon: Secure and Efficient Cross-shard Transaction Processing via Shard Rotation.
Proceedings of the IEEE INFOCOM 2024, 2024

CORE: Transaction Commit-Controlled Release of Private Data Over Blockchains.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024

Unified View of IoT and CPS Security and Privacy.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

2023
On False Data Injection Attack against Building Automation Systems.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

2022
On False Data Injection Attack against Building Automation Systems.
CoRR, 2022

Implication of Animation on Android Security.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

BBS: A Blockchain Big-Data Sharing System.
Proceedings of the IEEE International Conference on Communications, 2022

On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
BOSS: A Blockchain Off-State Sharing System.
CoRR, 2021

On Private Data Collection of Hyperledger Fabric.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

On Automating BACnet Device Discovery and Property Identification.
Proceedings of the ICC 2021, 2021

2017
Detection of malicious behavior in android apps through API calls and permission uses analysis.
Concurr. Comput. Pract. Exp., 2017


  Loading...