Sheng Wen
Orcid: 0000-0003-0655-666X
According to our database1,
Sheng Wen
authored at least 166 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Distributed Ledger Technol. Res. Pract., September, 2024
Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations.
IEEE Trans. Ind. Informatics, March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems.
CoRR, 2024
CoRR, 2024
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure.
CoRR, 2024
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse.
Connect. Sci., 2024
Extraction of crop canopy features and decision-making for variable spraying based on unmanned aerial vehicle LiDAR data.
Comput. Electron. Agric., 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the IEEE International Conference on Robotics and Automation, 2024
Proceedings of the 2024 8th International Conference on Control Engineering and Artificial Intelligence, 2024
2023
IEEE Robotics Autom. Lett., December, 2023
Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method.
IEEE Trans. Comput. Soc. Syst., April, 2023
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023
ACM Trans. Internet Techn., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023
IEEE CAA J. Autom. Sinica, 2023
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023
On the security of fully homomorphic encryption for data privacy in Internet of Things.
Concurr. Comput. Pract. Exp., 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
Int. J. Intell. Syst., December, 2022
Addictive Incentive Mechanism in Crowdsensing From the Perspective of Behavioral Economics.
IEEE Trans. Parallel Distributed Syst., 2022
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity.
ACM Trans. Internet Techn., 2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Netw. Sci. Eng., 2022
ACM Trans. Manag. Inf. Syst., 2022
IEEE Trans. Instrum. Meas., 2022
Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022
Robotics Auton. Syst., 2022
IEEE Robotics Autom. Lett., 2022
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022
Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022
Concurr. Comput. Pract. Exp., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset.
Proceedings of the Network and System Security - 16th International Conference, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Study Cybersecurity of Cyber Physical System in the Virtual Environment: A Survey and New Direction.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022
2021
On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control.
IEEE Trans. Intell. Transp. Syst., 2021
Smart Design of Z-Width Expanded Thumb Haptic Interface Using Magnetorheological Fluids.
IEEE Trans. Instrum. Meas., 2021
IEEE Trans. Green Commun. Netw., 2021
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021
AC2M: An Automated Consent Management Model for Blockchain Financial Services Platform.
Proceedings of the IEEE International Conference on Smart Data Services, 2021
Message from the GreenCom 2021 General Chairs and Program Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
IEEE Trans. Fuzzy Syst., 2020
Proc. IEEE, 2020
Network Topology Inference Using Higher-Order Statistical Characteristics of End-to-End Measured Delays.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Australasian Computer Science Week, 2020
2019
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019
Sensors, 2019
Crowdsensing From the Perspective of Behavioral Economics: An Incentive Mechanism Based on Mental Accounting.
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019
Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017).
Concurr. Comput. Pract. Exp., 2019
Every word is valuable: Studied influence of negative words that spread during election period in social media.
Concurr. Comput. Pract. Exp., 2019
Comput. Electron. Agric., 2019
Numerical analysis and validation of spray distributions disturbed by quad-rotor drone wake at different flight speeds.
Comput. Electron. Agric., 2019
A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues.
Ad Hoc Sens. Wirel. Networks, 2019
IEEE Access, 2019
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019
Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' Awareness.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Trans. Dependable Secur. Comput., 2018
A Semantic Labeling Approach for Accurate Weed Mapping of High Resolution UAV Imagery.
Sensors, 2018
Accurate Weed Mapping and Prescription Map Generation Based on Fully Convolutional Networks Using UAV Imagery.
Sensors, 2018
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018
<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018
Future Gener. Comput. Syst., 2018
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018
Comput. Secur., 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017
J. Netw. Comput. Appl., 2017
Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017
Future Gener. Comput. Syst., 2017
Future Gener. Comput. Syst., 2017
Concurr. Comput. Pract. Exp., 2017
Concurr. Comput. Pract. Exp., 2017
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc Sens. Wirel. Networks, 2017
Acta Informatica, 2017
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Proceedings of the Information Security Practice and Experience, 2017
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
2016
ACM Trans. Sens. Networks, 2016
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016
J. Sensors, 2016
Concurr. Comput. Pract. Exp., 2016
Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
2015
IEEE Trans. Inf. Forensics Secur., 2015
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015
Secur. Commun. Networks, 2015
Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015
2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014
Future Gener. Comput. Syst., 2014
IEEE Commun. Surv. Tutorials, 2014
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014
FEM Analysis and Parameter Optimization of a Linear Piezoelectric Motor Macro Driven.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
IEEE Commun. Lett., 2012
Concurr. Comput. Pract. Exp., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010