Shengling Wang

Orcid: 0000-0002-6698-3623

Affiliations:
  • Beijing Normal University, College of Information Science and Technology, China
  • Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China (2010 - 2013)
  • Tsinghua University, Department of Computer Science and Technology, Beijing, China (2008 - 2010)
  • Xi'an Jiaotong University, China (PhD 2008)


According to our database1, Shengling Wang authored at least 116 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BSCDA: Blockchain-Based Secure Cross-Domain Data Access Scheme for Internet of Things.
IEEE Trans. Netw. Serv. Manag., August, 2024

TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things.
IEEE Trans. Mob. Comput., May, 2024

An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT.
IEEE Trans. Computers, January, 2024

Proof of User Similarity: The Spatial Measurer of Blockchain.
IEEE Trans. Serv. Comput., 2024

Toward Efficient and Reliable Private Set Computation in Decentralized Storage.
IEEE Trans. Serv. Comput., 2024

OblivChain: Enabling Oblivious Queries for Blockchain Light Clients with Malicious Security.
Proceedings of the Database Systems for Advanced Applications, 2024

2023
An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain.
IEEE/ACM Trans. Netw., October, 2023

Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning.
IEEE Trans. Mob. Comput., May, 2023

I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association.
IEEE Trans. Dependable Secur. Comput., 2023

Black Swan in Blockchain: Micro Analysis of Natural Forking.
IEEE Trans. Dependable Secur. Comput., 2023

Toward Secure and Efficient Collaborative Cached Data Auditing for Distributed Fog Computing.
IEEE Internet Things J., 2023

Spatial Crowdsourcing Task Allocation Scheme for Massive Data with Spatial Heterogeneity.
CoRR, 2023

2022
A Misreport- and Collusion-Proof Crowdsourcing Mechanism Without Quality Verification.
IEEE Trans. Mob. Comput., 2022

Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE).
IEEE Trans. Computers, 2022

Active Defense Analysis of Blockchain Forking through the Spatial-Temporal Lens.
CoRR, 2022

2021
Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm.
IEEE Trans. Parallel Distributed Syst., 2021

Cost-Efficient Mobile Crowdsensing With Spatial-Temporal Awareness.
IEEE Trans. Mob. Comput., 2021

Privacy-Aware Data Trading.
IEEE Trans. Inf. Forensics Secur., 2021

Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021

Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices.
IEEE Trans. Cogn. Commun. Netw., 2021

Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning.
CoRR, 2021

Extending On-chain Trust to Off-chain - A Trustworthy Vaccine Shipping Example.
CoRR, 2021

Micro Analysis of Natural Forking in Blockchain Based on Large Deviation Theory.
CoRR, 2021

A differential game view of antagonistic dynamics for cybersecurity.
Comput. Networks, 2021

AERM: An Attribute-Aware Economic Robust Spectrum Auction Mechanism.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services.
IEEE Trans. Parallel Distributed Syst., 2020

Quantum Analysis on Task Allocation and Quality Control for Crowdsourcing With Homogeneous Workers.
IEEE Trans. Netw. Sci. Eng., 2020

Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies.
IEEE Trans. Knowl. Data Eng., 2020

Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies.
IEEE Trans. Inf. Forensics Secur., 2020

LH-ABSC: A Lightweight Hybrid Attribute-Based Signcryption Scheme for Cloud-Fog-Assisted IoT.
IEEE Internet Things J., 2020

Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory.
IEEE Internet Things J., 2020

Queuing Without Patience: A Novel Transaction Selection Mechanism in Blockchain for IoT Enhancement.
IEEE Internet Things J., 2020

BC-SABE: Blockchain-Aided Searchable Attribute-Based Encryption for Cloud-IoT.
IEEE Internet Things J., 2020

Cap the Gap: Solving the Egoistic Dilemma under the Transaction Fee-Incentive Bitcoin.
CoRR, 2020

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things.
CoRR, 2020

Privacy-aware Data Trading.
CoRR, 2020

Egoistic Incentives Based on Zero-Determinant Alliances for Large-Scale Systems.
CoRR, 2020

Privacy-preserving model training architecture for intelligent edge computing.
Comput. Commun., 2020

Sync or Fork: Node-Level Synchronization Analysis of Blockchain.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

2019
Guest Editorial The Convergence of Blockchain and IoT: Opportunities, Challenges and Solutions.
IEEE Internet Things J., 2019

NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce.
IEEE Internet Things J., 2019

An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain.
CoRR, 2019

Hopping-Proof and Fee-Free Pooled Mining in Blockchain.
CoRR, 2019

Crowdsourcee evaluation based on persuasion game.
Comput. Networks, 2019

Optimal Routing of Tight Optimal Bidirectional Double-Loop Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Analysis of Best Network Routing Structure for IoT.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

A game theoretic analysis on block withholding attacks using the zero-determinant strategy.
Proceedings of the International Symposium on Quality of Service, 2019

Corking by Forking: Vulnerability Analysis of Blockchain.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

Analysis of Antagonistic Dynamics for Rumor Propagation.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
N-in-One: A Novel Location-Based Service.
IEEE Trans. Veh. Technol., 2018

Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services.
IEEE Trans. Veh. Technol., 2018

A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds.
IEEE Trans. Big Data, 2018

Reputation-Aware Recruitment and Credible Reporting for Platform Utility in Mobile Crowd Sensing with Smart Devices in IoT.
Sensors, 2018

Privacy Preservation for Friend-Recommendation Applications.
Secur. Commun. Networks, 2018

Cooperative Stackelberg game based optimal allocation and pricing mechanism in crowdsensing.
Int. J. Sens. Networks, 2018

Privacy Preservation in Location-Based Services.
IEEE Commun. Mag., 2018

Big data analysis for evaluating bioinvasion risk.
BMC Bioinform., 2018

Reputation-Aware Trust and Privacy-Preservation for Mobile Cloud Computing.
IEEE Access, 2018

Solving Data Trading Dilemma with Asymmetric Incomplete Information Using Zero-Determinant Strategy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

2017
Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility.
IEEE Trans. Veh. Technol., 2017

Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy.
Sensors, 2017

Context Sensing System Analysis for Privacy Preservation Based on Game Theory.
Sensors, 2017

Perturbation-Based Private Profile Matching in Social Networks.
IEEE Access, 2017

Throughput Maximization in Multi-User Cooperative Cognitive Radio Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Poster: Perturbation Based Private Profile Matching in Social Networks.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Quantum Game Analysis of Privacy-Leakage for Application Ecosystems.
Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2017

Constructing a self-stabilizing CDS with bounded diameter in wireless networks under SINR.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Mechanism design games for thwarting malicious behavior in crowdsourcing applications.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Privacy Preservation for Dating Applications.
Proceedings of the 2017 International Conference on Identification, 2017

Outsourced Ciphertext-Policy based Privacy Preservation for Mobile Cloud Computing.
Proceedings of the 2017 International Conference on Identification, 2017

General Analysis of Incentive Mechanisms for Peer-to-Peer Transmissions: A Quantum Game Perspective.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Big data routing in D2D communications with cognitive radio capability.
IEEE Wirel. Commun., 2016

The Potential of Mobile Opportunistic Networks for Data Disseminations.
IEEE Trans. Veh. Technol., 2016

Security in wearable communications.
IEEE Netw., 2016

Analysis and optimization of delayed channel access for wireless cyber-physical systems.
EURASIP J. Wirel. Commun. Netw., 2016

Extensive Form Game Analysis Based on Context Privacy Preservation for Smart Phone Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Solving the crowdsourcing dilemma using the zero-determinant strategy: poster.
Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2016

Detecting driver phone calls in a moving vehicle based on voice features.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Circle-Covering Algorithm for Multiple-POI Searching.
Proceedings of the International Conference on Identification, 2016

Stackelberg Game Based Tasks Assignment Mechanism Using Reputation in Crowdsourcing.
Proceedings of the International Conference on Identification, 2016

A Sequential Multi-type POI Recommendation Service Based on Location.
Proceedings of the International Conference on Identification, 2016

A Mechanism Design Solution for DTN Routing.
Proceedings of the International Conference on Identification, 2016

Crowdsourcing Framework for Acoustic Sound Based Obstacle Echolocation through Smartphones for Visually Impaired.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Stackelberg Game Based Optimal Workload Allocation and Pricing Mechanism in Crowdsourcing.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
The dissemination distance of mobile opportunistic networks.
Pers. Ubiquitous Comput., 2015

Analyzing the potential of mobile opportunistic networks for big data applications.
IEEE Netw., 2015

Impact of a Deterministic Delay in the DCA Protocol.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2015

A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Low Price to Win: Interactive scheme in cooperative cognitive radio networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Coverage adjustment for load balancing with an AP service availability guarantee in WLANs.
Wirel. Networks, 2014

Mobility-Assisted Routing in Intermittently Connected Mobile Cognitive Radio Networks.
IEEE Trans. Parallel Distributed Syst., 2014

AP Association for Proportional Fairness in Multirate WLANs.
IEEE/ACM Trans. Netw., 2014

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2014

Virtual track: applications and challenges of the RFID system on roads.
IEEE Netw., 2014

The Tempo-spatial Properties of Information Dissemination to Time-Varying Destination Areas in Mobile Opportunistic Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2014

The Tempo-Spatial Information Dissemination Properties of Mobile Opportunistic Networks with Levy Mobility.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Partner-recruitment: Incentive mechanism for content offloading.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Opportunistic Routing in Intermittently Connected Mobile P2P Networks.
IEEE J. Sel. Areas Commun., 2013

Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks.
Proceedings of the 1st ACM workshop on Cognitive radio architectures for broadband, 2013

2012
Dynamic region-based mobile multicast.
Wirel. Commun. Mob. Comput., 2012

Routing in pocket switched networks.
IEEE Wirel. Commun., 2012

HERO - A Home Based Routing in Pocket Switched Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

2011
Mobility in IPv6: Whether and How to Hierarchize the Network?
IEEE Trans. Parallel Distributed Syst., 2011

Distributed dynamic mobile multicast.
J. Parallel Distributed Comput., 2011

Low latency IP mobility management: protocol and analysis.
EURASIP J. Wirel. Commun. Netw., 2011

2010
Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs.
Proceedings of the Wireless Algorithms, 2010

PET: Prefixing, Encapsulation and Translation for IPv4-IPv6 Coexistence.
Proceedings of the Global Communications Conference, 2010

2009
Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Cell Breathing Based on Supply-Demand Model in Overlapping WLAN Cells.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Proportional fairness of call blocking probability.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
Dynamic Multiple-Threshold Call Admission Control Based on Optimized Genetic Algorithm in Wireless/Mobile Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Intelligent Mobility Support for IPv6.
Proceedings of the LCN 2008, 2008

A fast handoff scheme for MPLS-based Mobile IPv6 Network.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
Adaptive Call Admission Control Based on Reward-Penalty Model in Wireless/Mobile Network.
J. Comput. Sci. Technol., 2007

2006
Adaptive Call Admission Control Based on Enhanced Genetic Algorithm in Wireless/Mobile Network.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006


  Loading...