Wei Ren

Orcid: 0000-0001-8590-1737

Affiliations:
  • China University of Geosciences, School of Computer Science, Wuhan, China


According to our database1, Wei Ren authored at least 146 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AdvEWM: Generating image adversarial examples by embedding digital watermarks.
J. Inf. Secur. Appl., February, 2024

A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy.
IEEE Internet Things J., February, 2024

1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNet.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024

A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest.
IEEE Internet Things J., January, 2024

TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles.
IEEE Internet Things J., January, 2024

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis.
IEEE Trans. Inf. Forensics Secur., 2024

The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing.
J. Electr. Comput. Eng., 2024

CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption.
Future Gener. Comput. Syst., 2024

A Lightweight Method to Survey with Protecting Privacy yet Maintaining Accuracy.
Proceedings of the Wireless Artificial Intelligent Computing Systems and Applications, 2024

CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Formal Analysis on Interaction Flow and Information Cocoon Based on Probabilistic Graph.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024

2023
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice.
Frontiers Comput. Sci., December, 2023

BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023

A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning.
Eng. Appl. Artif. Intell., November, 2023

DTGCN: a method combining dependency tree and graph convolutional networks for Chinese long-interval named entity relationship extraction.
J. Ambient Intell. Humaniz. Comput., October, 2023

Migrating federated learning to centralized learning with the leverage of unlabeled data.
Knowl. Inf. Syst., September, 2023

Improve individual fairness in federated learning via adversarial training.
Comput. Secur., September, 2023

An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles.
Internet Things, July, 2023

Defense against membership inference attack in graph neural networks through graph perturbation.
Int. J. Inf. Sec., April, 2023

A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things.
IEEE Trans. Computers, February, 2023

Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems.
IEEE Trans. Serv. Comput., 2023

A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.
IEEE Trans. Serv. Comput., 2023

BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things.
IEEE Internet Things J., 2023

An analysis model for detecting misbehaviors in anonymous cryptocurrency.
Comput. Stand. Interfaces, 2023

Preserving data privacy in federated learning through large gradient pruning.
Comput. Secur., 2023

A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023

Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

MergeTree: a Tree Model with Merged Nodes for Threat Induction.
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023

CCBTC: A Blockchain-Based Covert Communication Scheme over Bitcoin Transactions.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

2022
A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids.
IEEE Trans. Ind. Informatics, 2022

A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks.
IEEE Trans. Ind. Informatics, 2022

A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain.
Secur. Commun. Networks, 2022

LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing.
J. Ambient Intell. Humaniz. Comput., 2022

BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis.
CoRR, 2022

Location privacy preservation through kernel transformation.
Concurr. Comput. Pract. Exp., 2022

A privacy preservation method for multiple-source unstructured data in online social networks.
Comput. Secur., 2022

Privacy, accuracy, and model fairness trade-offs in federated learning.
Comput. Secur., 2022

tTree+: A Threat Tree Model for Representing Complex Semantics.
Proceedings of the IEEE International Conference on Trust, 2022

An Improved ACS Algorithm by CA for Task Scheduling in Heterogeneous Multiprocessing Environments.
Proceedings of the Theoretical Computer Science - 40th National Conference, 2022

An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

timeTree: How to Represent Time Sequence in a Threat Tree.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

RoFL: A Robust Federated Learning Scheme Against Malicious Attacks.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Sharing Information.
Dataset, February, 2021

SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks.
IEEE Trans. Netw. Sci. Eng., 2021

A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021

A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks.
J. Netw. Comput. Appl., 2021

FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.
Inf. Sci., 2021

An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments.
IEEE Internet Things J., 2021

Privacy preservation for image data: A GAN-based method.
Int. J. Intell. Syst., 2021

Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things.
Future Gener. Comput. Syst., 2021

A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning.
CoRR, 2021

CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Lane Changing Model Based on Imitation Learning and Gaussian Velocity Fields.
Proceedings of the 2021 IEEE SmartWorld, 2021

A Route Optimization Scheme based on Improved Simulated Annealing Algorithm.
Proceedings of the 2021 IEEE SmartWorld, 2021

A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHA.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Exploration of the Influence on Training Deep Learning Models by Watermarked Image Dataset.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

A Semantic-based Replacement for Event Image Privacy.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
An Analysis Model For Detecting Click Farm in Anonymous Cryptocurrency.
Dataset, July, 2020

A New Method for Constructing Digital Signature With Generative Adversarial Neural Network.
Dataset, April, 2020

Learning To Simulate Asymmetric Encryption With Adversarial Neural Networks.
Dataset, April, 2020

The process of exchanging models.
Dataset, March, 2020

A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.
IEEE Internet Things J., 2020

BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020

A Reduced Collatz Dynamics Maps to a Residue Class, and Its Count of x/2 over the Count of 3∗x+1 Is Larger than ln3/ln2.
Int. J. Math. Math. Sci., 2020

Efficiently Constructing Adversarial Examples by Feature Watermarking.
CoRR, 2020

An Energy Efficient Authentication Scheme using Chebyshev Chaotic Map for Smart Grid Environment.
CoRR, 2020

DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity.
IEEE Access, 2020

CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts.
IEEE Access, 2020

SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts.
Proceedings of the 19th IEEE International Conference on Trust, 2020

A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Model Poisoning Defense on Federated Learning: A Validation Based Approach.
Proceedings of the Network and System Security - 14th International Conference, 2020

Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations.
Proceedings of the Network and System Security - 14th International Conference, 2020

The Impact of Differential Privacy on Model Fairness in Federated Learning.
Proceedings of the Network and System Security - 14th International Conference, 2020

GAN-Based Image Privacy Preservation: Balancing Privacy and Utility.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Fast Robustness Quantification Method for Evaluating Typical Deep Learning Models by Generally Image Processing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

2019
A SVM-based Scanning System for Vulnerabilities in Blochchain Smart Contracts.
Dataset, August, 2019

Analysis of BTC Blockchain Ledger.
Dataset, February, 2019

MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Symmetry, 2019

Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019

LMDGW: a novel matrix based dynamic graph watermark.
J. Ambient Intell. Humaniz. Comput., 2019

CaACBIM: A Context-aware Access Control Model for BIM.
Inf., 2019

FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing.
Future Internet, 2019

SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019

Reduced Collatz Dynamics Data Reveals Properties for the Future Proof of Collatz Conjecture.
Data, 2019

A differentially private method for crowdsourcing data submission.
Concurr. Comput. Pract. Exp., 2019

Optimizing rewards allocation for privacy-preserving spatial crowdsourcing.
Comput. Commun., 2019

A Key Protection Scheme Based on Secret Sharing for Blockchain-Based Construction Supply Chain System.
IEEE Access, 2019

Ratio and Partition are Revealed in Proposed Graph on Reduced Collatz Dynamics.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019

How to Fast Verify Collatz Conjecture by Automata.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

Dynamic public opinion evolvement modeling and supervision in social networks.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Blockchain-based security and access control for BIM big data.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Privacy-aware digital forensics.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Privacy verification of PhotoDNA based on machine learning.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Security of marine-information system.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

A watermark-based in situ access-control model for image big data.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

Chaos-based communication systems.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
Code to generate keys.
Dataset, December, 2018

Reduced Collatz Dynamics for Integers from 3 to 999999.
Dataset, November, 2018

Exploring properties in reduced Collatz dynamics.
Dataset, November, 2018

Verifying whether extremely large integer guarantees Collatz conjecture (can return to 1 finally).
Dataset, November, 2018

Exploring the ratio between the count of x/2 and the count of (3*x+1)/2 in original dynamics for extremely large starting integers asymptotically.
Dataset, November, 2018

Exploring the inverse mapping from a dynamics to a residue class - inputting a reduced dynamics or partial dynamics and outputting a residue class.
Dataset, November, 2018

Collatz Automata and Compute Residue Class from Reduced Dynamics by Formula.
Dataset, November, 2018

RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018

A Watermark-Based In-Situ Access Control Model for Image Big Data.
Future Internet, 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Gener. Comput. Syst., 2018

LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

Lico: A Lightweight Access Control Model for Inter-Networking Linkages.
IEEE Access, 2018

Collatz Conjecture for 2^100000-1 Is True - Algorithms for Verifying Extremely Large Numbers.
Proceedings of the 2018 IEEE SmartWorld, 2018

MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.
Comput. Stand. Interfaces, 2017

DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX.
Proceedings of the Advances in Internetworking, 2017

2016
F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing.
Mob. Inf. Syst., 2016

LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing.
Int. J. Embed. Syst., 2016

Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal.
Proceedings of the Advances on P2P, 2016

2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015

2014
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing.
Int. J. Internet Protoc. Technol., 2014

A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function.
Int. J. Comput. Sci. Eng., 2014

2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
Int. J. Distributed Sens. Networks, 2013

LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
Int. J. Distributed Sens. Networks, 2013

APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
Int. J. Distributed Sens. Networks, 2013

Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
Int. J. Distributed Sens. Networks, 2013

2012
uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012

2011
QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things.
Int. J. Netw. Manag., 2011

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid.
Int. J. Digit. Multim. Broadcast., 2011

2010
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks.
Sci. China Inf. Sci., 2010

2009
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
J. Commun., 2009

Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Efficient user revocation for privacy-aware PKI.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

Optimized User Revocation for Group Signature Based Privacy-Aware PKI.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

HybridS: A Scheme for Secure Distributed Data Storage in WSNs.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks.
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007

SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography.
Proceedings of IEEE International Conference on Communications, 2007

2006
Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks.
J. Comput. Res. Dev., 2006

A Combination Scheme to Improve TCP Throughput over Multihops Wireless Mobile Ad Hoc Networks.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006

2005
Honeynet based distributed adaptive network forensics and active real time investigation.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A Recursion Nearness Based Method for Characterizing IP Address.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Congestion Targeted Reduction of Quality of Service DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005

Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design .
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005


  Loading...