Wei Ren
Orcid: 0000-0001-8590-1737Affiliations:
- China University of Geosciences, School of Computer Science, Wuhan, China
According to our database1,
Wei Ren
authored at least 145 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Inf. Secur. Appl., February, 2024
A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy.
IEEE Internet Things J., February, 2024
1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNet.
ACM Trans. Multim. Comput. Commun. Appl., January, 2024
A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest.
IEEE Internet Things J., January, 2024
TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles.
IEEE Internet Things J., January, 2024
IEEE Trans. Inf. Forensics Secur., 2024
The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing.
J. Electr. Comput. Eng., 2024
CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption.
Future Gener. Comput. Syst., 2024
CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Formal Analysis on Interaction Flow and Information Cocoon Based on Probabilistic Graph.
Proceedings of the 11th IEEE International Conference on Cyber Security and Cloud Computing, 2024
2023
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice.
Frontiers Comput. Sci., December, 2023
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023
A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning.
Eng. Appl. Artif. Intell., November, 2023
DTGCN: a method combining dependency tree and graph convolutional networks for Chinese long-interval named entity relationship extraction.
J. Ambient Intell. Humaniz. Comput., October, 2023
Migrating federated learning to centralized learning with the leverage of unlabeled data.
Knowl. Inf. Syst., September, 2023
Comput. Secur., September, 2023
An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles.
Internet Things, July, 2023
Defense against membership inference attack in graph neural networks through graph perturbation.
Int. J. Inf. Sec., April, 2023
A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things.
IEEE Trans. Computers, February, 2023
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems.
IEEE Trans. Serv. Comput., 2023
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.
IEEE Trans. Serv. Comput., 2023
BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things.
IEEE Internet Things J., 2023
Comput. Stand. Interfaces, 2023
Comput. Secur., 2023
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks.
Proceedings of the 29th Annual International Conference on Mobile Computing and Networking, 2023
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 2023 2nd Asia Conference on Algorithms, Computing and Machine Learning, 2023
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023
2022
IEEE Trans. Ind. Informatics, 2022
A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks.
IEEE Trans. Ind. Informatics, 2022
A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain.
Secur. Commun. Networks, 2022
LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing.
J. Ambient Intell. Humaniz. Comput., 2022
CoRR, 2022
Concurr. Comput. Pract. Exp., 2022
A privacy preservation method for multiple-source unstructured data in online social networks.
Comput. Secur., 2022
Comput. Secur., 2022
Proceedings of the IEEE International Conference on Trust, 2022
An Improved ACS Algorithm by CA for Task Scheduling in Heterogeneous Multiprocessing Environments.
Proceedings of the Theoretical Computer Science - 40th National Conference, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks.
J. Netw. Comput. Appl., 2021
FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.
Inf. Sci., 2021
An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments.
IEEE Internet Things J., 2021
Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things.
Future Gener. Comput. Syst., 2021
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning.
CoRR, 2021
CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the 2021 IEEE SmartWorld, 2021
Proceedings of the 2021 IEEE SmartWorld, 2021
A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHA.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Exploration of the Influence on Training Deep Learning Models by Watermarked Image Dataset.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021
2020
Dataset, July, 2020
A New Method for Constructing Digital Signature With Generative Adversarial Neural Network.
Dataset, April, 2020
Dataset, April, 2020
A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.
IEEE Internet Things J., 2020
BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020
A Reduced Collatz Dynamics Maps to a Residue Class, and Its Count of x/2 over the Count of 3∗x+1 Is Larger than ln3/ln2.
Int. J. Math. Math. Sci., 2020
An Energy Efficient Authentication Scheme using Chebyshev Chaotic Map for Smart Grid Environment.
CoRR, 2020
DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity.
IEEE Access, 2020
IEEE Access, 2020
SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts.
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations.
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
A Fast Robustness Quantification Method for Evaluating Typical Deep Learning Models by Generally Image Processing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020
2019
Dataset, August, 2019
Symmetry, 2019
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications.
Mob. Inf. Syst., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Future Internet, 2019
SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019
Reduced Collatz Dynamics Data Reveals Properties for the Future Proof of Collatz Conjecture.
Data, 2019
Concurr. Comput. Pract. Exp., 2019
Comput. Commun., 2019
A Key Protection Scheme Based on Secret Sharing for Blockchain-Based Construction Supply Chain System.
IEEE Access, 2019
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
A layered security architecture based on cyber kill chain against advanced persistent threats.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019
2018
Verifying whether extremely large integer guarantees Collatz conjecture (can return to 1 finally).
Dataset, November, 2018
Exploring the ratio between the count of x/2 and the count of (3*x+1)/2 in original dynamics for extremely large starting integers asymptotically.
Dataset, November, 2018
Exploring the inverse mapping from a dynamics to a residue class - inputting a reduced dynamics or partial dynamics and outputting a residue class.
Dataset, November, 2018
Dataset, November, 2018
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring.
Fundam. Informaticae, 2018
Future Internet, 2018
Future Gener. Comput. Syst., 2018
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions.
Future Gener. Comput. Syst., 2018
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018
IEEE Access, 2018
Collatz Conjecture for 2^100000-1 Is True - Algorithms for Verifying Extremely Large Numbers.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing.
Comput. Stand. Interfaces, 2017
DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX.
Proceedings of the Advances in Internetworking, 2017
2016
F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing.
Mob. Inf. Syst., 2016
LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing.
Int. J. Embed. Syst., 2016
Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal.
Proceedings of the Advances on P2P, 2016
2015
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring.
Proceedings of the Third International Conference on Robot, Vision and Signal Processing, 2015
2014
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing.
Int. J. Internet Protoc. Technol., 2014
A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function.
Int. J. Comput. Sci. Eng., 2014
2013
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack.
Int. J. Distributed Sens. Networks, 2013
LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks.
Int. J. Distributed Sens. Networks, 2013
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks.
Int. J. Distributed Sens. Networks, 2013
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid.
Int. J. Distributed Sens. Networks, 2013
2012
uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks.
Proceedings of the Computational Intelligence and Intelligent Systems, 2012
2011
QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things.
Int. J. Netw. Manag., 2011
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid.
Int. J. Digit. Multim. Broadcast., 2011
2010
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks.
Sci. China Inf. Sci., 2010
2009
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks.
J. Commun., 2009
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Proceedings of the Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2007
Proceedings of IEEE International Conference on Communications, 2007
2006
J. Comput. Res. Dev., 2006
A Combination Scheme to Improve TCP Throughput over Multihops Wireless Mobile Ad Hoc Networks.
Proceedings of the Technologies for E-Learning and Digital Entertainment, 2006
2005
Honeynet based distributed adaptive network forensics and active real time investigation.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Congestion Targeted Reduction of Quality of Service DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks.
Proceedings of the Seventh IEEE International Symposium on Multimedia (ISM 2005), 2005
Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design .
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005