Wen Huang

Orcid: 0000-0002-0519-6407

Affiliations:
  • Sichuan University, College of Computer Science, Chengdu, China
  • University of Electronic Science and Technology of China, UESTC, School of Information and Software Engineering, Chengdu, China (former)


According to our database1, Wen Huang authored at least 24 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Auditing privacy budget of differentially private neural network models.
Neurocomputing, 2025

2024
Dynamic graph attention-guided graph clustering with entropy minimization self-supervision.
Appl. Intell., December, 2024

An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System.
IEEE Internet Things J., September, 2024

A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS.
IEEE Trans. Intell. Transp. Syst., July, 2024

Collect Spatiotemporally Correlated Data in IoT Networks With an Energy-Constrained UAV.
IEEE Internet Things J., June, 2024

A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024

Secure Neural Network Prediction in the Cloud-Based Open Neural Network Service.
IEEE Trans. Serv. Comput., 2024

Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field.
CoRR, 2024

2023
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023

Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023

Mobile Payment Protocol with Deniably Authenticated Property.
Sensors, 2023

2022
A High-Utility Differentially Private Mechanism for Space Information Networks.
Remote. Sens., 2022

A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022

Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022

Adversarial attack and defense technologies in natural language processing: A survey.
Neurocomputing, 2022

An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022

2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021

Improving the Number of Queries Supported by Differentially Private Mechanisms.
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021

2020
the Connection between Cryptography and Differential Privacy: a Survey.
CoRR, 2020

Improving Laplace Mechanism of Differential Privacy by Personalized Sampling.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
An Efficient Differential Privacy Logistic Classification Mechanism.
IEEE Internet Things J., 2019

Insecurity of an IBEET Scheme and an ABEET Scheme.
IEEE Access, 2019

Optimizing Query Times for Multiple Users Scenario of Differential Privacy.
IEEE Access, 2019

An Efficient Deniable Authenticated Encryption Scheme for Privacy Protection.
IEEE Access, 2019


  Loading...