Wen Huang
Orcid: 0000-0002-0519-6407Affiliations:
- Sichuan University, College of Computer Science, Chengdu, China
- University of Electronic Science and Technology of China, UESTC, School of Information and Software Engineering, Chengdu, China (former)
According to our database1,
Wen Huang
authored at least 24 papers
between 2019 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Neurocomputing, 2025
2024
Dynamic graph attention-guided graph clustering with entropy minimization self-supervision.
Appl. Intell., December, 2024
An Auto-Upgradable End-to-End Preauthenticated Secure Communication Protocol for UAV-Aided Perception Intelligent System.
IEEE Internet Things J., September, 2024
A Fully Auditable Data Propagation Scheme With Dynamic Vehicle Management for EC-ITS.
IEEE Trans. Intell. Transp. Syst., July, 2024
Collect Spatiotemporally Correlated Data in IoT Networks With an Energy-Constrained UAV.
IEEE Internet Things J., June, 2024
A Domain Isolated Tripartite Authenticated Key Agreement Protocol With Dynamic Revocation and Online Public Identity Updating for IIoT.
IEEE Internet Things J., May, 2024
IEEE Trans. Serv. Comput., 2024
Double Index Calculus Algorithm: Faster Solving Discrete Logarithm Problem in Finite Prime Field.
CoRR, 2024
2023
A Stronger Secure Ciphertext Fingerprint-Based Commitment Scheme for Robuster Verifiable OD-CP-ABE in IMCC.
IEEE Internet Things J., September, 2023
Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023
2022
Remote. Sens., 2022
A revocable multi-authority fine-grained access control architecture against ciphertext rollback attack for mobile edge computing.
J. Syst. Archit., 2022
Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022
Adversarial attack and defense technologies in natural language processing: A survey.
Neurocomputing, 2022
An efficient reusable attribute-based signature scheme for mobile services with multi access policies in fog computing.
Comput. Commun., 2022
2021
Unexpected Information Leakage of Differential Privacy Due to the Linear Property of Queries.
IEEE Trans. Inf. Forensics Secur., 2021
Proceedings of the 15th IEEE International Conference on Big Data Science and Engineering, 2021
2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
IEEE Internet Things J., 2019
IEEE Access, 2019
IEEE Access, 2019