Wenjun Fan
Orcid: 0009-0005-0999-2987
According to our database1,
Wenjun Fan
authored at least 59 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
TLPP: Deep-Learning-Based Two-Layer Privacy Preserving Mechanism for Protecting Vehicle Trajectory Data.
IEEE Internet Things J., November, 2024
Quantitative Diagnosis of Internal Short Circuit for Lithium-Ion Batteries Using Relaxation Voltage.
IEEE Trans. Ind. Electron., October, 2024
Data-Driven Fault Diagnosis of Internal Short Circuit for Series-Connected Battery Packs Using Partial Voltage Curves.
IEEE Trans. Ind. Informatics, April, 2024
Secure and Efficient Authentication using Linkage for permissionless Bitcoin network.
Comput. Networks, 2024
A Lightweight and Responsive On-Line IDS Towards Intelligent Connected Vehicles System.
Proceedings of the Computer Safety, Reliability, and Security, 2024
Proceedings of the 27th Conference on Innovation in Clouds, Internet and Networks, 2024
Proceedings of the Information and Communications Security - 26th International Conference, 2024
An SDN-Enabled Elliptic-Curve Diffie-Hellman Key Exchange Towards Secure P2P Networking.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
A Keyless Authentication Based on Zero-Knowledge Proof with SDN Link Information to Secure Permissionless P2P Networking.
Proceedings of the IEEE International Conference on Communications, 2024
An Improved Semantic Segmentation Method for Retinal OCT Images Based on High-Resolution Network and Polarized Self-Attention Mechanism.
Proceedings of the 2024 4th International Conference on Bioinformatics and Intelligent Computing, 2024
Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense.
Proceedings of the 19th International Conference on Availability, Reliability and Security, 2024
2023
Readers' reception of translated literary work: <i>Fortress Besieged</i> in the digital English world.
Digit. Scholarsh. Humanit., April, 2023
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the Silicon Valley Cybersecurity Conference, 2023
Proceedings of the NOMS 2023, 2023
Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023
Privacy-preserving Deep Learning for Grey Scale Image Classification with Pixel-based Encryption.
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
A Machine Learning-Based Intrusion Detection Approach for Intelligent Connected Vehicles.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
2022
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking.
IEEE Trans. Netw. Serv. Manag., 2022
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency.
Comput. Networks, 2022
Proceedings of the Silicon Valley Cybersecurity Conference - Third Conference, 2022
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
2021
Different processes for translating expressive versus informative texts? A computer-assisted study of professionals' English-Chinese translation.
Digit. Scholarsh. Humanit., 2021
Blockchain-based root of trust management in security credential management system for vehicular communications.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking.
Proceedings of the 46th IEEE Conference on Local Computer Networks, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021
Proceedings of the International Conference on Electronics, Information, and Communication, 2021
Proceedings of the IEEE Conference on Communications and Network Security, 2021
2020
A cloud-edge based data security architecture for sharing and analysing cyber threat information.
Future Gener. Comput. Syst., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020
Proceedings of the 2020 IFIP Networking Conference, 2020
Proceedings of the 2020 IFIP Networking Conference, 2020
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020
2019
IEEE J. Sel. Areas Commun., 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
2018
IEEE Syst. J., 2018
2017
A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems.
Proceedings of the 2017 IEEE Conference on Network Softwarization, 2017
An architecture for privacy-preserving sharing of CTI with 3<sup>rd</sup> party analysis services.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
2015
Proceedings of the Mobile, Secure, and Programmable Networking, 2015
Proceedings of the MODELSWARD 2015, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2013
Priori information and sliding window based prediction algorithm for energy-efficient storage systems in cloud.
Simul. Model. Pract. Theory, 2013
Three-state disk model for high quality and energy efficient streaming media servers.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013
2010
Proceedings of the Web Information Systems Engineering - WISE 2010 Workshops, 2010
Proceedings of the GCC 2010, 2010