Wenping Ma
Orcid: 0000-0001-6569-3029Affiliations:
- Xidian University, State Key Laboratory of Integrated Service Networks (ISN), Xi'an, China (PhD 1999)
According to our database1,
Wenping Ma
authored at least 77 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Communications and Networks Resources Sharing in 6G: Challenges, Architecture, and Opportunities.
IEEE Wirel. Commun., December, 2024
Info-Chain: Reputation-Based Blockchain for Secure Information Sharing in 6G Intelligent Transportation Systems.
IEEE Internet Things J., 2024
BECS: A Privacy-Preserving Computing Sharing Mechanism in 6G Computing Power Network.
CoRR, 2024
Domain Generalization-Aware Uncertainty Introspective Learning for 3D Point Clouds Segmentation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
2023
IEEE Trans. Veh. Technol., October, 2023
Inf. Sci., August, 2023
2022
Inf. Sci., 2022
2021
SieveNet: Decoupling activation function neural network for privacy-preserving deep learning.
Inf. Sci., 2021
Cryptanalysis and improvement of "Game theoretic security of quantum bit commitment".
Inf. Sci., 2021
IEEE Commun. Lett., 2021
2020
Secur. Commun. Networks, 2020
Multi-Permutation Codes Correcting a Single Burst Unstable Deletions in Flash Memory.
IEEE Commun. Lett., 2020
Enable Dynamic Parameters Combination to Boost Linear Convolutional Neural Network for Sensitive Data Inference.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
2019
Quantum Inf. Process., 2019
Quantum Inf. Process., 2019
计算机科学, 2019
基于区块链的信息共享及安全多方计算模型 (Information Sharing and Secure Multi-party Computing Model Based on Blockchain).
计算机科学, 2019
NPMA: A Novel Privacy-Preserving Mutual Authentication in TMIS for Mobile Edge-Cloud Architecture.
J. Medical Syst., 2019
J. Ambient Intell. Humaniz. Comput., 2019
EURASIP J. Inf. Secur., 2019
CoRR, 2019
Secure and efficient proxy re-encryption scheme based on key-homomorphic constrained PRFs in cloud computing.
Clust. Comput., 2019
MBPA: A Medibchain-Based Privacy-Preserving Mutual Authentication in TMIS for Mobile Medical Cloud Architecture.
IEEE Access, 2019
Stochastic Ranking for Offline Data-Driven Evolutionary Optimization Using Radial Basis Function Networks with Multiple Kernels.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
2018
Comments on "An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys".
IEEE Trans. Inf. Forensics Secur., 2018
Quantum Inf. Process., 2018
Multi-party traveling-mode quantum key agreement protocols immune to collusive attack.
Quantum Inf. Process., 2018
A two-timescale graph-based resource allocation scheme combing dynamic eICIC in Heterogeneous Networks.
Phys. Commun., 2018
一种新的信息服务实体跨域认证模型 (New Cross-domain Authentication Model for Information Services Entity).
计算机科学, 2018
CDAKA: A Provably-Secure Heterogeneous Cross-Domain Authenticated Key Agreement Protocol with Symptoms-Matching in TMIS.
J. Medical Syst., 2018
Hybrid of Downlink and Uplink Transmission for Small Cell Networks with Interference Alignment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Binary Sequence Pairs of Period <i>p<sup>m</sup></i>-1 with Optimal Three-Level Correlation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Entanglement-assisted quantum MDS codes from constacyclic codes with large minimum distance.
Finite Fields Their Appl., 2018
Key predistribution schemes for wireless sensor networks based on combinations of orthogonal arrays.
Ad Hoc Networks, 2018
IEEE Access, 2018
Efficient and Secure Access Control Scheme in the Standard Model for Vehicular Cloud Computing.
IEEE Access, 2018
ETAP: Energy-Efficient and Traceable Authentication Protocol in Mobile Medical Cloud Architecture.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
A Combinatorial Key Predistribution Scheme for Two-Layer Hierarchical Wireless Sensor Networks.
Wirel. Pers. Commun., 2017
Quantum Inf. Process., 2017
Efficient chosen ciphertext secure key encapsulation mechanism in standard model over ideal lattices.
Int. J. Comput. Math., 2017
2016
Secur. Commun. Networks, 2016
Quantum Inf. Process., 2016
2015
Secur. Commun. Networks, 2015
Quantum Inf. Process., 2015
Reduced Complexity Belief Propagation Decoding Algorithm for Polar Codes Based on the Principle of Equal Spacing.
IEICE Trans. Commun., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Quantum Inf. Process., 2014
A point symmetry-based clonal selection clustering algorithm and its application in image compression.
Pattern Anal. Appl., 2014
Des. Codes Cryptogr., 2014
Compressive Direction-of-Arrival Estimation via Regularized Multiple Measurement FOCUSS algorithm.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE Congress on Evolutionary Computation, 2014
2013
Quantum Inf. Process., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Linear Complexity of a New Generalized Cyclotomic Sequence of Order Two of Length <i>pq</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the IEEE Congress on Evolutionary Computation, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2007
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007
2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006
2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005