Wenyi Tang

Orcid: 0000-0002-0308-9587

According to our database1, Wenyi Tang authored at least 43 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
HAIGEN: Towards Human-AI Collaboration for Facilitating Creativity and Style Generation in Fashion Design.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., August, 2024

A green computing method for encrypted IoT traffic recognition based on traffic fingerprint graphs.
Peer Peer Netw. Appl., May, 2024

Detecting Offensive Language Based on Graph Attention Networks and Fusion Features.
IEEE Trans. Comput. Soc. Syst., February, 2024

Comprehensive vulnerability aspect extraction.
Appl. Intell., February, 2024

Fair$^{2}$2Trade: Digital Trading Platform Ensuring Exchange and Distribution Fairness.
IEEE Trans. Dependable Secur. Comput., 2024

Analyzing topics in social media for improving digital twinning based product development.
Digit. Commun. Networks, 2024

HAIGEN: Towards Human-AI Collaboration for Facilitating Creativity and Style Generation in Fashion Design.
CoRR, 2024

Interaction matters: Encrypted traffic classification via status-based interactive behavior graph.
Appl. Soft Comput., 2024

PrivHChain: Monitoring the Supply Chain of Controlled Substances with Privacy-Preserving Hierarchical Blockchain.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2024

GrAC: Graph-Based Anonymous Credentials from Identity Graphs on Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2024

SCAFT: A Scalable Crowd-Assisted Fair Trading Protocol.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
RAUCG: Retrieval-Augmented Unsupervised Counter Narrative Generation for Hate Speech.
CoRR, 2023

TISIN: Traceable Information Sharing in Intermittent Networks.
Proceedings of the IEEE Military Communications Conference, 2023

BDTS: Blockchain-Based Data Trading System.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors.
Proceedings of the IEEE Global Communications Conference, 2023

2022
ProvNet: Networked bi-directional blockchain for data sharing with verifiable provenance.
J. Parallel Distributed Comput., 2022

BDTS: A Blockchain-based Data Trading System with Fair Exchange.
CoRR, 2022

Detecting Offensive Language on Social Networks: An End-to-end Detection Method based on Graph Attention Networks.
CoRR, 2022

Trac<sup>2</sup>Chain: trackability and traceability of graph data in blockchain with linkage privacy.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022

Monitoring Provenance of Delegated Personal Data with Blockchain.
Proceedings of the IEEE International Conference on Blockchain, 2022

2021
Histogram Publication over Numerical Values under Local Differential Privacy.
Wirel. Commun. Mob. Comput., 2021

Learning disentangled user representation with multi-view information fusion on social networks.
Inf. Fusion, 2021

Susceptible user search for defending opinion manipulation.
Future Gener. Comput. Syst., 2021

Using Provenance to Evaluate Risk and Benefit of Data Sharing.
Proceedings of the 13th International Workshop on Theory and Practice of Provenance, 2021

Prv<sup>2</sup>chain: Storage of Tree-structured Provenance Records in Blockchain with Linkage Privacy.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2021

FairTrade: Efficient Atomic Exchange-based Fair Exchange Protocol for Digital Data Trading.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Job Scheduling to Minimize Total Completion Time on Multiple Edge Servers.
IEEE Trans. Netw. Sci. Eng., 2020

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing.
KSII Trans. Internet Inf. Syst., 2020

Budgeted Persuasion on User Opinions via Varying Susceptibility.
Proceedings of the 39th IEEE International Performance Computing and Communications Conference, 2020

2019
A Novel Task Allocation Algorithm in Mobile Crowdsensing with Spatial Privacy Preservation.
Wirel. Commun. Mob. Comput., 2019

A Second-Order Diffusion Model for Influence Maximization in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2019

Anomaly residual prediction with spatial-temporal and perceptual constraints.
J. Electronic Imaging, 2019

Privacy Preserving Machine Learning with Limited Information Leakage.
Proceedings of the Network and System Security - 13th International Conference, 2019



2018
Physarum-inspired routing protocol for energy harvesting wireless sensor networks.
Telecommun. Syst., 2018

Relay selection based on social relationship prediction and information leakage reduction for mobile social networks.
Math. Found. Comput., 2018

2017
Visual Tracking by Deep Discriminative Map.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Outsourcing Encrypted Excel Files.
Proceedings of the Information Security Practice and Experience, 2017

Deep Scale Feature for Visual Tracking.
Proceedings of the Image and Graphics - 9th International Conference, 2017

Robust visual tracking with deep feature fusion.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

2016
A Short-Time Three-Phase Single-Rail Precharge Logic against Differential Power Analysis.
IEICE Trans. Electron., 2016

2015
A low power and high speed CAM design using pulsed voltage for search-line.
Proceedings of the 2015 IEEE 11th International Conference on ASIC, 2015


  Loading...