Παρακολούθηση
Guojun Wang
Guojun Wang
Guangzhou University, China
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα gzhu.edu.cn - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
G Wang, Q Liu, J Wu
Proceedings of the 17th ACM conference on Computer and communications …, 2010
9122010
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
G Wang, Q Liu, J Wu, M Guo
computers & security 30 (5), 320-331, 2011
3252011
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Q Liu, G Wang, J Wu
Information sciences 258, 355-370, 2014
3152014
Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks
Z Zhou, M Dong, K Ota, G Wang, LT Yang
IEEE Internet of Things Journal 3 (3), 428-438, 2015
2882015
Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems
E Luo, MZA Bhuiyan, G Wang, MA Rahman, J Wu, M Atiquzzaman
IEEE Communications Magazine 56 (2), 163-168, 2018
2612018
Deploying wireless sensor networks with fault-tolerance for structural health monitoring
MZA Bhuiyan, G Wang, J Cao, J Wu
IEEE Transactions on Computers 64 (2), 382-395, 2013
2412013
A blockchain-based nonrepudiation network computing service scheme for industrial IoT
Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang
IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019
2362019
Dependable structural health monitoring using wireless sensor networks
MZA Bhuiyan, G Wang, J Wu, J Cao, X Liu, T Wang
IEEE Transactions on Dependable and Secure Computing 14 (4), 363-376, 2015
2332015
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
W Jiang, G Wang, MZA Bhuiyan, J Wu
Acm Computing Surveys (Csur) 49 (1), 1-35, 2016
2082016
A survey on security attacks in VANETs: Communication, applications and challenges
M Arif, G Wang, MZA Bhuiyan, T Wang, J Chen
Vehicular Communications 19, 100179, 2019
1992019
Secure and privacy preserving keyword searching for cloud storage services
Q Liu, G Wang, J Wu
Journal of network and computer applications 35 (3), 927-933, 2012
1942012
Springer International Publishing: Cham
Q Wang, A Zomaya, G Martinez, K Li
Switzerland, 2015
1922015
Generating trusted graphs for trust evaluation in online social networks
W Jiang, G Wang, J Wu
Future generation computer systems 31, 48-58, 2014
1882014
Collaborative trajectory privacy preserving scheme in location-based services
T Peng, Q Liu, D Meng, G Wang
Information Sciences 387, 165-179, 2017
1872017
OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city
M Gheisari, HE Najafabadi, JA Alzubi, J Gao, G Wang, AA Abbasi, ...
Future Generation Computer Systems 123, 1-13, 2021
1812021
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services
S Zhang, X Li, Z Tan, T Peng, G Wang
Future Generation Computer Systems 94, 40-50, 2019
1782019
Fog-based computing and storage offloading for data synchronization in IoT
T Wang, J Zhou, A Liu, MZA Bhuiyan, G Wang, W Jia
IEEE Internet of Things Journal 6 (3), 4272-4282, 2018
1752018
A survey on deep learning in big data
M Gheisari, G Wang, MZA Bhuiyan
2017 IEEE international conference on computational science and engineering …, 2017
1722017
An efficient privacy preserving keyword search scheme in cloud computing
Q Liu, G Wang, J Wu
2009 International Conference on Computational Science and Engineering 2 …, 2009
1682009
Preserving privacy with probabilistic indistinguishability in weighted social networks
Q Liu, G Wang, F Li, S Yang, J Wu
IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016
1582016
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20