An efficient centroid-based routing protocol for energy management in WSN-assisted IoT J Shen, A Wang, C Wang, PCK Hung, CF Lai Ieee Access 5, 18469-18479, 2017 | 252 | 2017 |
Organized topology based routing protocol in incompletely predictable ad-hoc networks J Shen, C Wang, A Wang, X Sun, S Moh, PCK Hung Computer Communications 99, 107-118, 2017 | 31 | 2017 |
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing J Shen, H Yang, A Wang, T Zhou, C Wang Peer-to-Peer Networking and Applications 12, 924-933, 2019 | 27 | 2019 |
Secure big data communication for energy efficient intra-cluster in WSNs A Wang, J Shen, P Vijayakumar, Y Zhu, L Tian Information Sciences 505, 586-599, 2019 | 23 | 2019 |
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security D Liu, J Shen, P Vijayakumar, A Wang, T Zhou Multimedia Tools and Applications 79, 10851-10870, 2020 | 22 | 2020 |
A searchable and verifiable data protection scheme for scholarly big data J Shen, C Wang, A Wang, S Ji, Y Zhang IEEE Transactions on Emerging Topics in Computing 9 (1), 216-225, 2018 | 22 | 2018 |
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks D Liu, J Shen, A Wang, C Wang International Journal of Sensor Networks 27 (2), 95-102, 2018 | 20 | 2018 |
Random-forest based adjusting method for wind forecast of WRF model A Wang, L Xu, Y Li, J Xing, X Chen, K Liu, Y Liang, Z Zhou Computers & Geosciences 155, 104842, 2021 | 19 | 2021 |
Secure real-time image protection scheme with near-duplicate detection in cloud computing D Liu, J Shen, A Wang, C Wang Journal of Real-Time Image Processing 17 (1), 175-184, 2020 | 19 | 2020 |
Direction density-based secure routing protocol for healthcare data in incompletely predictable networks J Shen, C Wang, CF Lai, A Wang, HC Chao IEEE Access 4, 9163-9173, 2016 | 18 | 2016 |
Identity‐based fast authentication scheme for smart mobile devices in body area networks C Wang, W Zheng, S Ji, Q Liu, A Wang Wireless Communications and Mobile Computing 2018 (1), 4028196, 2018 | 17 | 2018 |
Content-centric group user authentication for secure social networks J Shen, A Wang, C Wang, J Li, Y Zhang IEEE Transactions on Emerging Topics in Computing 8 (3), 833-844, 2017 | 14 | 2017 |
Performance comparison of typical and improved LEACH protocols in wireless sensor network J Shen, A Wang, C Wang, Y Ren, J Wang 2015 first international conference on computational intelligence theory …, 2015 | 14 | 2015 |
Moving centroid based routing protocol for incompletely predictable cyber devices in cyber-physical-social distributed systems J Shen, C Wang, A Wang, Q Liu, Y Xiang Future Generation Computer Systems 108, 1129-1139, 2020 | 12 | 2020 |
Anonymous data collection scheme for cloud-aided mobile edge networks A Wang, J Shen, C Wang, H Yang, D Liu Digital Communications and Networks 6 (2), 223-228, 2020 | 12 | 2020 |
Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing D Liu, J Shen, Y Chen, C Wang, T Zhou, A Wang Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019 | 9 | 2019 |
A RFID based localization algorithm applying trilateration for wireless sensor networks J Shen, A Wang, C Wang, NN Xiong Journal of Internet Technology 18 (5), 1167-1175, 2017 | 7 | 2017 |
A novel clustering solution for wireless sensor networks A Wang, S Pan, C Wang, J Shen, D Liu Green, Pervasive, and Cloud Computing: 12th International Conference, GPC …, 2017 | 5 | 2017 |
A RFID based localization algorithm for wireless sensor networks J Shen, A Wang, C Wang, Y Ren, X Sun Cloud Computing and Security: Second International Conference, ICCCS 2016 …, 2016 | 5 | 2016 |
A privacy-protecting and resource-saving scheme for data sharing in smart home H Yang, W Zheng, T Zhou, X Jin, A Wang Journal of Internet Technology 20 (2), 607-615, 2019 | 4 | 2019 |