default search action
Wenjun Fan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Hsiang-Jen Hong, Sang-Yoon Chang, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou:
Secure and Efficient Authentication using Linkage for permissionless Bitcoin network. Comput. Networks 254: 110840 (2024) - [j13]Na Fan, Jia Liu, Shudi Zhao, Yifan Dai, Wenjun Fan:
TLPP: Deep-Learning-Based Two-Layer Privacy Preserving Mechanism for Protecting Vehicle Trajectory Data. IEEE Internet Things J. 11(22): 36084-36098 (2024) - [j12]Dongdong Qiao, Xuezhe Wei, Bo Jiang, Wenjun Fan, Xin Lai, Yuejiu Zheng, Haifeng Dai:
Quantitative Diagnosis of Internal Short Circuit for Lithium-Ion Batteries Using Relaxation Voltage. IEEE Trans. Ind. Electron. 71(10): 13201-13210 (2024) - [j11]Dongdong Qiao, Xuezhe Wei, Bo Jiang, Wenjun Fan, Hui Gong, Xin Lai, Yuejiu Zheng, Haifeng Dai:
Data-Driven Fault Diagnosis of Internal Short Circuit for Series-Connected Battery Packs Using Partial Voltage Curves. IEEE Trans. Ind. Informatics 20(4): 6751-6761 (2024) - [c44]Yuwen Zou, Wenjun Fan, Zhen Ma:
Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and Defense. ARES 2024: 28:1-28:12 - [c43]Wenjun Fan, Feng Wang, Runan Zheng, Xingze Wang:
An Improved Semantic Segmentation Method for Retinal OCT Images Based on High-Resolution Network and Polarized Self-Attention Mechanism. BIC 2024 - [c42]Wenjun Fan, Siyuan Wu, Yuwen Zou:
A Keyless Authentication Based on Zero-Knowledge Proof with SDN Link Information to Secure Permissionless P2P Networking. ICC 2024: 133-139 - [c41]Wenjun Fan, Siyuan Wu, Hao Chen:
An SDN-Enabled Elliptic-Curve Diffie-Hellman Key Exchange Towards Secure P2P Networking. ICNC 2024: 677-683 - [c40]Hsiang-Jen Hong, Sang-Yoon Chang, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou:
SEAL: Secure and Efficient Authentication using Linkage for Blockchain Networks. ICIN 2024: 114-121 - [c39]Jia Liu, Wenjun Fan, Yifan Dai, Eng Gee Lim, Alexei Lisitsa:
A Lightweight and Responsive On-Line IDS Towards Intelligent Connected Vehicles System. SAFECOMP 2024: 184-199 - [i2]Wenjun Fan, Zhihui Du, Max Smith-Creasey, David Fernández:
HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design. CoRR abs/2402.06516 (2024) - 2023
- [j10]Jianwei Zheng, Wenjun Fan:
Readers' reception of translated literary work: Fortress Besieged in the digital English world. Digit. Scholarsh. Humanit. 38(1): 408-419 (2023) - [j9]Wenjun Fan, Hsiang-Jen Hong, Jinoh Kim, Simeon Wuthier, Makiya Nakashima, Xiaobo Zhou, Ching-Hua Chow, Sang-Yoon Chang:
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection. IEEE Trans. Dependable Secur. Comput. 20(2): 1302-1318 (2023) - [c38]Yueyang Li, Wenjun Fan, Ruxue Luo:
Machine Learning-based Approach for Enhancing Multi-step Attack Prediction. APNOMS 2023: 48-53 - [c37]Zhenxu Gao, Wenjun Fan, Ruxue Luo:
QKD-based Secure Communication for UAV. APNOMS 2023: 107-112 - [c36]Jia Liu, Wenjun Fan:
A Machine Learning-Based Intrusion Detection Approach for Intelligent Connected Vehicles. APNOMS 2023: 231-234 - [c35]Zhaoxi Zhong, Wenjun Fan:
A Honey-imprint enabled Approach for Resisting Social Engineering Attacks. APNOMS 2023: 302-305 - [c34]Jingyi Deng, San Hu, Wenjun Fan:
Privacy-preserving Deep Learning for Grey Scale Image Classification with Pixel-based Encryption. CyberC 2023: 263-271 - [c33]Chenlei Zhang, Xinlin Li, Yuchen Luan, Wenjun Fan:
A Chaotic Encryption Approach Improving Digital Image Security. CyberC 2023: 383-392 - [c32]Sheng Fang, Tianyang Liu, Yaning Zhu, Wenjun Fan:
Classification and Identification of Phishing Websites based on Machine Learning. CyberC 2023: 397-403 - [c31]Luyi Li, Yueyang Li, Ruxue Luo, Yuzhen Chen, Wenjun Fan:
Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept. ISCC 2023: 1331-1334 - [c30]Siyuan Wu, Wenjun Fan:
An SDN-NFV-enabled Honeypot for Manipulating Command & Control Shell TCP Connection. NOMS 2023: 1-5 - [c29]Yueyang Li, Luyi Li, Ruxue Luo, Yuzhen Chen, Arijet Sarker, Sang-Yoon Chang, Wenjun Fan:
Investigation and Countermeasure toward Unintentional Access to Docker Container. SVCC 2023: 1-6 - 2022
- [j8]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency. Comput. Networks 219: 109436 (2022) - [j7]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Anomaly Detection Based on Traffic Monitoring for Secure Blockchain Networking. IEEE Trans. Netw. Serv. Manag. 19(3): 3619-3632 (2022) - [c28]Wenjun Fan, Simeon Wuthier, Hsiang-Jen Hong, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang:
The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network. ICDCS 2022: 191-201 - [c27]Wuyan Sun, Chuyang Yuan, Wenjun Fan:
A Measurement of Real-world Attack Connections toward Honeypots. M&N 2022: 1-6 - [c26]Wenjun Fan, Shubham Kumar, Sang-Yoon Chang, Younghee Park:
A Blockchain-Based Retribution Mechanism for Collaborative Intrusion Detection. SVCC 2022: 57-73 - 2021
- [j6]Jianwei Zheng, Wenjun Fan:
Different processes for translating expressive versus informative texts? A computer-assisted study of professionals' English-Chinese translation. Digit. Scholarsh. Humanit. 36(3): 782-793 (2021) - [c25]Wenjun Fan, Sang-Yoon Chang, Xiaobo Zhou, Shouhuai Xu:
ConMan: A Connection Manipulation-based Attack Against Bitcoin Networking. CNS 2021: 101-109 - [c24]Wenjun Fan, Jinoh Kim, Ikkyun Kim, Xiaobo Zhou, Sang-Yoon Chang:
Performance Analyses for Applying Machine Learning on Bitcoin Miners. ICEIC 2021: 1-4 - [c23]Wenjun Fan, Hsiang-Jen Hong, Simeon Wuthier, Xiaobo Zhou, Yan Bai, Sang-Yoon Chang:
Security Analyses of Misbehavior Tracking in Bitcoin Network. IEEE ICBC 2021: 1-3 - [c22]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking. IEEE ICBC 2021: 1-9 - [c21]Wenjun Fan, Hsiang-Jen Hong, Xiaobo Zhou, Sang-Yoon Chang:
A Generic Blockchain Framework to Secure Decentralized Applications. ICC 2021: 1-7 - [c20]Hsiang-Jen Hong, Wenjun Fan, Simeon Wuthier, Jinoh Kim, Xiaobo Zhou, C. Edward Chow, Sang-Yoon Chang:
Robust P2P Connectivity Estimation for Permissionless Bitcoin Network. IWQoS 2021: 1-6 - [c19]Jinoh Kim, Makiya Nakashima, Wenjun Fan, Simeon Wuthier, Xiaobo Zhou, Ikkyun Kim, Sang-Yoon Chang:
A Machine Learning Approach to Peer Connectivity Estimation for Reliable Blockchain Networking. LCN 2021: 319-322 - [c18]Wenjun Fan, Sang-Yoon Chang, Shubham Kumar, Xiaobo Zhou, Younghee Park:
Blockchain-based Secure Coordination for Distributed SDN Control Plane. NetSoft 2021: 253-257 - [c17]Arijet Sarker, SangHyun Byun, Wenjun Fan, Sang-Yoon Chang:
Blockchain-based root of trust management in security credential management system for vehicular communications. SAC 2021: 223-231 - 2020
- [j5]David W. Chadwick, Wenjun Fan, Gianpiero Costantino, Rogério de Lemos, Francesco Di Cerbo, Ian Herwono, Mirko Manea, Paolo Mori, Ali Sajjad, Xiao-Si Wang:
A cloud-edge based data security architecture for sharing and analysing cyber threat information. Future Gener. Comput. Syst. 102: 710-722 (2020) - [c16]Wenjun Fan, Sang-Yoon Chang, Shawn Emery, Xiaobo Zhou:
Blockchain-based Distributed Banking for Permissioned and Accountable Financial Transaction Processing. ICCCN 2020: 1-9 - [c15]Hsiang-Jen Hong, Wenjun Fan, C. Edward Chow, Xiaobo Zhou, Sang-Yoon Chang:
Optimizing Social Welfare for Task Offloading in Mobile Edge Computing. Networking 2020: 524-528 - [c14]Arijet Sarker, SangHyun Byun, Wenjun Fan, Maria Psarakis, Sang-Yoon Chang:
Voting Credential Management System for Electronic Voting Privacy. Networking 2020: 589-593 - [c13]Wenjun Fan, Shubham Kumar, Vrushali Jadhav, Sang-Yoon Chang, Younghee Park:
A Privacy Preserving E-Voting System Based on Blockchain. SVCC 2020: 148-159 - [c12]Chungsik Song, Wenjun Fan, Sang-Yoon Chang, Younghee Park:
Reconstructing Classification to Enhance Machine-Learning Based Network Intrusion Detection by Embracing Ambiguity. SVCC 2020: 169-187 - [c11]Wenjun Fan, Younghee Park, Shubham Kumar, Priyatham Ganta, Xiaobo Zhou, Sang-Yoon Chang:
Blockchain-enabled Collaborative Intrusion Detection in Software Defined Networks. TrustCom 2020: 967-974
2010 – 2019
- 2019
- [j4]Wenjun Fan, Zhihui Du, Max Smith-Creasey, David Fernández:
HoneyDOC: An Efficient Honeypot Architecture Enabling All-Round Design. IEEE J. Sel. Areas Commun. 37(3): 683-697 (2019) - [c10]Wenjun Fan, Joanna Ziembicka, Rogério de Lemos, David W. Chadwick, Francesco Di Cerbo, Ali Sajjad, Xiao-Si Wang, Ian Herwono:
Enabling Privacy-Preserving Sharing of Cyber Threat Information in the Cloud. CSCloud/EdgeCom 2019: 74-80 - 2018
- [j3]Wenjun Fan, Zhihui Du, David Fernández, Víctor A. Villagrá:
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. IEEE Syst. J. 12(4): 3906-3919 (2018) - 2017
- [j2]Wenjun Fan, David Fernández, Zhihui Du:
Versatile virtual honeynet management framework. IET Inf. Secur. 11(1): 38-45 (2017) - [c9]Fabio Giubilo, Ali Sajjad, Mark Shackleton, David W. Chadwick, Wenjun Fan, Rogério de Lemos:
An architecture for privacy-preserving sharing of CTI with 3rd party analysis services. ICITST 2017: 293-297 - [c8]Wenjun Fan, David Fernández:
A novel SDN based stealthy TCP connection handover mechanism for hybrid honeypot systems. NetSoft 2017: 1-9 - [i1]Wenjun Fan, Zhihui Du, David Fernández, Víctor A. Villagrá:
Enabling an Anatomic View to Investigate Honeypot Systems: A Survey. CoRR abs/1704.05357 (2017) - 2015
- [c7]Wenjun Fan, Zhihui Du, David Fernández, Xinning Hui:
Dynamic Hybrid Honeypot System Based Transparent Traffic Redirection Mechanism. ICICS 2015: 311-319 - [c6]Wenjun Fan, David Fernández, Víctor A. Villagrá:
Technology Independent Honeynet Description Language. MODELSWARD 2015: 303-311 - [c5]Wenjun Fan, David Fernández, Zhihui Du:
Adaptive and Flexible Virtual Honeynet. MSPN 2015: 1-17 - 2013
- [j1]Zhihui Du, Wenjun Fan, Yunpeng Chai, Yinong Chen:
Priori information and sliding window based prediction algorithm for energy-efficient storage systems in cloud. Simul. Model. Pract. Theory 39: 3-19 (2013) - [c4]Xudong Chen, Wenjun Fan:
Using end-to-end data encryption to secure SIP device configuration. GrC 2013: 58-63 - [c3]Zhihui Du, Wenjun Fan, Yunpeng Chai:
Three-state disk model for high quality and energy efficient streaming media servers. ISADS 2013: 1-8 - 2010
- [c2]Wenjun Fan, Xudong Chen, Xuefeng Li:
Parallelization of RSA Algorithm Based on Compute Unified Device Architecture. GCC 2010: 174-178 - [c1]Cheng Gong, Wenjun Fan:
A New Automatic Train Identification System Based on RFID. WISE Workshops 2010: 463-473
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint