default search action
Wei Ren 0002
Person information
- affiliation: China University of Geosciences, School of Computer Science, Wuhan, China
Other persons with the same name
- Wei Ren — disambiguation page
- Wei Ren 0001 — University of California, Riverside, Department of Electrical Engineering, CA, USA (and 3 more)
- Wei Ren 0003 — Shanghai Jiao Tong University, School of Aeronautics and Aerospace, China
- Wei Ren 0004 — Dalian University of Technology, Key Laboratory of Intelligent Control and Optimization for Industrial Equipment of Ministry of Education, China (and 4 more)
- Wei Ren 0005 — Beijing University of Posts and Telecommunication, Department of Computer Science, Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, China
- Wei Ren 0006 — Beijing Institute of Technology, Key Laboratory of Electronic and Information Technology in Satellite Navigation, Ministry of Education, China
- Wei Ren 0007 — Microsoft Corperation, Depatrtment of Software Development Engineering, Redmond, WA, USA (and 1 more)
- Wei Ren 0008 — University of Kentucky, Department of Plant and Soil Sciences, College of Agriculture, Food and Environment, Lexington, KY, USA
- Wei Ren 0009 — National University of Singapore, Department of Electrical Engineering, Singapore (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j72]Ruoting Xiong, Wei Ren, Shenghui Zhao, Jie He, Yi Ren, Kim-Kwang Raymond Choo, Geyong Min:
CoPiFL: A collusion-resistant and privacy-preserving federated learning crowdsourcing scheme using blockchain and homomorphic encryption. Future Gener. Comput. Syst. 156: 95-104 (2024) - [j71]Liping Zhang, Anzi Li, Shukai Chen, Wei Ren, Kim-Kwang Raymond Choo:
A Secure, Flexible, and PPG-Based Biometric Scheme for Healthy IoT Using Homomorphic Random Forest. IEEE Internet Things J. 11(1): 612-622 (2024) - [j70]Haoran Qin, Yining Tan, Yuxian Chen, Wei Ren, Kim-Kwang Raymond Choo:
TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles. IEEE Internet Things J. 11(2): 3563-3577 (2024) - [j69]Wei Zhou, Tianqing Zhu, Dayong Ye, Wei Ren, Kim-Kwang Raymond Choo:
A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy. IEEE Internet Things J. 11(4): 6537-6550 (2024) - [j68]Yuexin Xiang, Tiantian Li, Wei Ren, Jie He, Tianqing Zhu, Kim-Kwang Raymond Choo:
AdvEWM: Generating image adversarial examples by embedding digital watermarks. J. Inf. Secur. Appl. 80: 103662 (2024) - [j67]Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren:
The Formal Analysis on Negative Information Selections for Privacy Protection in Data Publishing. J. Electr. Comput. Eng. 2024: 7486890:1-7486890:6 (2024) - [j66]Yuexin Xiang, Yuchen Lei, Ding Bao, Tiantian Li, Qingqing Yang, Wenmao Liu, Wei Ren, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis. IEEE Trans. Inf. Forensics Secur. 19: 2171-2185 (2024) - [j65]Liping Zhang, Shukai Chen, Fei Lin, Wei Ren, Kim-Kwang Raymond Choo, Geyong Min:
1DIEN: Cross-session Electrocardiogram Authentication Using 1D Integrated EfficientNet. ACM Trans. Multim. Comput. Commun. Appl. 20(1): 17:1-17:17 (2024) - [c46]Jian Liu, Shaohua Zhang, Siying Yan, Xianchao Zhang, Wei Ren:
Formal Analysis on Interaction Flow and Information Cocoon Based on Probabilistic Graph. CSCloud 2024: 96-100 - [c45]Zinuo Zhang, Ruoting Xiong, Xinyu Di, Wei Ren:
CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity. CSCWD 2024: 2016-2021 - 2023
- [j64]Zhiqiu Zhang, Tianqing Zhu, Wei Ren, Ping Xiong, Kim-Kwang Raymond Choo:
Preserving data privacy in federated learning through large gradient pruning. Comput. Secur. 125: 103039 (2023) - [j63]Jie Li, Tianqing Zhu, Wei Ren, Kim-Kwang Raymond Choo:
Improve individual fairness in federated learning via adversarial training. Comput. Secur. 132: 103336 (2023) - [j62]Shiyong Huang, Xin Yang, Langyue He, Xiaohan Hao, Wei Ren:
An analysis model for detecting misbehaviors in anonymous cryptocurrency. Comput. Stand. Interfaces 83: 103669 (2023) - [j61]Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning. Eng. Appl. Artif. Intell. 126(Part D): 107180 (2023) - [j60]Ding Bao, Wei Ren, Yuexin Xiang, Weimao Liu, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs. Frontiers Comput. Sci. 17(6): 176215 (2023) - [j59]Xiaofan Liu, Wei Ren, Kim-Kwang Raymond Choo:
BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice. Frontiers Comput. Sci. 17(6): 176815 (2023) - [j58]Kai Wang, Jinxia Wu, Tianqing Zhu, Wei Ren, Ying Hong:
Defense against membership inference attack in graph neural networks through graph perturbation. Int. J. Inf. Sec. 22(2): 497-509 (2023) - [j57]Xiaofan Liu, Weihui Qiu, Wei Ren, Caixu Xu, Kim-Kwang Raymond Choo:
An in-situ authentication with privacy preservation scheme for accident response in Internet of Vehicles. Internet Things 22: 100728 (2023) - [j56]Ruoting Xiong, Wei Ren, Xiaohan Hao, Jie He, Kim-Kwang Raymond Choo:
BDIM: A Blockchain-Based Decentralized Identity Management Scheme for Large Scale Internet of Things. IEEE Internet Things J. 10(24): 22581-22590 (2023) - [j55]Taoyuan Li, Liangli Ma, Jiwei Qin, Wei Ren:
DTGCN: a method combining dependency tree and graph convolutional networks for Chinese long-interval named entity relationship extraction. J. Ambient Intell. Humaniz. Comput. 14(10): 13361-13373 (2023) - [j54]Xiaoya Wang, Tianqing Zhu, Wei Ren, Dongmei Zhang, Ping Xiong:
Migrating federated learning to centralized learning with the leverage of unlabeled data. Knowl. Inf. Syst. 65(9): 3725-3752 (2023) - [j53]Yizhi Liu, Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo, Geyong Min:
A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things. IEEE Trans. Computers 72(2): 501-512 (2023) - [j52]Xiaohan Hao, Wei Ren, Yangyang Fei, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things. IEEE Trans. Serv. Comput. 16(2): 773-786 (2023) - [j51]Liping Zhang, Yue Zhu, Wei Ren, Yixin Zhang, Kim-Kwang Raymond Choo:
Privacy-Preserving Fast Three-Factor Authentication and Key Agreement for IoT-Based E-Health Systems. IEEE Trans. Serv. Comput. 16(2): 1324-1333 (2023) - [c44]Rundong Wang, Bohao Li, Wei Ren, Jie He:
CCBTC: A Blockchain-Based Covert Communication Scheme over Bitcoin Transactions. APWeb-WAIM (1) 2023: 466-480 - [c43]Ping Chen, Jingjing Hu, Zhitao Wu, Ruoting Xiong, Wei Ren:
MergeTree: a Tree Model with Merged Nodes for Threat Induction. CACML 2023: 49-53 - [c42]Xiang Wu, Bohao Li, Boyang Zhang, Xiaofan Liu, Wei Ren, Kim-Kwang Raymond Choo:
Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium. ISCC 2023: 291-297 - [c41]Ruoting Xiong, Kit-Lun Tong, Yi Ren, Wei Ren, Gerard Parr:
From 5G to 6G: It is Time to Sniff the Communications between a Base Station and Core Networks. MobiCom 2023: 117:1-117:2 - [c40]Shiyong Huang, Haocong Li, Ruoting Xiong, Wei Ren, Jie He, Yi Ren:
A Commitment and Ring Signature based Scheme for Amount and Identity Privacy Protection in Blockchain. TrustCom 2023: 292-299 - 2022
- [j50]Chenguang Wang, Tianqing Zhu, Ping Xiong, Wei Ren, Kim-Kwang Raymond Choo:
A privacy preservation method for multiple-source unstructured data in online social networks. Comput. Secur. 113: 102574 (2022) - [j49]Xiuting Gu, Tianqing Zhu, Jie Li, Tao Zhang, Wei Ren, Kim-Kwang Raymond Choo:
Privacy, accuracy, and model fairness trade-offs in federated learning. Comput. Secur. 122: 102907 (2022) - [j48]Lefeng Zhang, Guanghua Song, Danyang Zhu, Wei Ren, Ping Xiong:
Location privacy preservation through kernel transformation. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j47]Ping Xiong, Guirong Li, Wei Ren, Tianqing Zhu:
LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing. J. Ambient Intell. Humaniz. Comput. 13(12): 5803-5818 (2022) - [j46]Huiying Zou, Xiaofan Liu, Wei Ren, Tianqing Zhu:
A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain. Secur. Commun. Networks 2022: 5424395:1-5424395:8 (2022) - [j45]Xiaohan Hao, Wei Ren, Kim-Kwang Raymond Choo, Neal N. Xiong:
A Self-Trading and Authenticated Roaming Scheme Based on Blockchain for Smart Grids. IEEE Trans. Ind. Informatics 18(6): 4097-4106 (2022) - [j44]Liping Zhang, Wenhao Gao, Shukai Chen, Wei Ren, Kim-Kwang Raymond Choo, Neal N. Xiong:
A Privacy-Preserving Proximity Testing Using Private Set Intersection for Vehicular Ad-Hoc Networks. IEEE Trans. Ind. Informatics 18(10): 7373-7383 (2022) - [c39]Ming Wei, Xiaofan Liu, Wei Ren:
RoFL: A Robust Federated Learning Scheme Against Malicious Attacks. APWeb/WAIM (3) 2022: 277-291 - [c38]Qingqing Yang, Yuexin Xiang, Wenmao Liu, Wei Ren:
An Illicit Bitcoin Address Analysis Scheme Based on Subgraph Evolution. HPCC/DSS/SmartCity/DependSys 2022: 679-686 - [c37]Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren:
timeTree: How to Represent Time Sequence in a Threat Tree. HPCC/DSS/SmartCity/DependSys 2022: 2373-2378 - [c36]Ningbo Liu, Liangli Ma, Wei Ren, Muyuan Wang:
An Improved ACS Algorithm by CA for Task Scheduling in Heterogeneous Multiprocessing Environments. NCTCS 2022: 216-235 - [c35]Zhitao Wu, Jingjing Hu, Xiaowei Zhang, Wei Ren:
tTree+: A Threat Tree Model for Representing Complex Semantics. TrustCom 2022: 339-344 - [i4]Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo:
BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis. CoRR abs/2204.05746 (2022) - 2021
- [j43]Xiaohan Hao, Wei Ren, Ruoting Xiong, Tianqing Zhu, Kim-Kwang Raymond Choo:
Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things. Future Gener. Comput. Syst. 124: 243-253 (2021) - [j42]Zhenfei Chen, Tianqing Zhu, Ping Xiong, Chenguang Wang, Wei Ren:
Privacy preservation for image data: A GAN-based method. Int. J. Intell. Syst. 36(4): 1668-1685 (2021) - [j41]Liping Zhang, Yue Zhu, Wei Ren, Yinghan Wang, Kim-Kwang Raymond Choo, Neal N. Xiong:
An Energy-Efficient Authentication Scheme Based on Chebyshev Chaotic Map for Smart Grid Environments. IEEE Internet Things J. 8(23): 17120-17130 (2021) - [j40]Tiantian Li, Wei Ren, Yuexin Xiang, Xianghan Zheng, Tianqing Zhu, Kim-Kwang Raymond Choo, Gautam Srivastava:
FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts. Inf. Sci. 544: 469-484 (2021) - [j39]Yuexin Xiang, Wei Ren, Tiantian Li, Xianghan Zheng, Tianqing Zhu, Kim-Kwang Raymond Choo:
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks. J. Netw. Comput. Appl. 176: 102953 (2021) - [j38]Ruiyang Xiao, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain. IEEE Trans. Dependable Secur. Comput. 18(4): 1793-1803 (2021) - [j37]Liping Zhang, Zhen Wei, Wei Ren, Xianghan Zheng, Kim-Kwang Raymond Choo, Neal N. Xiong:
SIP: An Efficient and Secure Information Propagation Scheme in E-Health Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 1502-1516 (2021) - [c34]Zhenfei Chen, Tianqing Zhu, Bing Tian, Yu Wang, Wei Ren:
A Semantic-based Replacement for Event Image Privacy. CSE 2021: 130-137 - [c33]Weihui Qiu, Xin Yang, Ming Wei, Wei Ren, Tianqing Zhu:
A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks. EUC 2021: 56-63 - [c32]Shiqin Liu, Shiyuan Feng, Jinxia Wu, Wei Ren, Weiqi Wang, Wenwen Zheng:
Exploration of the Influence on Training Deep Learning Models by Watermarked Image Dataset. ISPA/BDCloud/SocialCom/SustainCom 2021: 421-428 - [c31]Wenwen Zheng, Weiqi Wang, Wei Ren, Shiyuan Feng, Shiqin Liu, Yi Ren:
A User Behavior-Based Random Distribution Scheme for Adversarial Example Generated CAPTCHA. ISPA/BDCloud/SocialCom/SustainCom 2021: 1215-1221 - [c30]Ming Wei, Wei Ren:
A Lane Changing Model Based on Imitation Learning and Gaussian Velocity Fields. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 146-153 - [c29]Chenyan Sun, Xiaohan Hao, Wei Ren:
A Route Optimization Scheme based on Improved Simulated Annealing Algorithm. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 186-192 - [c28]Cheng Xu, Wei Ren, Daxi Tu, Linchen Yu, Tianqing Zhu, Yi Ren:
CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services. WASA (1) 2021: 608-628 - [d14]Xiaohan Hao, Ruoting Xiong, Wei Ren:
Sharing Information. IEEE DataPort, 2021 - [i3]Yuexin Xiang, Tiantian Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning. CoRR abs/2105.08876 (2021) - 2020
- [j36]Yangyang Long, Yuling Chen, Wei Ren, Hui Dou, Neal Naixue Xiong:
DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity. IEEE Access 8: 192587-192596 (2020) - [j35]Yuling Chen, Hongyan Yin, Yuexin Xiang, Wei Ren, Yi Ren, Neal Naixue Xiong:
CVT: A Crowdsourcing Video Transcoding Scheme Based on Blockchain Smart Contracts. IEEE Access 8: 220672-220681 (2020) - [j34]Wei Ren:
A Reduced Collatz Dynamics Maps to a Residue Class, and Its Count of x/2 over the Count of 3∗x+1 Is Larger than ln3/ln2. Int. J. Math. Math. Sci. 2020: 5946759:1-5946759:14 (2020) - [j33]Sen He, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things. IEEE Internet Things J. 7(2): 948-959 (2020) - [j32]Cheng Xu, Wei Ren, Linchen Yu, Tianqing Zhu, Kim-Kwang Raymond Choo:
A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things. IEEE Internet Things J. 7(9): 8932-8942 (2020) - [j31]Wei Ren, Jingjing Hu, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
A flexible method to defend against computationally resourceful miners in blockchain proof of work. Inf. Sci. 507: 161-171 (2020) - [c27]Haocong Li, Yunjia Cheng, Wei Ren, Tianqing Zhu:
A Fast Robustness Quantification Method for Evaluating Typical Deep Learning Models by Generally Image Processing. ISPA/BDCloud/SocialCom/SustainCom 2020: 110-117 - [c26]Zhenfei Chen, Tianqing Zhu, Chenguang Wang, Wei Ren, Ping Xiong:
GAN-Based Image Privacy Preservation: Balancing Privacy and Utility. ML4CS (1) 2020: 287-296 - [c25]Yuao Wang, Tianqing Zhu, Wenhan Chang, Sheng Shen, Wei Ren:
Model Poisoning Defense on Federated Learning: A Validation Based Approach. NSS 2020: 207-223 - [c24]Jingye Tang, Tianqing Zhu, Ping Xiong, Yu Wang, Wei Ren:
Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations. NSS 2020: 342-353 - [c23]Xiuting Gu, Tianqing Zhu, Jie Li, Tao Zhang, Wei Ren:
The Impact of Differential Privacy on Model Fairness in Federated Learning. NSS 2020: 419-430 - [c22]Wei Ren:
A Symmetric Uniform Formula and Sole Index Method for Sieving (Twin) Primes. TrustCom 2020: 1592-1597 - [c21]Xiaohan Hao, Wei Ren, Wenwen Zheng, Tianqing Zhu:
SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts. TrustCom 2020: 1598-1605 - [d13]Langyue He, Xiaohan Hao, Wei Ren:
An Analysis Model For Detecting Click Farm in Anonymous Cryptocurrency. IEEE DataPort, 2020 - [d12]Ruoting Xiong, Xiaohan Hao, Wei Ren:
The process of exchanging models. IEEE DataPort, 2020 - [d11]Ruoting Xiong, Xiaohan Hao, Wei Ren, Chengzhuo Zhang:
Learning To Simulate Asymmetric Encryption With Adversarial Neural Networks. IEEE DataPort, 2020 - [d10]Ruoting Xiong, Xiaohan Hao, Wei Ren, Chengzhuo Zhang:
A New Method for Constructing Digital Signature With Generative Adversarial Neural Network. IEEE DataPort, 2020 - [i2]Liping Zhang, Yue Zhu, Wei Ren, Yinghan Wang, Neal N. Xiong:
An Energy Efficient Authentication Scheme using Chebyshev Chaotic Map for Smart Grid Environment. CoRR abs/2008.11366 (2020) - [i1]Yuexin Xiang, Wei Ren, Tiantian Li, Xianghan Zheng, Tianqing Zhu, Kim-Kwang Raymond Choo:
Efficiently Constructing Adversarial Examples by Feature Watermarking. CoRR abs/2009.05107 (2020)
2010 – 2019
- 2019
- [j30]Feng Xiong, Ruiyang Xiao, Wei Ren, Rongyue Zheng, Jianlin Jiang:
A Key Protection Scheme Based on Secret Sharing for Blockchain-Based Construction Supply Chain System. IEEE Access 7: 126773-126786 (2019) - [j29]Ping Xiong, Danyang Zhu, Lefeng Zhang, Wei Ren, Tianqing Zhu:
Optimizing rewards allocation for privacy-preserving spatial crowdsourcing. Comput. Commun. 146: 85-94 (2019) - [j28]Lefeng Zhang, Ping Xiong, Wei Ren, Tianqing Zhu:
A differentially private method for crowdsourcing data submission. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j27]Wei Ren:
Reduced Collatz Dynamics Data Reveals Properties for the Future Proof of Collatz Conjecture. Data 4(2): 89 (2019) - [j26]Yaocheng Zhang, Wei Ren, Tianqing Zhu, Yi Ren:
SaaS: A situational awareness and analysis system for massive android malware detection. Future Gener. Comput. Syst. 95: 548-559 (2019) - [j25]Yuling Chen, Jinyi Guo, Changlou Li, Wei Ren:
FaDe: A Blockchain-Based Fair Data Exchange Scheme for Big Data Sharing. Future Internet 11(11): 225 (2019) - [j24]Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, Wei Ren, Feng Xiong, Tianqing Zhu:
CaACBIM: A Context-aware Access Control Model for BIM. Inf. 10(2): 47 (2019) - [j23]Lingling Zeng, Wei Ren, Yuling Chen, Min Lei:
LMDGW: a novel matrix based dynamic graph watermark. J. Ambient Intell. Humaniz. Comput. 10(1): 295-304 (2019) - [j22]Yuling Chen, Xiaohan Hao, Wei Ren, Yi Ren:
Traceable and Authenticated Key Negotiations via Blockchain for Vehicular Communications. Mob. Inf. Syst. 2019: 5627497:1-5627497:10 (2019) - [j21]Yaocheng Zhang, Wei Ren, Tianqing Zhu, Ehoche Faith:
MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data. Symmetry 11(1): 115 (2019) - [c20]Wei Ren, Ruiyang Xiao:
How to Fast Verify Collatz Conjecture by Automata. HPCC/SmartCity/DSS 2019: 2720-2729 - [c19]Wei Ren:
Ratio and Partition are Revealed in Proposed Graph on Reduced Collatz Dynamics. ISPA/BDCloud/SocialCom/SustainCom 2019: 501-510 - [p9]Liangli Ma, Jinyi Guo, Wei Ren, Yi Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
A watermark-based in situ access-control model for image big data. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 67-87 - [p8]Rongyue Zheng, Jianlin Jiang, Xiaohan Hao, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Blockchain-based security and access control for BIM big data. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 89-119 - [p7]Lin Mu, Jun Song, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Security of marine-information system. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 121-134 - [p6]Pooneh Nikkhah Bahrami, Ali Dehghantanha, Tooska Dargahi, Reza M. Parizi, Kim-Kwang Raymond Choo, Hamid H. S. Javadi, Lizhe Wang, Fatos Xhafa, Wei Ren:
A layered security architecture based on cyber kill chain against advanced persistent threats. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 135-155 - [p5]Ana Nieto, Ruben Rios, Javier López, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Privacy-aware digital forensics. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 157-195 - [p4]Fatos Xhafa, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo:
A survey of trust, trustworthiness and trustworthy computing: concepts, models and challenges. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 197-211 - [p3]Shuaishuai Zhu, Xu An Wang, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Dynamic public opinion evolvement modeling and supervision in social networks. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 239-262 - [p2]Muhammad Shahroz Nadeem, Virginia N. L. Franqueira, Xiaojun Zhai, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Privacy verification of PhotoDNA based on machine learning. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 263-280 - [p1]Xiaojing Gao, Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Chaos-based communication systems. Security and Privacy for Big Data, Cloud Computing and Applications 2019: 281-302 - [e1]Wei Ren, Lizhe Wang, Kim-Kwang Raymond Choo, Fatos Xhafa:
Security and Privacy for Big Data, Cloud Computing and Applications. Institution of Engineering and Technology 2019, ISBN 9781785617485 [contents] - [d9]Wei Ren, Jinyi Guo, Changlou Li:
Analysis of BTC Blockchain Ledger. IEEE DataPort, 2019 - [d8]Wei Ren, Shunwei Qiu, Xiaohan Hao:
A SVM-based Scanning System for Vulnerabilities in Blochchain Smart Contracts. IEEE DataPort, 2019 - 2018
- [j20]Sheng Zhong, Wei Ren, Tianqing Zhu, Yi Ren, Kim-Kwang Raymond Choo:
Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt. IEEE Access 6: 37850-37857 (2018) - [j19]Simin Li, Wei Ren, Tianqing Zhu, Kim-Kwang Raymond Choo:
Lico: A Lightweight Access Control Model for Inter-Networking Linkages. IEEE Access 6: 51748-51755 (2018) - [j18]Zitao Chen, Wei Ren, Yi Ren, Kim-Kwang Raymond Choo:
LiReK: A lightweight and real-time key establishment scheme for wearable embedded devices by gestures or motions. Future Gener. Comput. Syst. 84: 126-138 (2018) - [j17]Yangfan Li, Wei Ren, Tianqing Zhu, Yi Ren, Yue Qin, Wei Jie:
RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms. Future Gener. Comput. Syst. 87: 259-266 (2018) - [j16]Jinyi Guo, Wei Ren, Yi Ren, Tianqing Zhu:
A Watermark-Based In-Situ Access Control Model for Image Big Data. Future Internet 10(8): 69 (2018) - [j15]Yuling Chen, Min Lei, Wei Ren, Yi Ren, Zhiguo Qu:
RoFa: A Robust and Flexible Fine-Grained Access Control Scheme for Mobile Cloud and IoT based Medical Monitoring. Fundam. Informaticae 157(1-2): 167-184 (2018) - [c18]Yaocheng Zhang, Wei Ren, Tianqing Zhu, Wei Bi:
MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data. ICA3PP (2) 2018: 582-595 - [c17]Wei Ren, Simin Li, Ruiyang Xiao, Wei Bi:
Collatz Conjecture for 2^100000-1 Is True - Algorithms for Verifying Extremely Large Numbers. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 411-416 - [d7]Wei Ren:
Collatz Automata and Compute Residue Class from Reduced Dynamics by Formula. IEEE DataPort, 2018 - [d6]Wei Ren:
Exploring the inverse mapping from a dynamics to a residue class - inputting a reduced dynamics or partial dynamics and outputting a residue class. IEEE DataPort, 2018 - [d5]Wei Ren:
Exploring the ratio between the count of x/2 and the count of (3*x+1)/2 in original dynamics for extremely large starting integers asymptotically. IEEE DataPort, 2018 - [d4]Wei Ren:
Verifying whether extremely large integer guarantees Collatz conjecture (can return to 1 finally). IEEE DataPort, 2018 - [d3]Wei Ren:
Exploring properties in reduced Collatz dynamics. IEEE DataPort, 2018 - [d2]Wei Ren:
Reduced Collatz Dynamics for Integers from 3 to 999999. IEEE DataPort, 2018 - [d1]Wei Ren, Xiaohan Hao:
Code to generate keys. IEEE DataPort, 2018 - 2017
- [j14]Wei Ren, Ran Liu, Min Lei, Kim-Kwang Raymond Choo:
SeGoAC: A tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput. Stand. Interfaces 54: 29-35 (2017) - [c16]Lingling Zeng, Wei Ren, Min Lei, Yu Yang:
DroidMark: A Lightweight Android Text and Space Watermark Scheme Based on Semantics of XML and DEX. EIDWT 2017: 756-766 - 2016
- [j13]Wei Ren, Jiahua Lin, Qiang Cao, Yi Ren:
LibTiP: a lightweight and robust scheme for data trustworthiness and privacy protection in participatory sensing. Int. J. Embed. Syst. 8(2/3): 266-275 (2016) - [j12]Wei Ren, Lingling Zeng, Ran Liu, Chi Cheng:
F2AC: A Lightweight, Fine-Grained, and Flexible Access Control Scheme for File Storage in Mobile Cloud Computing. Mob. Inf. Syst. 2016: 5232846:1-5232846:9 (2016) - [c15]Lingling Zeng, Min Lei, Wei Ren, Shiqi Deng:
Optimizing Machine Learning based Large Scale Android Malwares Detection by Feature Disposal. 3PGCIC 2016: 259-268 - 2015
- [c14]Wei Ren, Yi Ren, Mu-En Wu, Chia-Jung Lee:
A Robust and Flexible Access Control Scheme for Cloud-IoT Paradigm with Application to Remote Mobile Medical Monitoring. RVSP 2015: 130-133 - 2014
- [j11]Wei Ren, Yuliang Liu:
A lightweight possession proof scheme for outsourced files in mobile cloud computing based on chameleon hash function. Int. J. Comput. Sci. Eng. 9(4): 339-346 (2014) - [j10]Wei Ren, Jiahua Lin, Qiang Cao, Liangli Ma:
LIFE: a lightweight and flexible key management scheme for securely and pervasively file editing in mobile cloud computing. Int. J. Internet Protoc. Technol. 8(2/3): 122-129 (2014) - 2013
- [j9]Wei Ren, Liangli Ma, Yi Ren:
Perturbation-Based Schemes with Ultra-Lightweight Computation to Protect User Privacy in Smart Grid. Int. J. Distributed Sens. Networks 9 (2013) - [j8]Wei Ren, Liangli Ma, Yi Ren:
APP: An Ultralightweight Scheme to Authenticate ONS and Protect EPC Privacy without Cryptography in EPCglobal Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j7]Wei Ren, Liangli Ma, Yi Ren:
LIRT: A Lightweight Scheme for Indistinguishability, Reachability, and Timeliness in Wireless Sensor Control Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j6]Wei Ren, Linchen Yu, Liangli Ma, Yi Ren:
How to Authenticate a Device? Formal Authentication Models for M2M Communications Defending against Ghost Compromising Attack. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [c13]Zebo Feng, Xiaoping Wu, Liangli Ma, Wei Ren:
uDisC: An Ultra-Lightweight and Distributed Scheme for Defending against Data Loss Attack in RFID Networks. ISICA 2012: 66-73 - 2011
- [j5]Wei Ren, Jun Song, Min Lei, Yi Ren:
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid. Int. J. Digit. Multim. Broadcast. 2011: 382147:1-382147:9 (2011) - [j4]Wei Ren:
QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things. Int. J. Netw. Manag. 21(4): 284-299 (2011) - 2010
- [j3]Wei Ren, Yi Ren, Hui Zhang:
Secure, dependable and publicly verifiable distributed data storage in unattended wireless sensor networks. Sci. China Inf. Sci. 53(5): 964-979 (2010)
2000 – 2009
- 2009
- [j2]Wei Ren, Junge Zhao, Yi Ren:
Network Coding based Dependable and Efficient Data Survival in Unattended Wireless Sensor Networks. J. Commun. 4(11): 894-901 (2009) - [c12]Wei Ren, Yi Ren, Hui Zhang:
H2S: A Secure and Efficient Data Aggregative Retrieval Scheme in Unattended Wireless Sensor Networks. IAS 2009: 450-453 - [c11]Wei Ren, Yi Ren, Hui Zhang:
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks. ISPA 2009: 340-347 - 2008
- [c10]Wei Ren, Yi Ren, Hui Zhang:
HybridS: A Scheme for Secure Distributed Data Storage in WSNs. EUC (2) 2008: 318-323 - [c9]Wei Ren, Kui Ren, Wenjing Lou:
Optimized User Revocation for Group Signature Based Privacy-Aware PKI. ICDCS Workshops 2008: 388-393 - [c8]Wei Ren, Kui Ren, Wenjing Lou, Yanchao Zhang:
Efficient user revocation for privacy-aware PKI. QSHINE 2008: 11 - 2007
- [c7]Yoohwan Kim, Wei Ren, Ju-Yeon Jo, Yingtao Jiang, Jun Zheng:
SFRIC: A Secure Fast Roaming Scheme in Wireless LAN Using ID-Based Cryptography. ICC 2007: 1570-1575 - [c6]Wei Ren, Yoohwan Kim, Ju-Yeon Jo, Mei Yang, Yingtao Jiang:
IdSRF: ID-based Secure Routing Framework for Wireless Ad-Hoc Networks. ITNG 2007: 102-110 - 2006
- [j1]Wei Ren, Tenghong Liu, Hai Jin:
Congestion-Based RoQ DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. J. Comput. Res. Dev. 43(11): 1927-1932 (2006) - [c5]Wei Ren, Hai Jin:
A Combination Scheme to Improve TCP Throughput over Multihops Wireless Mobile Ad Hoc Networks. Edutainment 2006: 805-809 - 2005
- [c4]Wei Ren, Hai Jin:
Distributed Agent-Based Real Time Network Intrusion Forensics System Architecture Design . AINA 2005: 177-182 - [c3]Wei Ren, Hai Jin, Tenghong Liu:
Congestion Targeted Reduction of Quality of Service DDoS Attacking and Defense Scheme in Mobile Ad Hoc Networks. ISM 2005: 707-712 - [c2]Wei Ren, Hai Jin:
A Recursion Nearness Based Method for Characterizing IP Address. PDCAT 2005: 665-669 - [c1]Wei Ren, Hai Jin:
Honeynet based distributed adaptive network forensics and active real time investigation. SAC 2005: 302-303
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint