default search action
Changda Wang 0001
Person information
- affiliation: Jiangsu University, School of Computer Science and Communication Engineering, Zhenjiang, China
- affiliation: Carleton University, School of Computer Science, Ottawa, Canada
Other persons with the same name
- Changda Wang 0002 — Xi'an University of Technology, School of Printing Packaging and Digital Media, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j28]Xing Zhang, Min Yang, Jian Chen, Tianning Li, Changda Wang:
RAB: A lightweight block cipher algorithm with variable key length. Peer Peer Netw. Appl. 17(5): 2906-2920 (2024) - [j27]Xing Zhang, Chenyang Shao, Tianning Li, Ye Yuan, Changda Wang:
GFSPX: an efficient lightweight block cipher for resource-constrained IoT nodes. J. Supercomput. 80(17): 25256-25282 (2024) - [c20]Wenyue Sun, Qinbao Xu, Changda Wang:
Early DDoS Alerts Based on Optimal Sub-OD Pairs and Markov Model. APNet 2024: 173-174 - [c19]Luqi Fu, Qiang Sun, Changda Wang:
Link failure recovery through nested cycles. APNet 2024: 187-188 - [c18]Zhiping Zhang, Hongwei Fu, Changda Wang:
Joint Optimization for Fairness-Revenue Adjustable Network Slices Embedding. APNet 2024: 202-203 - 2023
- [j26]Yufan Feng, Changda Wang:
Network Anomaly Early Warning through Generalized Network Temperature and Deep Learning. J. Netw. Syst. Manag. 31(2): 38 (2023) - [j25]Xing Zhang, Jian Chen, Tianning Li, Gang Dai, Changda Wang:
LILP: A Lightweight Enciphering Algorithm to Encrypt Arbitrary-Length Messages. Symmetry 15(1): 177 (2023) - [j24]Edward Kwadwo Boahen, Brunel Elvire Bouya-Moko, Faizan Qamar, Changda Wang:
A Deep Learning Approach to Online Social Network Account Compromisation. IEEE Trans. Comput. Soc. Syst. 10(6): 3204-3216 (2023) - [c17]Xuemei Wang, Seung-Hyun Seo, Changda Wang:
The core nodes identification method through adjustable network topology information. APNet 2023: 187-189 - 2022
- [j23]Qinbao Xu, Changda Wang:
Stepwise Refinement Provenance Scheme for Wireless Sensor Networks. IEEE Internet Things J. 9(13): 11126-11140 (2022) - [j22]Qinbao Xu, Elisa Bertino, Changda Wang:
Compact Provenance Scheme Through Packet Path Index Differences in WSNs. IEEE Trans. Inf. Forensics Secur. 17: 3511-3524 (2022) - [j21]Changda Wang, Xiaowei Li, Elisa Bertino:
Network Temperature: A Novel Statistical Index for Networks Measurement and Management. ACM Trans. Internet Techn. 22(3): 66:1-66:20 (2022) - [j20]Yufeng Ji, Xian Zhao, Yao Wei, Changda Wang:
Generating indoor Wi-Fi fingerprint map based on crowdsourcing. Wirel. Networks 28(3): 1053-1065 (2022) - [c16]Xiang Wang, Xing Zhang, Changda Wang:
Generalized Network Temperature for DDoS Detection through Rényi Entropy. QRS Companion 2022: 24-33 - 2021
- [j19]Selasi Kwame Ocansey, Changda Wang:
Searchable Encryption for Integrating Cloud and Sensor Networks with Secure Updates. Ad Hoc Sens. Wirel. Networks 50(1-4): 1-26 (2021) - [j18]Edward Kwadwo Boahen, Brunel Elvire Bouya-Moko, Changda Wang:
Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC. Comput. Secur. 104: 102225 (2021) - [j17]Muhammad Khurram Khan, Muhammad Shiraz, Qaisar Shaheen, Shariq Aziz Butt, Rizwan Akhtar, Muazzam Ali Khan Khattak, Wang Changda:
Hierarchical Routing Protocols for Wireless Sensor Networks: Functional and Performance Analysis. J. Sensors 2021: 7459368:1-7459368:18 (2021) - [j16]Hassan Mahmood, Danish Mahmood, Qaisar Shaheen, Rizwan Akhtar, Wang Changda:
S-DPS: An SDN-Based DDoS Protection System for Smart Grids. Secur. Commun. Networks 2021: 6629098:1-6629098:19 (2021) - [j15]Muhammad Fahad Mukhtar, Muhammad Shiraz, Qaisar Shaheen, Kamran Ahsan, Rizwan Akhtar, Chang-da Wang:
RBM: Region-Based Mobile Routing Protocol for Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2021: 6628226:1-6628226:11 (2021) - [c15]Xian Zhao, Changda Wang:
Wi-Fi Based Indoor Location With Multi-parameter AP Selection and Device Heterogeneity Weakening. MASS 2021: 566-567 - [c14]Xiaowei Li, Changda Wang, An Tang:
Entropy Change Rate for Traffic Anomaly Detection. MASS 2021: 570-571 - [c13]Qian Chen, Xian Zhao, Wenyue Sun, Changda Wang:
A Node Importance Ranking Method Based on the Rate of Network Entropy Changes. MSN 2021: 32-39 - [c12]Wenyue Sun, Changda Wang:
An Improved Mean Shift Clustering Algorithm for LFA Detection. QRS Companion 2021: 926-934 - [c11]Qian Chen, Changda Wang:
Traffic Matrix Estimation Based on Incomplete Network Link Loads Measurement. QRS Companion 2021: 1021-1026 - 2020
- [j14]Edward Kwadwo Boahen, Wang Changda, Bouya-Moko Brunel Elvire:
Detection of Compromised Online Social Network Account with an Enhanced Knn. Appl. Artif. Intell. 34(11): 777-791 (2020) - [j13]Aeyoung Kim, Changda Wang, Seung-Hyun Seo:
PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation. KSII Trans. Internet Inf. Syst. 14(7): 2919-2937 (2020) - [j12]Qinbao Xu, Li Liu, Rizwan Akhtar, Muhammad Asif Zahoor Raja, Changda Wang:
Provenance Transmission through a Two-Dimensional Covert Timing Channel in WSNs. Mob. Inf. Syst. 2020: 8818374:1-8818374:9 (2020)
2010 – 2019
- 2019
- [c10]Qinbao Xu, Xing Zhang, Changda Wang:
Provenance Compression Using Packet-Path-Index Differences in Wireless Sensor Networks. MSN 2019: 200-205 - [c9]Xing Zhang, Qinbao Xu, Xiao Wei Li, Changda Wang:
A Lightweight Hash Function Based on Cellular Automata for Mobile Network. MSN 2019: 247-252 - [c8]Selasi Kwame Ocansey, Changda Wang:
Search Over Encrypted Cloud Data With Secure Updates. QRS Companion 2019: 380-386 - 2018
- [j11]Xing Zhang, Seung-Hyun Seo, Changda Wang:
A Lightweight Encryption Method for Privacy Protection in Surveillance Videos. IEEE Access 6: 18074-18087 (2018) - [j10]Tiao Chen, Xuehua Song, Changda Wang:
Preserving-Texture Generative Adversarial Networks for Fast Multi-Weighted MRI. IEEE Access 6: 71048-71059 (2018) - [j9]Selasi Kwame Ocansey, Wolali Ametepe, Xiao Wei Li, Changda Wang:
Dynamic searchable encryption with privacy protection for cloud computing. Int. J. Commun. Syst. 31(1) (2018) - [j8]Saeed Ur Rehman, Rizwan Akhtar, Zuhaib Ashfaq Khan, Changda Wang:
Architecture for Collision-Free Communication Using Relaxation Technique. Wirel. Commun. Mob. Comput. 2018: 2839797:1-2839797:8 (2018) - [j7]Qinbao Xu, Rizwan Akhtar, Xing Zhang, Changda Wang:
Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 9576978:1-9576978:15 (2018) - [c7]Yu Zeng, Xing Zhang, Rizwan Akhtar, Changda Wang:
A Blockchain-Based Scheme for Secure Data Provenance in Wireless Sensor Networks. MSN 2018: 13-18 - 2017
- [j6]Changda Wang, Elisa Bertino:
Sensor Network Provenance Compression Using Dynamic Bayesian Networks. ACM Trans. Sens. Networks 13(1): 5:1-5:32 (2017) - 2016
- [j5]Changda Wang, Wen-yi Zheng, Elisa Bertino:
Provenance for Wireless Sensor Networks: A Survey. Data Sci. Eng. 1(3): 189-200 (2016) - [j4]Changda Wang, Yulin Yuan, Lei Huang:
Base communication model of IP covert timing channels. Frontiers Comput. Sci. 10(6): 1130-1141 (2016) - [j3]Changda Wang, Syed Rafiul Hussain, Elisa Bertino:
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 27(2): 405-418 (2016) - [c6]Hua Jin, Changda Wang:
Robustness of the Packet Delay Channels. Trustcom/BigDataSE/ISPA 2016: 260-267 - 2014
- [c5]Syed Rafiul Hussain, Changda Wang, Salmin Sultana, Elisa Bertino:
Secure data provenance compression using arithmetic coding in wireless sensor networks. IPCCC 2014: 1-10 - 2013
- [j2]Changda Wang, Tingting Gong, Patricia Ghann:
Personalized E-mail Filtering System Based on Usage Control. J. Softw. 8(4): 860-867 (2013) - 2010
- [j1]Changda Wang, Shiguang Ju:
A Novel Method to Implement Book Cipher. J. Comput. 5(11): 1621-1628 (2010) - [c4]Xiangmei Song, Shiguang Ju, Changda Wang, Conghua Zhou:
Information Flow Graph: An Approach to Identifying Covert Storage Channels. INTRUST 2010: 87-97
2000 – 2009
- 2005
- [c3]Changda Wang, Shiguang Ju:
The Dilemma of Covert Channels Searching. ICISC 2005: 169-174 - 2004
- [i1]Changda Wang, Xianyi Chen, Xibin Zhao, Shiguang Ju:
Design and Implementation of a General Decision-making Model in RoboCup Simulation. CoRR cs.RO/0411023 (2004) - 2003
- [c2]Chang-da Wang, Shiguang Ju, Dianchun Guo, Zhen Yang, Wen-yi Zheng:
Research on the Methods of Search and Elimination in Covert Channels. GCC (1) 2003: 988-991 - [c1]Shiguang Ju, Zhen Yang, Chang-da Wang, Dianchun Guo:
The Analysis of Authorization Mechanisms in the Grid. GCC (1) 2003: 1047-1050
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint