default search action
Wenjuan Tang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Xiehua Li, Wanting Lei, Wenjuan Tang, Yingzhu Wang, Xiaoju Yang, Xin Liao:
Segmented Hash-Based Privacy-Preserving Image Retrieval Scheme in Cloud-Assisted IoT. IEEE Internet Things J. 11(21): 35250-35265 (2024) - [j20]Wenjia Chen, Wenjuan Tang, Yan Meng, Yaoxue Zhang:
An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-Enabled Voice Interface. IEEE Internet Things J. 11(22): 36397-36409 (2024) - [j19]Yue Meng, Yiming Tang, Xiang Huang, Haoyu Wang, Jie Zhu, Wenjuan Tang, Lu Chen:
A Lightweight Insulator Detection Methodology for UAVs in Power Line Inspection. J. Circuits Syst. Comput. 33(4): 2450069:1-2450069:20 (2024) - [j18]Wenjuan Tang, Qun Dai, Fan Hao:
An Efficient Knowledge Distillation-Based Detection Method for Infrared Small Targets. Remote. Sens. 16(17): 3173 (2024) - [j17]Wenjuan Tang, Qun Dai, Fan Hao:
Differential Attention Orientated Cascade Network for Infrared Small Target Detection. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 17: 9253-9265 (2024) - [j16]Wenbin Huang, Wenjuan Tang, Hanyuan Chen, Hongbo Jiang, Yaoxue Zhang:
Unauthorized Microphone Access Restraint Based on User Behavior Perception in Mobile Devices. IEEE Trans. Mob. Comput. 23(1): 955-970 (2024) - [j15]Wenbin Huang, Wenjuan Tang, Hongbo Jiang, Yaoxue Zhang:
Recognizing Voice Spoofing Attacks via Acoustic Nonlinearity Dissection for Mobile Devices. IEEE Trans. Mob. Comput. 23(12): 12080-12096 (2024) - [c8]Peng Xi, Wenjuan Tang, Shaoliang Peng:
Fighting Fire with Fire: Medical AI Models Defend Against Backdoor Attacks via Self-learning. ISBRA (1) 2024: 347-358 - 2023
- [c7]Peng Xi, Wenjuan Tang, Kun Xie, Xuan Liu, Peng Zhao, Shaoliang Peng:
RobustHealthFL: Robust Strategy Against Malicious Clients in Non-iid Healthcare Federated Learning. BIBM 2023: 1545-1552 - 2022
- [j14]Wenbin Huang, Wenjuan Tang, Hongbo Jiang, Jun Luo, Yaoxue Zhang:
Stop Deceiving! An Effective Defense Scheme Against Voice Impersonation Attacks on Smart Devices. IEEE Internet Things J. 9(7): 5304-5314 (2022) - [j13]Jialu Hao, Cheng Huang, Wenjuan Tang, Yang Zhang, Shuai Yuan:
Smart Contract-Based Access Control Through Off-Chain Signature and On-Chain Evaluation. IEEE Trans. Circuits Syst. II Express Briefs 69(4): 2221-2225 (2022) - [j12]Jialu Hao, Wenjuan Tang, Cheng Huang, Jian Liu, Huimei Wang, Ming Xian:
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT. IEEE Trans. Emerg. Top. Comput. 10(2): 933-947 (2022) - [c6]Wenbin Huang, Wenjuan Tang, Kuan Zhang, Haojin Zhu, Yaoxue Zhang:
Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems. INFOCOM 2022: 31-40 - 2021
- [j11]Qiang Zhang, Guojun Wang, Wenjuan Tang, Karim Alinani, Qin Liu, Xin Li:
Efficient personalized search over encrypted data for mobile edge-assisted cloud storage. Comput. Commun. 176: 81-90 (2021) - [j10]Xiaoyu Zhu, Yueyi Luo, Anfeng Liu, Wenjuan Tang, Md. Zakirul Alam Bhuiyan:
A Deep Learning-Based Mobile Crowdsensing Scheme by Predicting Vehicle Mobility. IEEE Trans. Intell. Transp. Syst. 22(7): 4648-4659 (2021) - 2020
- [j9]Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, Xuemin (Sherman) Shen:
Privacy-preserving task recommendation with win-win incentives for mobile crowdsourcing. Inf. Sci. 527: 477-492 (2020) - [j8]Kun Tang, Wenjuan Tang, Entao Luo, Zhiyuan Tan, Weizhi Meng, Lianyong Qi:
Secure Information Transmissions in Wireless-Powered Cognitive Radio Networks for Internet of Medical Things. Secur. Commun. Networks 2020: 7542726:1-7542726:10 (2020)
2010 – 2019
- 2019
- [j7]Wenjuan Tang, Kuan Zhang, Deyu Zhang, Ju Ren, Yaoxue Zhang, Xuemin Sherman Shen:
Fog-Enabled Smart Health: Toward Cooperative and Secure Healthcare Service Provision. IEEE Commun. Mag. 57(5): 42-48 (2019) - [j6]Wenjuan Tang, Ju Ren, Kun Deng, Yaoxue Zhang:
Secure Data Aggregation of Lightweight E-Healthcare IoT Devices With Fair Incentives. IEEE Internet Things J. 6(5): 8714-8726 (2019) - [j5]Wenjuan Tang, Ju Ren, Kuan Zhang, Deyu Zhang, Yaoxue Zhang, Xuemin (Sherman) Shen:
Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme. ACM Trans. Intell. Syst. Technol. 10(6): 68:1-68:23 (2019) - [j4]Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, Xuemin Shen:
Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features. IEEE Trans. Mob. Comput. 18(4): 845-856 (2019) - [j3]Wenjuan Tang, Ju Ren, Yaoxue Zhang:
Enabling Trusted and Privacy-Preserving Healthcare Services in Social Media Health Networks. IEEE Trans. Multim. 21(3): 579-590 (2019) - [j2]Feng Lyu, Ju Ren, Peng Yang, Nan Cheng, Wenjuan Tang, Yaoxue Zhang, Xuemin Sherman Shen:
Fine-Grained TDMA MAC Design toward Ultra-Reliable Broadcast for Autonomous Driving. IEEE Wirel. Commun. 26(4): 46-53 (2019) - 2018
- [j1]Yuezhi Zhou, Wenjuan Tang, Di Zhang, Xiang Lan, Yaoxue Zhang:
A case for software-defined code scheduling based on transparent computing. Peer-to-Peer Netw. Appl. 11(4): 668-678 (2018) - [c5]Kaichuan Zhao, Yuezhi Zhou, Wenjuan Tang, Shuang Li, Yaoxue Zhang:
A Game Theoretic D2D Local Caching System under Heterogeneous Video Preferences and Social Reciprocity. ICA3PP (2) 2018: 417-431 - 2017
- [c4]Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, Xuemin Shen:
Lightweight and Privacy-Preserving Fog-Assisted Information Sharing Scheme for Health Big Data. GLOBECOM 2017: 1-6 - 2016
- [c3]Yue-Zhi Zhou, Wenjuan Tang, Di Zhang, Yaoxue Zhang:
Software-Defined Streaming-Based Code Scheduling for Transparent Computing. CBD 2016: 296-303 - 2015
- [c2]Binji Mo, Wenjuan Tang, Yang Xu, Guojun Wang:
Design and Implementation of Streaming Application Execution Platform in Android. IEEE WISA 2015: 318-323 - [c1]Wenjuan Tang, Yang Xu, Guojun Wang, Yaoxue Zhang:
An Illegal Indirect Access Prevention Method in Transparent Computing System. ICA3PP (Workshops and Symposiums) 2015: 264-275
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint