default search action
Na Wang 0003
Person information
- affiliation: Xiamen University, School of Mathematical Science, China
Other persons with the same name
- Na Wang — disambiguation page
- Na Wang 0001 — Shenzhen University, College of Information Engineering, China
- Na Wang 0002 — National University of Defense Technology, College of Electronics Science and Engineering, Changsha, China
- Na Wang 0004 — North University of China, Shanxi Provincial Key Laboratory for Biomedical Imaging and Big Data, Taiyuan, China
- Na Wang 0005 — Qingdao University, College of Automation and Electrical Engineering, China
- Na Wang 0006 — National University of Defense Technology, College of Information and Communication, Xi'an, China (and 1 more)
- Na Wang 0007 — Shanghai Polytechnic University, Department of Computer and Information Engineering, China
- Na Wang 0008 — Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Ziyu Zhou, Na Wang, Jianwei Liu, Junsong Fu, Lunzhi Deng:
The blockchain-based privacy-preserving searchable attribute-based encryption scheme for federated learning model in IoMT. Concurr. Comput. Pract. Exp. 36(24) (2024) - [j30]Lunzhi Deng, Jian Wen, Yan Gao, Na Wang, Huawei Huang, Siwei Li:
Certificateless Aggregate Signature Scheme With Security Proofs in the Standard Model Suitable for Internet of Vehicles. IEEE Internet Things J. 11(17): 28765-28773 (2024) - [j29]Junsong Fu, Shuai Xiong, Na Wang, Ruiping Ren, Ang Zhou, Bharat K. Bhargava:
A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory. IEEE Trans. Dependable Secur. Comput. 21(4): 2779-2798 (2024) - [j28]Na Wang, Wen Zhou, Jingjing Wang, Yifan Guo, Junsong Fu, Jianwei Liu:
Secure and Efficient Similarity Retrieval in Cloud Computing Based on Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 19: 2454-2469 (2024) - [j27]Na Wang, Ziyu Zhou, Jianwei Liu, Lunzhi Deng, Junsong Fu:
Secure and Distributed IoV Data Sharing Scheme Based on a Hybrid PoS Blockchain Protocol. IEEE Trans. Veh. Technol. 73(8): 11995-12009 (2024) - [j26]Ziyu Zhou, Na Wang, Jianwei Liu, Wen Zhou, Junsong Fu, Lunzhi Deng:
Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain. Veh. Commun. 49: 100832 (2024) - [c2]Zheng Zhang, Na Wang, Ziqi Zhang, Yao Zhang, Tianyi Zhang, Jianwei Liu, Ye Wu:
GroupCover: A Secure, Efficient and Scalable Inference Framework for On-device Model Protection based on TEEs. ICML 2024 - 2023
- [j25]Na Wang, Qingyun Han, Junsong Fu, Jianwei Liu:
Multiuser Personalized Ciphertext Retrieval Scheme Based on Deep Learning. IEEE Internet Things J. 10(24): 22791-22805 (2023) - [j24]Na Wang, Shancheng Zhang, Zheng Zhang, Jiawen Qiao, Junsong Fu, Jianwei Liu, Bharat K. Bhargava:
Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 18: 4652-4667 (2023) - [j23]Na Wang, Shancheng Zhang, Zheng Zhang, Junsong Fu, Jianwei Liu, Ruijin Wang:
Block-Based Privacy-Preserving Healthcare Data Ranked Retrieval in Encrypted Cloud File Systems. IEEE J. Biomed. Health Informatics 27(2): 732-743 (2023) - [j22]Na Wang, Junsong Fu, Shancheng Zhang, Zheng Zhang, Jiawen Qiao, Jianwei Liu, Bharat K. Bhargava:
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain. IEEE/ACM Trans. Netw. 31(4): 1550-1565 (2023) - 2022
- [j21]Kaifa Zheng, Na Wang, Jianwei Liu, Shancheng Zhang, Qingyun Han, Zheng Zhang, Ruijin Wang, Junsong Fu:
An efficient multikeyword fuzzy ciphertext retrieval scheme based on distributed transmission for Internet of Things. Int. J. Intell. Syst. 37(10): 7419-7443 (2022) - [j20]Junsong Fu, Na Wang, Leyao Nie, Baojiang Cui, Bharat K. Bhargava:
Defending Trace-Back Attack in 3D Wireless Internet of Things. IEEE/ACM Trans. Netw. 30(4): 1765-1779 (2022) - [j19]Junsong Fu, Na Wang, Baojiang Cui, Bharat K. Bhargava:
A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems. IEEE Trans. Parallel Distributed Syst. 33(5): 1246-1261 (2022) - [c1]Na Wang, Jian Jiao, Shangcheng Zhang, Jianwei Liu, Kaifa Zheng, Junsong Fu, Jiawen Qiao:
Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application. ML4CS (2) 2022: 584-608 - 2021
- [j18]Na Wang, Yuanyuan Cai, Junsong Fu, Jie Xu:
Privacy-Preserving Efficient Data Retrieval in IoMT Based on Low-Cost Fog Computing. Complex. 2021: 6211475:1-6211475:13 (2021) - [j17]Jian Li, Hengji Li, Na Wang, Chaoyang Li, Yanyan Hou, Xiubo Chen, Yu-Guang Yang:
A Quantum Key Distribution Protocol Based on the EPR Pairs and its Simulation. Mob. Networks Appl. 26(2): 620-628 (2021) - [j16]Na Wang, Jian Li, Junsong Fu, Yan Zheng:
Privacy-Preserving Top-k Location-based Services Retrieval in Mobile Internet. Mob. Networks Appl. 26(4): 1430-1439 (2021) - 2020
- [j15]Na Wang, Yuanyuan Cai, Junsong Fu, Xiqi Chen:
Information Privacy Protection Based on Verifiable (t, n)-Threshold Multi-Secret Sharing Scheme. IEEE Access 8: 20799-20804 (2020) - [j14]Yanyan Hou, Jian Li, Xiubo Chen, Hengji Li, Chaoyang Li, Yuan Tian, Leilei Li, Zhengwen Cao, Na Wang:
Quantum algorithm for Help-Training semi-supervised support vector machine. Quantum Inf. Process. 19(9): 278 (2020) - [j13]Jian Li, Leilei Li, Hengji Li, Na Wang, Xiubo Chen, Yuguang Yang:
Simulation algorithm on the quantum BB84 protocol based on Monte Carlo method in classical computer environment. Quantum Inf. Process. 19(9): 335 (2020) - [j12]Junsong Fu, Na Wang, Yuanyuan Cai:
Privacy-Preserving in Healthcare Blockchain Systems Based on Lightweight Message Sharing. Sensors 20(7): 1898 (2020) - [j11]Na Wang, Junsong Fu, Jian Li, Bharat K. Bhargava:
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 15: 100-114 (2020)
2010 – 2019
- 2019
- [j10]Na Wang, Jian Li:
Shortest Path Routing With Risk Control for Compromised Wireless Sensor Networks. IEEE Access 7: 19303-19311 (2019) - [j9]Junsong Fu, Na Wang:
A Practical Attribute-Based Document Collection Hierarchical Encryption Scheme in Cloud Computing. IEEE Access 7: 36218-36232 (2019) - [j8]Jian Li, Zhengyan Zhou, Na Wang, Yuan Tian, Yu-Guang Yang, Yan Zheng:
Deterministic Quantum Secure Direct Communication Protocol Based on Hyper-Entangled State. IEEE Access 7: 43948-43955 (2019) - [j7]Dong Chen, Wei Lu, Weiwei Xing, Na Wang:
An Efficient Verifiable Threshold Multi-Secret Sharing Scheme With Different Stages. IEEE Access 7: 107104-107110 (2019) - [j6]Yan-Yan Hou, Jian Li, Hengji Li, Chao-Yang Li, Yuguang Yang, Na Wang, Zhengyan Zhou:
One Step Quantum Key Distribution Protocol Based on the Hyperentangled Bell State. IEEE Access 7: 120006-120013 (2019) - [j5]Dong Chen, Wei Lu, Weiwei Xing, Na Wang:
An Untraceable Data Sharing Scheme in Wireless Sensor Networks. Sensors 19(1): 114 (2019) - [j4]Junsong Fu, Baojiang Cui, Na Wang, Xinyao Liu:
A Distributed Position-Based Routing Algorithm in 3-D Wireless Industrial Internet of Things. IEEE Trans. Ind. Informatics 15(10): 5664-5673 (2019) - 2018
- [j3]Na Wang, Junsong Fu, Jiwen Zeng, Bharat K. Bhargava:
Source-location privacy full protection in wireless sensor networks. Inf. Sci. 444: 105-121 (2018) - [j2]Na Wang, Junsong Fu, Bharat K. Bhargava, Jiwen Zeng:
Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing. IEEE Trans. Inf. Forensics Secur. 13(10): 2653-2667 (2018) - 2017
- [j1]Na Wang, Jiwen Zeng:
All-Direction Random Routing for Source-Location Privacy Protecting against Parasitic Sensor Networks. Sensors 17(3): 614 (2017)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:56 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint