Part I: International Conference Papers

  • [11] Qin Liu, Jiamin Yang, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng and Guojun Wang, When Deep Learning Meets Steganography: Protecting Inference Privacy in the Dark, Proceedings of the 41st Annual IEEE International Conference on Computer Communications (IEEE INFOCOM 2022), Virtual, 10 pages, 2022-5-2至2022-5-5. [CCF A类]. Download via DOI.


  • [10] Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer and Guojun Wang, KShot: Live Kernel Patching with SMM and SGX, Proceedings of the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020), 13 pages, Valencia, Spain, 2020-2-20至2020-2-23. [CCF B类]. Download via DOI.


  • [9] Xueqi Li, Wenjun Jiang, Jie Wu and Guojun Wang, Directional and Explainable Serendipity Recommendation, Proceedings of The Web Conference 2020 (ACM WWW 2020), pp. 122-132, Taipei, Taiwan, 2020-2-20至2020-2-24. [CCF A类]. Download via DOI.


  • [8] Muhammad Arif, Guojun Wang, Valentina Emilia Balas and ShuhongChen, Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference System , Proceedings of the 7th International Conference on Smart City and Informatization (iSCI 2019), pp. 49-59, Guangzhou, China, 2019-11-15至2019-11-18.[Best Paper Award]. Download via DOI.


  • [7] Xueqi Li, Wenjun Jiang, Weiguang Chen, Jie Wu and Guojun Wang, HAES: A New Hybrid Approach for Movie Recommendation Based on Elastic Serendipity, Proceedings of the 28th ACM International Conference on Information and Knowledge Management (CIKM 2019), pp. 1503-1512, Beijing China, 2019-11-3至2019-11-7. [CCF B类]. Download via DOI.


  • [6] Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang and Guojun Wang, Nighthawk: Transparent System Introspection from Ring -3, Proceedings of the 24th edition of the European Symposium on Research in Computer Security (ESORICS 2019), pp. 217-238, Luxembourg, 2019-9-15至2019-9-18. [CCF B类]. Download via DOI.


  • [5] Yang Xu, Quanrun Zeng, Guojun Wang, Hao Min, Ju Ren and Yaoxue Zhang, A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing, Proceedings of the 4th IEEE International Conference on Internet of People (IoP 2018), pp. 1982-1987, Guangzhou, China, 2018-10-07至2018-10-11. [Best Paper Award]. Download via DOI.


  • [4] Saqib Ali, Guojun Wang, MZA Bhuiyan and Hai Jiang, Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts, Proceedings of the IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), pp. 991-998, Guangzhou,China, 2018-10-07至2018-10-11.[CCF C类]. Download via DOI.


  • [3] Hafiz ur Rahman, Guojun Wang, Jianer Chen and Hai Jiang, Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance, Proceedings of the 15th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2018), pp. 772-779, Guangzhou, China, 2018-10-7至2018-10-11. [CCF C类, Best Paper Award]. Download via DOI.


  • [2] Saqib Ali, Guojun Wang, Bebo White and Roger Leslie Cottrell. A blockchain-based decentralized data storage and access framework for pinger[EI]. Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE). pp.1303-1308,New York, USA, 2018-7-31至2018-8-3. Download via DOI.


  • [1] Xiaoyu Zhu, Jie Wu, Wei Chang, Guojun Wang and Qin Liu, Authentication of Multi-Dimensional Top-K Query on Untrusted Server, Proceedings of the 2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS), 6 pages, Banff, Canada, 2018-6-4至2018-6-6. [CCF B类].Download via DOI.

  • Part II: International Journal Papers

  • [74] Tao Peng, Wentao Zhong, Guojun Wang, Entao Luo, Shui Yu, Yining Liu, Yi Yang, Xuyun Zhang. Privacy-preserving Truth Discovery Based on Secure Multi-party Computation in Vehicle-based Mobile Crowdsensing. IEEE Transactions on Intelligent Transportation Systems, 2024. [中科院/JCR 1区, CCF B类]. Download via DOI.


  • [73] Tao Peng, Wei You, Kejian Guan, Entao Luo, Shaobo Zhang, Guojun Wang, Tian Wang, Youke Wu. Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing. Journal of Network and Computer Applications, 2024. [JCR 1区] Download via DOI.


  • [72] Haroon Elahi, Guojun Wang. Forward-porting and its limitations in fuzzer evaluation. Information Sciences, 662:120142, 2024. [CCF B类]. Download via DOI.


  • [71] Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu and Guangxin Zhai, Detecting Abnormal Behaviors in Smart Contracts Using Opcode Sequences, Accepted to appear in Computer Communications, 2024. [JCR Q1]. Download via DOI.


  • [70] Zhenshen Ou, Xiaofei Xing, Siqi He, Guojun Wang, TDS-NA: Blockchain-based Trusted Data Sharing Scheme with Notarial Authentication, Accepted to appear in Computer Communications, 2024. [JCR Q1]. Download via DOI.


  • [69] Tao Peng, Wentao Zhong, Guojun Wang, Shaobo Zhang, Entao Luo, Tian Wang. Spatiotemporal-aware Privacy-preserving Task Matching in Mobile Crowdsensing. IEEE Internet of Things Journal, 11(2):2394-2406, 2024. [JCR 1区]Download via DOI.


  • [68] Peiqiang Li, Guojun Wang, Xiaofei Xing, Xiangbin Li, Jinyao Zhu. Detecting unknown vulnerabilities in smart contracts using opcode sequences, Connection Science, 36(1):2313853, 2024. [JCR Q1]. Download via DOI.


  • [67] Qin Liu, Yu Peng, Mingzuo Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, and Guojun Wang, MPV: Enabling Fine-Grained Query Authentication in Hybrid-Storage Blockchain, Accepted to appear in IEEE Transactions on Knowledge and Data Engineering, 2023. [CCF A类]. Download via DOI.


  • [66] Shaobo Zhang, Tao Guo, Qin Liu, Entao Luo, Kim-Kwang Raymond Choo and Guojun Wang. ALPS: Achieving Accuracy-aware Location Privacy Service via Assisted Regions. Future Generation Computer Systems, 145:189-199, 2023. [中科院2区]. Download via DOI.


  • [65] Qin Liu, Yu Peng, Qian Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang, and Shaobo Zhang, MARS: Enabling verifiable range-aggregate queries in multi-source environments, Accepted to appear in IEEE Transactions on Dependable and Secure Computing, 2023. [CCF A类]. Download via DOI.


  • [64] Qin Liu, Yu Peng, Qian Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, Guojun Wang, and Shaobo Zhang, MARS: Enabling verifiable range-aggregate queries in multi-source environments, Accepted to appear in IEEE Transactions on Dependable and Secure Computing, 2023. [CCF A类]. Download via DOI.


  • [63] Qin Liu, Yu Peng, Ziyi Tang, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, and Guojun Wang, veffChain: Enabling Freshness Authentication of Rich Queries over Blockchain Databases, Accepted to appear in IEEE Transactions on Knowledge and Data Engineering, 2023. [CCF A类]. Download via DOI.


  • [62] Shulan Wang, Qin Liu, Yang Xu, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, and Guojun Wang, Protecting Inference Privacy with Accuracy Improvement in Mobile-Cloud Deep Learning, Accepted to appear in IEEE Transactions on Mobile Computing, 2023. [CCF A类]. Download via DOI.


  • [61] Yipeng Zou, Tao Peng, Guojun Wang, Entao Luo, Jinbo Xiong. Blockchain-assisted Multi-Keyword Fuzzy Search Encryption for Secure Data Sharing[J],Journal of Systems Architecture,144:102984, 2023. [JCR 1区, CCF B类]. Download via DOI.


  • [60] Lei Zhou, Fengwei Zhang, Kevin Leach,Xuhua Ding, Zhenyu Ning, Guojun Wang, Jidong Xiao. Hardware-assisted Live Kernel Function Updating on Intel Platforms, Accepted to appear in IEEE Transactions on Dependable and Secure Computing, 2023. [CCF A类].Download via DOI.


  • [59] Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, and Guojun Wang, Authorized Keyword Search on Mobile Devices in Secure Data Outsourcing, Accepted to appear in IEEE Transactions on Mobile Computing, 2023. [CCF A类].Download via DOI.


  • [58] Feng Wang, Jinhua She, Guojun Wang, Yasuhiro Ohyama, and Min Wu, Dual-Task Network Embeddings for Influence Prediction in Social Internet of Things, IEEE Internet Things Journal, 10(8, April 15): 6586-6597, (2023). [中科院1区].Download via DOI.


  • [57] Yang Xu, Quanlin Li, Cheng Zhang, Yunlin Tan, Ping Zhang, Guojun Wang, Yaoxue Zhang, A decentralized trust management mechanism for crowdfunding, Information Sciences. 638: 118969, 2023. [CCF B类,中科院1区]. Download via DOI.


  • [56] Shaobo Zhang, Yuechao Wang, Entao Luo, Qin Liu, Ke Gu, and Guojun Wang, A traceable and revocable decentralized multi-authority privacy protection scheme for social metaverse, Journal of Systems Architecture, 140: 1-12, 2023. [CCF B类]. Download via DOI.


  • [55] Yinglong Dai, Zheng Yan, Jiangchang Cheng, Xiaojun Duan, and Guojun Wang, “Analysis of Multimodal Data Fusion from an Information Theory Perspective,”Information Sciences (INS), 623: 164-183, 2023. [CCF B类]. Download via DOI.


  • [54] Saqib Ali, Guojun Wang, Shazia Riaz, Tayyaba Rafique. Preserving the privacy of dependent tuples using enhanced differential privacy. Human-centric Computing and Information Sciences, 12:43, 2022. [中科院1区]. Download via DOI.


  • [53] Haroon Elahi, Guojun Wang, Wenjun Jiang, Alexandre Bartel, and Yves LE TRAON, A Qualitative Study of App Acquisition and Management, Accepted to appear in IEEE Transactions on Computational Social Systems, 2023. Download via DOI.


  • [52] Muhammad Arif, Shermin Shamsudheen, F Ajesh, Guojun Wang, and Jianer Chen, AI Bot to Detect Fake COVID-19 Vaccine Certificate, IET Information Security, 16(5): 362-372, September 2022. Download via DOI.


  • [51] Qin Liu, Yu Peng, Hongbo Jiang, Jie Wu, Tian Wang, Tao Peng, and Guojun Wang, SlimBox: Lightweight Packet Inspection over Encrypted Traffic, Accepted to appear in IEEE Transactions on Dependable and Secure Computing, 2022. [CCF A类]. Download via DOI.


  • [50] Qin Liu, Yu Peng, Shuyu Pei, Jie Wu, Tao Peng, and Guojun Wang, Prime Inner Product Encoding for Effective Wildcard-based Multi-Keyword Fuzzy Search, IEEE Transactions on Services Computing, 15(4): 1799-1812, July-Aug. 2022. [CCF A类, ESI高被引论文(记录时间:2022年11月)]. Download via DOI.


  • [49] Qin Liu, Yue Tian, Jie Wu, Tao Peng, and Guojun Wang, Enabling Verifiable and Dynamic Ranked Search Over Outsourced Data, IEEE Transactions on Services Computing, 15(1): 69-82, 2022. [CCF A类, ESI高被引论文(记录时间:2022年5月)]. Download via DOI.


  • [48] Jingjing Wang, Wenjun Jiang, Kenli Li, Guojun Wang, and Keqin Li, Incremental Group-level Popularity Prediction in Online Social Networks, ACM Transactions on Internet Technology, 2022, 22(1): 1-26. [CCF B类]. Download via DOI.


  • [47] Qin Liu, Zhengzheng Hao, Yu Peng, Hongbo Jiang, Tao Peng, Jie Wu, Guojun Wang and Shaobo Zhang, SecVKQ: secure and verifiable kNN queries in sensor-cloud systems, Journal of Systems Architecture, 2021, 120(2021):1-14. [CCF B类]. Download via DOI.


  • [46] Feng Wang, Jinhua She, Yasuhiro Ohyama, Wenjun Jiang, Geyong Min, Guojun Wang and Min Wu, Maximizing Positive Influence in Competitive Social Networks: A Trust-based Solution, Information Sciences, 2021, 546:559-572. [CCF B类]. Download via DOI.


  • [45] Qin Liu, Yu Peng, Jie Wu, Tian Wang, and Guojun Wang, Secure Multi-Keyword Fuzzy Searches with Enhanced Service Quality in Cloud Computing, IEEE Transactions on Network and Service Management, 18(2): 2046-2062, June 2021. Download via DOI.


  • [44] Tian Wang, Pan Wang, Shaobin Cai, Xi Zheng, Ying Ma, Weijia Jia, and Guojun Wang, Mobile Edge-enabled Trust Evaluation for the Internet of Things, Information Fusion, April 28, 2021. Download via DOI.


  • [43] Y. Xu, C. Zhang, Q. Zeng, G Wang, J. Ren, and Y. Zhang, Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services, IEEE Transactions on Network Science and Engineering, vol. 8, no. 2, pp: 1201-1213, 2021 [中科院2区, ESI高被引论文(记录时间:2021年11月)]. Download via DOI.


  • [42] Y. Xu, C. Zhang, G. Wang, Z. Qin, and Q. Zeng, A Blockchain-enabled Deduplicatable Data Auditing Mechanism for Network Storage Services, IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 3, pp: 1421-1432, 2021. [中科院2区, ESI高被引论文(记录时间:2022年01月)]. Download via DOI.


  • [41] Mehdi Gheisari, Hamid Esmaeili Najafabadi, Jafar Ahmad Abed Alzubi, Jiechao Gao, Guojun Wang, Aaqif Afzaal Abbasi, and Aniello Castiglione, OBPP: An Ontology-based Framework for Privacy-Preserving in IoT-based Smart City, Future Generation Computer Systems, 123: 1-13 (2021). [ESI热点论文(记录时间: 2021年11月) ]. Download via DOI.


  • [40] Haroon Elahi, Guojun Wang, Yang Xu, Aniello Castiglione, Qiben Yan, Muhammad Naeem Shehzad, On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications,Computer Standards & Interfaces, 78, 103538, 2021.10. Download via DOI.


  • [39] Wenjun Jiang, Jing Chen, Xiaofei Ding, Jie Wu, Jiawei He and Guojun Wang, Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios, ACM Transactions on the Web, 2021, 15(3):1-33. [CCF B类]. Download via DOI.


  • [38] Peike Xia, Wenjun Jiang, Jie Wu, Surong Xiao and Guojun Wang, Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect Level, ACM Transactions on Knowledge Discovery from Data, 2021, 15(4):1-29. [CCF B类]. Download via DOI.


  • [37] Jifeng Zhang, Wenjun Jian, Jinrui Zhang, Jie Wu and Guojun Wang, Exploring Weather Data to Predict Activity Attendance in Event-based Social Network: From the Organizer’s View, ACM Transactions on the Web, 2021, 15(2):1-25. [CCF B类]. Download via DOI.


  • [36] Lei Zhou, Fengwei Zhang, Jidong Xiao, Kevin Leach, Westley Weimer, Xuhua Ding and Guojun Wang, A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Transactions on Dependable and Secure Computing. 2021, 18(4): 1920-1932. [CCF A类]. Download via DOI.


  • [35] Guangxue Zhang, Tian Wang, Guojun Wang, Anfeng Liu, Weijia Jia, Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Concurrency and Computation-Practice and Experience, 33(7):1-13, 2021. [ESI高被引论文(记录时间:2021年10月)]. Download via DOI.


  • [34] Tian Wang, Pan Wang, Shaobin Cai, Xi Zheng, Ying Ma, Weijia Jia, and Guojun Wang, Mobile Edge-enabled Trust Evaluation for the Internet of Things, Information Fusion, April 28, 2021. [中科院1区].Download via DOI.


  • [33] Lei Zhou, Entao Luo, Guojun Wang, and Shui Yu, Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks, Information Sciences, 554: 15-32 (2021). [CCF B类,中科院1区]Download via DOI.


  • [32] Muhammad Arif, Guojun Wang, Valentina Emilia Balas, Oana Geman, Aniello Castiglione, Jianer Chen, SDN based communications privacy-preserving architecture for VANETs using fog computing, Vehicular Communications, 26,100265, 2020.12. Download via DOI.


  • [31] Shaobo Zhang, Xinjun Mao, Kim-Kwang Raymond Choo, Tao Peng and Guojun Wang, A Trajectory Privacy-preserving Scheme Based on a Dual-K Mechanism for Continuous Location-based Services, Information Sciences, 2020, 527:406-419. [CCF B类, ESI高被引论文(记录时间:2020年11月) ]. Download via DOI.


  • [30] Chunli Huang, Wenjun Jiang, Jie Wu and Guojun Wang, Personalized Review Recommendation based on Users’ Aspect Sentiment, ACM Transactions on Internet Technology (TOIT), 2020, 20(4). [CCF B类]. Download via DOI.


  • [29] Tian Wang, Yaxin Mei, Weijia Jia, Xi Zheng, Guojun Wang, Mande Xie, Edge-based differential privacy computing for sensor-cloud systems. Journal of Parallel and Distributed Computing. 136: 75-85 (2020). [CCF B类]. Download via DOI.


  • [28] Tian Wang, MZA Bhuiyan, Guojun Wang, Lianyong Qi, Jie Wu, Thaier Hayajneh, Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things. IEEE Internet of Things Journal, 7(4): 2679-2689, 2020. [中科院1区]. Download via DOI.


  • [27] Muhammad Faizan Khan, Guojun Wang, Md. Zakirul Alam Bhuiyan, and Kun Yang, Toward Wi-Fi Halow Signal Coverage Modeling in Collapsed Structures. IEEE Internet of Things Journal, 7(3): 2181-2196, 2020. [中科院1区].Download via DOI.


  • [26] Muhammad Arif, Guojun Wang, Md Zakirul Alam Bhuiyan, Tian Wang and Jianer Chen, A Survey on Security Attacks in VANETs: Communication, Applications and Challenges , Vehicular Communications, 2019, 19: 100179. [2021 VehCom Best Survey Paper Award]. Download via DOI.


  • [25] Y. Xu, J. Ren, G. Wang, C. Zhang, J. Yang, and Y. Zhang, A Blockchain-based Nonrepudiation Network Computing Service Scheme for Industrial IoT, IEEE Transactions on Industrial Informatics, vol. 15, no. 6, pp: 3632-3641, 2019. [中科院1区TOP, ESI高被引论文(记录时间:2020年07月)]. Download via DOI.


  • [24] Yinglong Dai and Guojun Wang,“A Deep Inference Learning Framework for Healthcare,”Pattern Recognition Letters (PATREC), 139: 17-25, 2020. Download via DOI.


  • [23] Yinglong Dai, Guojun Wang, Jianhua Dai, and Oana GEMAN,“A Multimodal Deep Architecture for Traditional Chinese Medicine Diagnosis,”Concurrency and Computation: Practice and Experience (CPE), 32(19): e5781, 2020. Download via DOI.


  • [22] Haroon Elahi, Guojun Wang, Jianer Chen, Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones, Journal of Netwwork and Computer Applications, 157: 102578 (2020). [中科院1区]. Download via DOI.


  • [21] Tian Wang, Jiyaun Zhou, Anfeng Liu, MZA Bhuiyan, Guojun Wang, and Weijia Jia, Fog-based Computing and Storage Offloading for Data Synchronization in IoT, IEEE Internet of Things Journal, 2019, 6(3): 4272-4282. [ESI热点论文(记录时间:2019年9月)]. Download via DOI.


  • [20] Hai Tao, MZA Bhuiyan, Md. Arafatur Rahman, Guojun Wang, Tian Wang, Md. Manjur Ahmed, and Jing Li, Economic Perspective Analysis of Protecting Big Data Security and Privacy, Future Generation Computer Systems, 98: 660-671, 2019. [ESI高被引论文(记录时间:2019年12月)]. Download via DOI.


  • [19] Shaobo Zhang, Xiong Li, Zhiyuan Tan, Tao Peng, and Guojun Wang, A Caching and Spatial K-anonymity Driven Privacy Enhancement Scheme in Continuous Location-Based Services, Future Generation Computer Systems, 94: 40-50, 2019. [ESI高被引论文(记录时间: 2019年9月)]. Download via DOI.


  • [18] Sancheng Peng, Guojun Wang, Yongmei Zhou, Cong Wan, Cong Wang, Shui Yu and Jianwei Niu, An Immunization Framework for Social Networks through Big Data Based Influence Modeling, IEEE Transactions on Dependable and Secure Computing, 2019, 16(6):984-995. [CCF A类]. Download via DOI.


  • [17] Mehdi Gheisari, Guojun Wang, Wazir Zada Khan and Christian Fernández-Campusano, A Context-aware Privacy-preserving Method for IoT-based Smart City using Software Defined Networking, Computers & Security, 2019, 87:1-7. [CCF B类]. Download via DOI.


  • [16] Qiang Zhang, Guojun Wang and Qin Liu, Enabling Cooperative Privacy-preserving Personalized Search in Cloud Environments, Information Sciences, 2019, 480:1-13. [CCF B类]. Download via DOI.


  • [15] Qin Liu, Panlin Hou, Guojun Wang, Tao Peng anc Shaobo Zhang, Intelligent Route Planning on Large Road Networks with Efficiency and Privacy, Journal of Parallel and Distributed Computing, 2019, 133(2019):93-106. [CCF B类]. Download via DOI.


  • [14] Feng Wang, Wenjun Jiang, Guojun Wang, Song Guo, Influence maximization by leveraging the crowdsensing data in information diffusion network, Journal of Netwwork and Computer Applications, 136: 11-21 (2019). [中科院1区]. Download via DOI.


  • [13] Shaobo Zhang, Guojun Wang, MZA Bhuiyan, and Qin Liu, A Dual Privacy Preserving Scheme in Continuous Location-Based Services, IEEE Internet of Things Journal (IoTJ), 5(5): 4191-4200, 2018. Download via DOI.


  • [12] Shaobo Zhang, Kim-Kwang Raymond Choo, Qin Liu, and Guojun Wang, Enhancing Privacy through Uniform Grid and Caching in Location-based Services, Future Generation Computer Systems, 2018, 86: 881-892. [ESI高被引论文(记录时间: 2019年9月) ]. Download via DOI.


  • [11] Tian Wang, MZA Bhuiyan, Guojun Wang, Arafatur Rahman, Jie Wu, and Jiannong Cao, Big Data Reduction for Smart City's Critical Infrastructural Health Monitoring, IEEE Communications Magazine, 56(3): 128-133, 2018. [ESI高被引论文(记录时间:2019年4月)]. Download via DOI.

  • [10] Yinglong Dai, Guojun Wang, and Kuan-Ching Li,“Conceptual Alignment Deep Neural Networks,”Journal of Intelligent & Fuzzy Systems (JIFS), 34(3): 1631-1642, January 2018. Download via DOI.


  • [9] Qin Liu, Guojun Wang, Feng Li, Shuhui Yang and Jie Wu, Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks, IEEE Transactions on Parallel and Distributed Systems, 2017, 28(5):1417-1429. [CCF A类, JCR 1区]. Download via DOI.


  • [8] MZA Bhuiyan, Guojun Wang, Jie Wu, Jiannong Cao, Xuefeng Liu and Tian Wang, Dependable Structural Health Monitoring Using Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, 2017, 14(4):363-376. [CCF A类, ESI高被引论文(记录时间:2018年1月) ]. Download via DOI.


  • [7] MZA Bhuiyan, Jie Wu, Guojun Wang, Tian Wang and Mehedi Hassan, e-Sampling: Event-Sensitive Autonomous Adaptive Sensing and Low-cost Monitoring in Networked Sensing Systems, ACM Transactions on Autonomous and Adaptive Systems, 2017, 12(1):1-29. [CCF B类, ESI高被引论文 (记录时间:2019年1月) ]. Download via DOI.


  • [6] Tao Peng, Qin Liu, Dacheng Meng and Guojun Wang, Collaborative Trajectory Privacy Preserving Scheme in Location-Based Services Information Sciences, 2017, 387:165-179. [CCF B类, ESI 高被引论文(记录时间:2019年5月) ]. Download via DOI.


  • [5] Qin Liu, Yuhong Guo, Jie Wu and Guojun Wang, Effective Query Grouping Strategy in Clouds, Journal of Computer Science and Technology, 2017, 32(6):1231-1249. [ CCF B类]. Download via DOI.


  • [4] Pengfei Yin, Guojun Wang, and Wenjun Jiang, U-Search: Usage-based search with collective intelligence, International Journal of High Performance Computing and Networking, 10(4/5): 341-351, 2017 International Journal of High Performance Computing and Networking. Download via DOI.


  • [3] Wenjun Jiang, Guojun Wang, M. Alam Bhuiyan, and J. Wu, Understanding Graph-based Trust Evaluation in Online Social Networks: Methodologies and Challenges, ACM Computing Surveys (CSUR), 2016, 49(1): 1-35. Download via DOI.


  • [2] Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, and Huanyang Zheng, Trust Evaluation in Online Social Networks Using Generalized Network Flow, IEEE Transactions on Computers, 2016, 65(3): 952-963. [CCF A类]. Download via DOI.


  • [1] Wenjun Jiang, J. Wu, G. Wang, and H. Zheng, Forming Opinions via Trusted Friends: Time-evolving Rating Prediction Using Fluid Dynamics, IEEE Transactions on Computers, 2016, 65(4): 1211-1224. [CCF A类]. Download via DOI.


  • Part III: Chinese Journal Papers

  • [13] 孙兵,刘艳,王田,彭绍亮,王国军,贾维嘉,移动边缘网络中联邦学习效率优化研究综述, 计算机研究与发展,2022,59(07): 1439-1469. [CCF推荐中文科技期刊A类]


  • [12] 彭滔,钟文韬,王国军,罗恩韬,熊金波,刘忆宁,移动社交网络中支持精确查询的细粒度好友匹配隐私保护方案, 通信学报 (录用,录用日期: 2022.10.18). [CCF推荐中文科技期刊B类]


  • [11] 刘艳,王田,彭绍亮,王国军,贾维嘉,基于边缘的联邦学习模型清洗和设备聚类方法, 计算机学报,2021,44(12): 2515-2528. [CCF推荐中文科技期刊A类]


  • [10] 苏命峰,王国军,李仁发,边云协同计算中基于预测的资源部署与任务调度优化, 计算机研究与发展,2021,58(11):2558-2570. [CCF推荐中文科技期刊A类]


  • [9] 罗恩韬,王国军,刘琴,孟大程,唐雅媛,移动社交网络中矩阵混淆加密交友隐私保护策略, 软件学报,2019,30(12): 3798-3814. [ CCF推荐中文科技期刊A类]


  • [8] 张少波,王国军,刘琴,刘建勋,基于多匿名器的轨迹隐私保护方法, 计算机研究与发展,2019,56(3):576-584. [CCF推荐中文科技期刊A类]


  • [7] 苏命峰,王国军,李仁发,基于利益相关视角的多维QoS云资源调度方法, 通信学报,2019,40(6):102-115. [CCF推荐中文科技期刊B类]


  • [6] 张强,王国军,张少波,基于多边缘服务器的个性化搜索隐私保护方法, 通信学报,2019,40(2):40-49. [CCF推荐中文科技期刊B类]


  • [5] 刘志敏,贾维嘉,王国军,视觉传感器网络边界部署 k-覆盖数量估计, 计算机学报,2018, 68:1-14. [CCF推荐中文科技期刊A类]


  • [4] 罗恩韬,王国军,刘琴,孟大程,移动社交网络中细粒度朋友发现隐私保护机制, 软件学报, 2018,29(10):3223-3238. [CCF推荐中文科技期刊A类]


  • [3] 周志彬,王国军,刘琴,贾维嘉,一种采用双层校验的RFID离线匿名群证明协议, 计算机研究与发展,2018,55(12):2675-2684. [CCF推荐中文科技期刊A类]


  • [2] 张少波,刘琴,王国军,基于位置混淆的轨迹隐私保护方法, 通信学报,2018,39(7):81-91. [CCF推荐中文科技期刊B类]


  • [1] 罗恩韬,王国军,陈淑红,Pinial Khan-butt,移动社交网络中跨域代理重加密朋友发现隐私保护方案研究, 通信学报, 2017,38(10):81-93. [CCF推荐中文科技期刊B类]


  • [14] 刘志敏,贾维嘉,王国军,有向传感器网络覆盖预测模型与数量估计, 软件学报,2016,27(12):3120-3130. [CCF推荐中文科技期刊A类]


  •  
     

    Copyright © Institute of Computer Networks, GU

    (Updated on January 18, 2018)