Follow
Anxi Wang
Title
Cited by
Cited by
Year
An efficient centroid-based routing protocol for energy management in WSN-assisted IoT
J Shen, A Wang, C Wang, PCK Hung, CF Lai
Ieee Access 5, 18469-18479, 2017
2402017
Organized topology based routing protocol in incompletely predictable ad-hoc networks
J Shen, C Wang, A Wang, X Sun, S Moh, PCK Hung
Computer Communications 99, 107-118, 2017
312017
Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing
J Shen, H Yang, A Wang, T Zhou, C Wang
Peer-to-Peer Networking and Applications 12, 924-933, 2019
252019
Secure big data communication for energy efficient intra-cluster in WSNs
A Wang, J Shen, P Vijayakumar, Y Zhu, L Tian
Information Sciences 505, 586-599, 2019
232019
Efficient data integrity auditing with corrupted data recovery for edge computing in enterprise multimedia security
D Liu, J Shen, P Vijayakumar, A Wang, T Zhou
Multimedia Tools and Applications 79, 10851-10870, 2020
222020
A searchable and verifiable data protection scheme for scholarly big data
J Shen, C Wang, A Wang, S Ji, Y Zhang
IEEE Transactions on Emerging Topics in Computing 9 (1), 216-225, 2018
222018
Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks
D Liu, J Shen, A Wang, C Wang
International Journal of Sensor Networks 27 (2), 95-102, 2018
202018
Direction density-based secure routing protocol for healthcare data in incompletely predictable networks
J Shen, C Wang, CF Lai, A Wang, HC Chao
IEEE Access 4, 9163-9173, 2016
182016
Random-forest based adjusting method for wind forecast of WRF model
A Wang, L Xu, Y Li, J Xing, X Chen, K Liu, Y Liang, Z Zhou
Computers & Geosciences 155, 104842, 2021
172021
Secure real-time image protection scheme with near-duplicate detection in cloud computing
D Liu, J Shen, A Wang, C Wang
Journal of Real-Time Image Processing 17 (1), 175-184, 2020
172020
Identity-based fast authentication scheme for smart mobile devices in body area networks
C Wang, W Zheng, S Ji, Q Liu, A Wang
Wireless Communications and Mobile Computing 2018, 2018
172018
Content-centric group user authentication for secure social networks
J Shen, A Wang, C Wang, J Li, Y Zhang
IEEE Transactions on Emerging Topics in Computing 8 (3), 833-844, 2017
142017
Performance comparison of typical and improved LEACH protocols in wireless sensor network
J Shen, A Wang, C Wang, Y Ren, J Wang
2015 first international conference on computational intelligence theory …, 2015
142015
Moving centroid based routing protocol for incompletely predictable cyber devices in cyber-physical-social distributed systems
J Shen, C Wang, A Wang, Q Liu, Y Xiang
Future Generation Computer Systems 108, 1129-1139, 2020
122020
Anonymous data collection scheme for cloud-aided mobile edge networks
A Wang, J Shen, C Wang, H Yang, D Liu
Digital Communications and Networks 6 (2), 223-228, 2020
122020
Privacy-preserving data outsourcing with integrity auditing for lightweight devices in cloud computing
D Liu, J Shen, Y Chen, C Wang, T Zhou, A Wang
Information Security and Cryptology: 14th International Conference, Inscrypt …, 2019
92019
A RFID based localization algorithm applying trilateration for wireless sensor networks
J Shen, A Wang, C Wang, NN Xiong
Journal of Internet Technology 18 (5), 1167-1175, 2017
72017
A novel clustering solution for wireless sensor networks
A Wang, S Pan, C Wang, J Shen, D Liu
Green, Pervasive, and Cloud Computing: 12th International Conference, GPC …, 2017
52017
A RFID based localization algorithm for wireless sensor networks
J Shen, A Wang, C Wang, Y Ren, X Sun
Cloud Computing and Security: Second International Conference, ICCCS 2016 …, 2016
52016
A privacy-protecting and resource-saving scheme for data sharing in smart home
H Yang, W Zheng, T Zhou, X Jin, A Wang
Journal of Internet Technology 20 (2), 607-615, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20