X. Li, M. Wang, Y. Guo and W. Ding, "AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning", IEEE TrustCom 2024.
M. Wang, Y. Liu and W. Ding, "SP2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication", IEEE TrustCom 2024.
M. Wang, D. Zhao, Z. Yan, H, Wang and T. Li, “XAuth: Secure and Privacy-preserving Cross-domain Handover Authentication for 5G HetNets,” IEEE Internet of Things Journal,vol. 10, no. 7, pp. 5962-5976, 1 April.2023.
L. Wang, W. Ding, Z. Yan, S. Qiu, M. Wang and Z. Wan, "EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2023.3342314.
J. Zhang, Z. Yan, S. Fei, M. Wang, T. Li and H. Wang, "Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?," IEEE Network, vol. 36, no. 1, pp. 105-112, January/February 2022.
D. Wang, B. Song, Y, Liu and M. Wang, “Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems,” Digital Communications and Networks,vol 8, no 5, pp 625-635, 2022.
D. Zhao, Z. Yan, M. Wang, P. Zhang and B. Song, "Is 5G Handover Secure and Private? A Survey," IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12855-12879, 15 Aug.15, 2021.
J. Y. Muhammad, M. Wang, Z. Yan and F. Khan, "Trusted Network Slicing Among Multiple Mobile Network Operators," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1135-1140.
M. Wang, Z. Yan, B. Song and M. Atiquzzaman, "AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications," 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2019, pp. 1356-1362.
M. Wang and Z. Yan, "Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, 2018.8, 14(8): 3637-3647. (SCI: WOS:000441446300035, IF: 7.377, 中科院一区)
M. Wang, Z. Yan and V. Niemi, "UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, vol. 22, no.3, pp. 510-525, Jun. 2017. (SCI: WOS:000403326500016, IF: 3.259, 中科院三区)
M. Wang and Z. Yan. "A Survey on Security in D2D Communications", Mobile Networks and Applications, vol. 22, no. 2, pp. 195-208, Apr. 2017. (SCI: WOS:000399021400006, IF: 3.259, 中科院三区)
M. Wang and Z. Yan, "Security Design for D2D", Wiley 5G Ref: The Essential 5G Reference Online, DOI:10.1002/9781119471509.w5GRef188, 2019.12. (书章)
Z. Yan and M. Wang, "Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels", IEEE Systems Journal, vol. 11, no. 1, pp. 207-218, Mar. 2017. (SCI: WOS:000397779700023, IF: 3.882, 中科院二区)
Z. Yan, M. Wang, Y. Li and A. V. Vasilakos, "Encrypted Data Management with Deduplication in Cloud Computing", IEEE Cloud Computing, vol. 3, no. 2, pp. 28-35, Mar.-Apr. 2016. (SCI: WOS:000377414300006, IF:4.393, 中科院二区)
Z. Yan, X. Li, M. Wang and A. Vasilakos, "Flexible Data Access Control based on Trust and Reputation in Cloud Computing", IEEE Transactions on Cloud Computing, vol. 5, no.3, pp.485-498, Jul.-Sept. 2017. (SCI: WOS:000416650800010, IF: 5.967, 中科院一区)
M. Wang, Z. Yan, B. Song and M. Atiquzzaman, "AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications", The 16th IEEE Conference on Advanced &Trusted Computing (ATC 2019), Leicester, UK, Aug. 2019.
M. Wang and Z. Yan, "Security in D2D Communications: A Review", 14th IEEE Trustcom/BigDataSE/ISPA, Helsinki, Dec. 2015, pp. 1199-1204. (EI: 20162002399714)
Z. Yan, M. Wang, V. Niemi and R. Kantola, "Secure pervasive social networking based on multi-dimensional trust levels", 2013 IEEE Conference on Communications and Network Security (CNS 2013), Washington DC, Oct. 2013, pp. 100-108. (EI: 20140717329360)
Z. Yan, M. Wang and P. Zhang, "A Scheme to Secure Instant Community Data Access Based on Trust and Contexts", 2014 IEEE International Conference on Computer and Information Technology (CIT 2014), Xi'an, Sept. 2014, pp. 646-651. (EI: 20150400439261)
C. Huang, Z. Yan, N. Li and M. Wang, "Secure Pervasive Social Communications based on Trust in a Distributed Way", IEEE Access, vol. 4, pp. 9225-9238, 2016. (SCI: WOS:000395560800022, IF: 3.244, 中科院二区)
N. Li, Z. Yan, M. Wang and L. Yang, "Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE", ACM Transactions on Cyber-Physical Systems, 3(1), August 2018. (EI: 20183905852596)
发明专利:
授权专利:
Privacy preserving authentication and key agreement protocol for apparatus-to-apparatus communication,(美国)US10757569;25.08.2020.
An anonymous authentication and key agreement protocol in Device-to-Device (D2D) communications, (美国)US10841784B2;17.11.2020.
PCT申请专利:
Universal Key Agreement in Device-to-Device (D2D) Communications, PCT/CN2016/081106·2016-05-05.
SECURE AND PRIVATE AUTHENTICATION AND KEY AGREEMENT FOR DEVICE-TO-DEVICE RELAY COMMUNICATION, PCT/CN2019/084334; 25-Apr-2019.
Secure and Privacy-Preserving Handover Authentication for SDN-based 5G HetNets with High Efficiency, PCT/CN2020/124942; 29-Oct-2020
Method and Apparatus for Software Defined Network Handover, Dongsheng Zhao, Mingjun Wang, Zheng Yan, 申请日期:2022.05.05,申请号:WO2022087984A1