学术信息网 西电导航 关于 使用说明 搜索 系统首页 登录 控制面板 收藏 王明君的留言板
学术论文

同行评审论文:

  1. X. Li, M. Wang, Y. Guo and W. Ding, "AdaptFL: Adaptive Client Task Allocation-Based Synchronous Federated Learning", IEEE TrustCom 2024. 
  2. M. Wang, Y. Liu and W. Ding, "SP2-RD2D: Secure and Privacy-Preserving Authentication and Key Agreement Protocol for D2D Relay Communication", IEEE TrustCom 2024.  

  3. M. Wang, D. Zhao, Z. Yan, H, Wang and T. Li, “XAuth: Secure and Privacy-preserving Cross-domain Handover Authentication for 5G HetNets,” IEEE Internet of Things Journal,vol. 10, no. 7, pp. 5962-5976, 1 April.2023.
  4. L. Wang, W. Ding, Z. Yan, S. Qiu, M. Wang and Z. Wan, "EDDAC: An Efficient and Decentralized Data Access Control Scheme With Attribute Privacy Preservation," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2023.3342314.
  5. J. Zhang, Z. Yan, S. Fei, M. Wang, T. Li and H. Wang, "Is Today's End-to-End Communication Security Enough for 5G and Its Beyond?," IEEE Network, vol. 36, no. 1, pp. 105-112, January/February 2022.
  6. D. Wang, B. Song, Y, Liu and M. Wang, Secure and reliable computation offloading in blockchain-assisted cyber-physical IoT systems,Digital Communications and Networks,vol 8, no 5, pp 625-635, 2022.
  7. D. Zhao, Z. Yan, M. Wang, P. Zhang and B. Song, "Is 5G Handover Secure and Private? A Survey," IEEE Internet of Things Journal, vol. 8, no. 16, pp. 12855-12879, 15 Aug.15, 2021.
  8. J. Y. Muhammad, M. Wang, Z. Yan and F. Khan, "Trusted Network Slicing Among Multiple Mobile Network Operators," 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020, pp. 1135-1140.
  9. M. Wang, Z. Yan, B. Song and M. Atiquzzaman, "AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications," 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI), 2019, pp. 1356-1362.
  10. M. Wang and Z. Yan, "Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications", IEEE Transactions on Industrial Informatics, 2018.8, 14(8): 3637-3647. (SCI: WOS:000441446300035, IF: 7.377, 中科院一区)
  11. M. Wang, Z. Yan and V. Niemi, "UAKA-D2D: Universal Authentication and Key Agreement Protocol in D2D Communications", Mobile Networks and Applications, vol. 22, no.3, pp. 510-525, Jun. 2017. (SCI: WOS:000403326500016, IF: 3.259, 中科院三区)
  12. M. Wang and Z. Yan. "A Survey on Security in D2D Communications", Mobile Networks and Applications, vol. 22, no. 2, pp. 195-208, Apr. 2017. (SCI: WOS:000399021400006, IF: 3.259, 中科院三区)
  13. M. Wang and Z. Yan, "Security Design for D2D", Wiley 5G Ref: The Essential 5G Reference Online, DOI:10.1002/9781119471509.w5GRef188, 2019.12. (书章)
  14. Z. Yan and M. Wang, "Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels", IEEE Systems Journal, vol. 11, no. 1, pp. 207-218, Mar. 2017. (SCI: WOS:000397779700023, IF: 3.882, 中科院二区)
  15. Z. Yan, M. Wang, Y. Li and A. V. Vasilakos, "Encrypted Data Management with Deduplication in Cloud Computing", IEEE Cloud Computing, vol. 3, no. 2, pp. 28-35, Mar.-Apr. 2016. (SCI: WOS:000377414300006, IF:4.393, 中科院二区)
  16. Z. Yan, X. Li, M. Wang and A. Vasilakos, "Flexible Data Access Control based on Trust and Reputation in Cloud Computing", IEEE Transactions on Cloud Computing, vol. 5, no.3, pp.485-498, Jul.-Sept. 2017. (SCI: WOS:000416650800010, IF: 5.967, 中科院一区)
  17. M. Wang, Z. Yan, B. Song and M. Atiquzzaman, "AAKA-D2D: Anonymous Authentication and Key Agreement Protocol in D2D Communications", The 16th IEEE Conference on Advanced &Trusted Computing (ATC 2019), Leicester, UK, Aug. 2019.
  18. M. Wang and Z. Yan, "Security in D2D Communications: A Review", 14th IEEE Trustcom/BigDataSE/ISPA, Helsinki, Dec. 2015, pp. 1199-1204. (EI: 20162002399714)
  19. Z. Yan, M. Wang, V. Niemi and R. Kantola, "Secure pervasive social networking based on multi-dimensional trust levels", 2013 IEEE Conference on Communications and Network Security (CNS 2013), Washington DC, Oct. 2013, pp. 100-108. (EI: 20140717329360)
  20. Z. Yan, M. Wang and P. Zhang, "A Scheme to Secure Instant Community Data Access Based on Trust and Contexts", 2014 IEEE International Conference on Computer and Information Technology (CIT 2014), Xi'an, Sept. 2014, pp. 646-651. (EI: 20150400439261)
  21. C. Huang, Z. Yan, N. Li and M. Wang, "Secure Pervasive Social Communications based on Trust in a Distributed Way", IEEE Access, vol. 4, pp. 9225-9238, 2016. (SCI: WOS:000395560800022, IF: 3.244, 中科院二区)
  22. N. Li, Z. Yan, M. Wang and L. Yang, "Securing Communication Data in Pervasive Social Networking based on Trust with KP-ABE", ACM Transactions on Cyber-Physical Systems, 3(1), August 2018. (EI: 20183905852596)

 

发明专利:

  1. 授权专利:
  1. Privacy preserving authentication and key agreement protocol for apparatus-to-apparatus communication, (美国)US10757569;25.08.2020.
  2. An anonymous authentication and key agreement protocol in Device-to-Device (D2D) communications, (美国)US10841784B2;17.11.2020.

 

  1. PCT申请专利:
  1. Universal Key Agreement in Device-to-Device (D2D) Communications, PCT/CN2016/081106·2016-05-05.
  2. SECURE AND PRIVATE AUTHENTICATION AND KEY AGREEMENT FOR DEVICE-TO-DEVICE RELAY COMMUNICATION, PCT/CN2019/084334; 25-Apr-2019.
  3. Secure and Privacy-Preserving Handover Authentication for SDN-based 5G HetNets with High Efficiency, PCT/CN2020/124942; 29-Oct-2020
  4. Method and Apparatus for Software Defined Network Handover, Dongsheng Zhao, Mingjun Wang, Zheng Yan, 申请日期:2022.05.05,申请号:WO2022087984A1

 

  1. 中国专利申请
  1. 一种去中心化的网络服务管理方法、系统及设备,覃朗,王明君,吕明远,李盛,丁文秀,闫峥,申请日期:2023.11.13,申请号:202311507189.9.
  2. 通信方法、通信设备、介质及程序产品,王明君,马瑞,闫峥,王海光,李铁岩,申请日期:2024. 5.22, 申请号:202310581318.2.
  3. 基于约束因子的联邦学习客户端选择方法,李小双,王明君,闫峥,丁文秀,陈亮,王普,申请日期:2023.09.04,申请号:CN117217328A.
  4. 通信的方法和装置,王明君,赵东昇,闫峥,王海光,李铁岩。申请日期:2023.09.01,申请号:CN116684865A.
  5. 基于多密钥同态加密的联邦学习隐私保护方法及其装置,蔡宇轩,丁文秀,肖昱翾,闫峥,王明君。申请日期:2022.05.11,申请号:CN115242369A.
  6. 基于多无人机中继的安全匿名核心网访问方法,王利,王普,王明君,闫峥。申请日期:2022.08.26,申请号:CN115459972A.
  7. 一种去中心化的多权威隐私保护数据访问控制方法及系统,王兰燕,丁文秀,杨航,闫峥,王明君。申请日期:2022.08.31,申请号:CN115567247A.