​
Login / Signup
Jian Wang
ORCID
Publication Activity (10 Years)
Years Active: 2014-2022
Publications (10 Years): 11
Top Topics
Sensor Networks
Third Party
Security Analysis
Differential Evolution
Top Venues
IEICE Trans. Inf. Syst.
Quantum Inf. Process.
IEEE Access
CIS
</>
Publications
</>
Hongyu Kuang
,
Jian Wang
,
Ruilin Li
,
Chao Feng
,
Yunfei Su
,
Xing Zhang
Automated detection on the security of the linked-list operations.
Frontiers Comput. Sci.
16 (2) (2022)
Fenglei Deng
,
Jian Wang
,
Bin Zhang
,
Chao Feng
,
Zhiyuan Jiang
,
Yunfei Su
A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities.
Sci. Program.
2020 (2020)
Hongyu Kuang
,
Jian Wang
,
Ruilin Li
,
Chao Feng
,
Xing Zhang
Automated Data-Processing Function Identification Using Deep Neural Network.
IEEE Access
8 (2020)
Xiayang Chen
,
Chaojing Tang
,
Jian Wang
,
Lei Zhang
,
Qingkun Meng
Improved Wolf Pack Algorithm Based on Differential Evolution Elite Set.
IEICE Trans. Inf. Syst.
(7) (2018)
Yi Liu
,
Xingtong Liu
,
Chaojing Tang
,
Jian Wang
,
Lei Zhang
Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin.
IEEE Access
6 (2018)
Yi Liu
,
Qingkun Meng
,
Xingtong Liu
,
Jian Wang
,
Lei Zhang
,
Chaojing Tang
Formal Method for Security Analysis of Electronic Payment Protocols.
IEICE Trans. Inf. Syst.
(9) (2018)
Xiayang Chen
,
Chaojing Tang
,
Jian Wang
,
Lei Zhang
,
Yi Liu
A Novel Hybrid Based on Wolf Pack Algorithm and Differential Evolution Algorithm.
ISCID (1)
(2017)
Ran Ji
,
Jian Wang
,
Chaojing Tang
,
Ruilin Li
Automatic Reverse Engineering of Private Flight Control Protocols of UAVs.
Secur. Commun. Networks
2017 (2017)
Yi Liu
,
Xingtong Liu
,
Lei Zhang
,
Jian Wang
,
Chaojing Tang
Novel Logical Method for Security Analysis of Electronic Payment Protocols.
CoRR
(2017)
Yi Liu
,
Ruilin Li
,
Xingtong Liu
,
Jian Wang
,
Chaojing Tang
,
Hongyan Kang
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm.
CIS
(2017)
Jian Wang
,
Abraham O. Fapojuwo
,
Chen Zhang
,
Huiting Tan
UML Modeling of Cross-Layer Attack in Wireless Sensor Networks.
InterIoT/SaSeIoT
(2016)
Haifeng Li
,
Bo Shuai
,
Jian Wang
,
Chaojing Tang
Protocol Reverse Engineering Using LDA and Association Analysis.
CIS
(2015)
Bo Zhang
,
Xingtong Liu
,
Jian Wang
,
Chaojing Tang
Cryptanalysis and improvement of quantum private comparison of equality protocol without a third party.
Quantum Inf. Process.
14 (12) (2015)
Xingtong Liu
,
Bo Zhang
,
Jian Wang
,
Chaojing Tang
,
Jingjing Zhao
Differential phase shift quantum private comparison.
Quantum Inf. Process.
13 (1) (2014)