​
Login / Signup
Jian Wang
Publication Activity (10 Years)
Years Active: 2018-2023
Publications (10 Years): 14
Top Topics
Jpeg Xr
Wavelet Transform
Crowd Sourcing
Higher Efficiency
Top Venues
CoRR
ICBTA
ICCCN
SRDS
</>
Publications
</>
Tianxi Wang
,
Jiqiang Liu
,
Tianhao Liu
,
Di Zhai
,
Jian Wang
,
Tao Zhang
Secure and Scalable Blockchain for IIoT with Dual Compression Scheme.
iThings/GreenCom/CPSCom/SmartData/Cybermatics
(2023)
Di Zhai
,
Jian Wang
,
Jiqiang Liu
,
Tianhao Liu
,
Wenjia Niu
Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness.
ICPADS
(2022)
Yufei Liu
,
Jiqiang Liu
,
Jian Wang
,
Tianhao Liu
,
Xudong He
BSS-ITS: Blockchain Scaling Scheme with Sharding for Intelligent Transportation System: Scale Blockchain for Better Data Exchange and Storage with Full Sharding for Intelligent Transportation System.
ICBTA
(2021)
Tianhao Liu
,
Jiqiang Liu
,
Jian Wang
,
Di Zhai
,
Yufei Liu
,
Xudong He
Anonymous Storage and Verification Model of IIoT Based on Blockchain: Anonymous storage and verification model of IIoT production status based on blockchain.
ICBTA
(2021)
Zhiqiang Xie
,
Yingxiao Xiang
,
Yike Li
,
Shuang Zhao
,
Endong Tong
,
Wenjia Niu
,
Jiqiang Liu
,
Jian Wang
Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.
ICA3PP (1)
(2021)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Jian Wang
,
Jiqiang Liu
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
SRDS
(2020)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Jian Wang
,
Jiqiang Liu
NF-Crowd: Nearly-free Blockchain-based Crowdsourcing.
CoRR
(2020)
Wenping Ji
,
Jian Wang
,
Xudong He
,
Jiqiang Liu
Malware Analysis Method Based Random Access Memory in Android.
ATIS
(2020)
Yinqi Yang
,
Jian Wang
,
Baoqin Zhai
,
Jiqiang Liu
IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN.
CSS (2)
(2019)
Jian Wang
,
Yacong Geng
,
Jiqiang Liu
Adaptive Quantum Image Encryption Method Based on Wavelet Transform.
CoRR
(2019)
ShaoHua Lv
,
Jian Wang
,
Yinqi Yang
,
Jiqiang Liu
Intrusion Prediction With System-Call Sequence-to-Sequence Model.
IEEE Access
6 (2018)
Xudong He
,
Jian Wang
,
Jiqiang Liu
,
Lei Han
,
Yang Yu
,
ShaoHua Lv
Hierarchical Filtering Method of Alerts Based on Multi-Source Information Correlation Analysis.
ICCCN
(2018)
ShaoHua Lv
,
Jian Wang
,
Yinqi Yang
,
Jiqiang Liu
Intrusion Prediction with System-call Sequence-to-Sequence Model.
CoRR
(2018)
Yang Yu
,
Jian Wang
,
Jiqiang Liu
,
Lei Han
,
Xudong He
,
ShaoHua Lv
Multi-Dimension Threat Situation Assessment Based on Network Security Attributes.
ICCCN
(2018)