​
Login / Signup
Wenying Zheng
ORCID
Publication Activity (10 Years)
Years Active: 2012-2024
Publications (10 Years): 16
Top Topics
Key Management Scheme
Lightweight
Access Control
Keywords
Top Venues
IEEE Trans. Ind. Informatics
Int. J. Intell. Syst.
IEEE Trans. Intell. Transp. Syst.
IEEE Trans. Veh. Technol.
</>
Publications
</>
Huijie Yang
,
Wenying Zheng
,
Tao Zhang
,
Pandi Vijayakumar
,
Brij B. Gupta
,
Varsha Arya
,
Mary Subaja Christo
A Flexible and Verifiable Keyword PIR Scheme for Cloud-Edge-Terminal Collaboration in AIoT.
IEEE Internet Things J.
11 (10) (2024)
Yue Zhuang
,
Chen Wang
,
Wenying Zheng
,
Nancy Victor
,
Thippa Reddy Gadekallu
ERACMA: Expressive and Revocable Access Control With Multi-Authority for AIoT-Enabled Human Centric Consumer Electronics.
IEEE Trans. Consumer Electron.
70 (1) (2024)
Jinliang Chen
,
Tianqi Zhou
,
Sai Ji
,
Haowen Tan
,
Wenying Zheng
Efficient public auditing scheme for non-administrator group with secure user revocation.
J. Inf. Secur. Appl.
80 (2024)
Haowen Tan
,
Wenying Zheng
,
Pandi Vijayakumar
Secure and Efficient Authenticated Key Management Scheme for UAV-Assisted Infrastructure-Less IoVs.
IEEE Trans. Intell. Transp. Syst.
24 (6) (2023)
Yi Li
,
Wenying Zheng
,
Pandi Vijayakumar
,
Md. Zakirul Alam Bhuiyan
,
C. Thamilarasi
Parallel and Batch Multiple Replica Auditing Protocol for Edge Computing.
ISPA/BDCloud/SocialCom/SustainCom
(2023)
Mengya Chen
,
Wenying Zheng
,
Pandi Vijayakumar
,
Mamoun Alazab
,
Sivaraman Audithan
A Multinode Collaborative Decision-Making Scheme for Privacy Protection in IIoT.
IEEE Trans. Ind. Informatics
19 (12) (2023)
Haowen Tan
,
Wenying Zheng
,
Pandi Vijayakumar
,
Kouichi Sakurai
,
Neeraj Kumar
An Efficient Vehicle-Assisted Aggregate Authentication Scheme for Infrastructure-Less Vehicular Networks.
IEEE Trans. Intell. Transp. Syst.
24 (12) (2023)
Sichun Lv
,
Haowen Tan
,
Wenying Zheng
,
Tao Zhang
,
Menglei Wang
A dynamic conjunctive keywords searchable symmetric encryption scheme for multiple users in cloud computing.
Comput. Commun.
209 (2023)
Haowen Tan
,
Wenying Zheng
,
Yunguo Guan
,
Rongxing Lu
A Privacy-Preserving Attribute-Based Authenticated Key Management Scheme for Accountable Vehicular Communications.
IEEE Trans. Veh. Technol.
72 (3) (2023)
Wenying Zheng
,
Bing Chen
,
Debiao He
An adaptive access control scheme based on trust degrees for edge computing.
Comput. Stand. Interfaces
82 (2022)
Wenying Zheng
,
Chin-Feng Lai
,
Bing Chen
Blockchain-based access control with k $k$ -times tamper resistance in cloud environment.
Int. J. Intell. Syst.
37 (10) (2022)
Tianqi Zhou
,
Wenying Zheng
,
Haowen Tan
An Efficient Authenticated Group Key Agreement Protocol with Dynamic Batch Verification for Secure Distributed Networks.
NSS
(2022)
Yang Wei
,
Jianfeng Ma
,
Zhuzhu Wang
,
Bin Xiao
,
Wenying Zheng
Image splicing forgery detection by combining synthetic adversarial networks and hybrid dense U-net based on multiple spaces.
Int. J. Intell. Syst.
37 (11) (2022)
Wenying Zheng
,
Chin-Feng Lai
,
Debiao He
,
Neeraj Kumar
,
Bing Chen
Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment.
IEEE Trans. Ind. Informatics
17 (6) (2021)
Wenying Zheng
,
Dengzhi Liu
,
Xiong Li
,
Arun Kumar Sangaiah
Secure sustainable storage auditing protocol (SSSAP) with efficient key updates for cloud computing.
Sustain. Comput. Informatics Syst.
28 (2020)
Chen Wang
,
Wenying Zheng
,
Sai Ji
,
Qi Liu
,
Anxi Wang
Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks.
Wirel. Commun. Mob. Comput.
2018 (2018)
Wenying Zheng
,
Kazi Atiqur Rahman
,
Kemal E. Tepe
Reliable and energy efficient cooperative relaying scheme (REECR) in wireless sensor networks.
IWCMC
(2013)
Shang Gao
,
Zhihao Chen
,
Wenying Zheng
,
Wenyan Zhou
An exploratory study on lifestyles and the adoption of mobile services in China.
MoMM
(2012)
Zhihao Chen
,
Wenying Zheng
,
Wenyan Zhou
,
Shang Gao
Effect of Lifestyle on the Adoption of Mobile Services.
WHICEB
(2012)