Остановите войну!
for scientists:
default search action
Shengling Wang 0001
- > Home > Persons > Shengling Wang 0001
Publications
- 2024
- [j58]Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lyu:
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 23(5): 6133-6148 (2024) - 2023
- [j56]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. IEEE Trans. Dependable Secur. Comput. 20(2): 1017-1030 (2023) - [j55]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Black Swan in Blockchain: Micro Analysis of Natural Forking. IEEE Trans. Dependable Secur. Comput. 20(6): 4443-4454 (2023) - [j54]Qin Hu, Shengling Wang, Zehui Xiong, Xiuzhen Cheng:
Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning. IEEE Trans. Mob. Comput. 22(5): 2850-2861 (2023) - [j53]Shengling Wang, Xidi Qu, Qin Hu, Xia Wang, Xiuzhen Cheng:
An Uncertainty- and Collusion-Proof Voting Consensus Mechanism in Blockchain. IEEE/ACM Trans. Netw. 31(5): 2376-2388 (2023) - [i15]Kun Li, Shengling Wang, Hongwei Shi, Xiuzhen Cheng, Minghui Xu:
Spatial Crowdsourcing Task Allocation Scheme for Massive Data with Spatial Heterogeneity. CoRR abs/2310.12433 (2023) - 2022
- [j52]Chun-Chi Liu, Hechuan Guo, Minghui Xu, Shengling Wang, Dongxiao Yu, Jiguo Yu, Xiuzhen Cheng:
Extending On-Chain Trust to Off-Chain - Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE). IEEE Trans. Computers 71(12): 3268-3280 (2022) - [j51]Kun Li, Shengling Wang, Xiuzhen Cheng, Qin Hu:
A Misreport- and Collusion-Proof Crowdsourcing Mechanism Without Quality Verification. IEEE Trans. Mob. Comput. 21(9): 3084-3095 (2022) - [i12]Shengling Wang, Lina Shi, Hongwei Shi, Yifang Zhang, Qin Hu, Xiuzhen Cheng:
Proof of User Similarity: the Spatial Measurer of Blockchain. CoRR abs/2211.01143 (2022) - 2021
- [j49]Wei Li, Xiuzhen Cheng, Zhi Tian, Shengling Wang, Rongfang Bie, Jiguo Yu:
Truthful Auction Analysis and Design in Multiunit Heterogenous Spectrum Markets With Reserve Prices. IEEE Trans. Cogn. Commun. Netw. 7(1): 157-170 (2021) - [j48]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng, Junshan Zhang, Jiguo Yu:
Fee-Free Pooled Mining for Countering Pool-Hopping Attack in Blockchain. IEEE Trans. Dependable Secur. Comput. 18(4): 1580-1590 (2021) - [j47]Shengling Wang, Lina Shi, Qin Hu, Junshan Zhang, Xiuzhen Cheng, Jiguo Yu:
Privacy-Aware Data Trading. IEEE Trans. Inf. Forensics Secur. 16: 3916-3927 (2021) - [j46]Qin Hu, Shengling Wang, Xiuzhen Cheng, Junshan Zhang, Weifeng Lv:
Cost-Efficient Mobile Crowdsensing With Spatial-Temporal Awareness. IEEE Trans. Mob. Comput. 20(3): 928-938 (2021) - [j45]Xidi Qu, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Proof of Federated Learning: A Novel Energy-Recycling Consensus Algorithm. IEEE Trans. Parallel Distributed Syst. 32(8): 2074-2085 (2021) - [c43]Zhuoming Zhu, Shengling Wang, Rongfang Bie, Xiuzhen Cheng:
AERM: An Attribute-Aware Economic Robust Spectrum Auction Mechanism. WASA (3) 2021: 142-153 - [i11]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Micro Analysis of Natural Forking in Blockchain Based on Large Deviation Theory. CoRR abs/2105.09535 (2021) - [i10]Chun-Chi Liu, Hechuan Guo, Minghui Xu, Shengling Wang, Dongxiao Yu, Jiguo Yu, Xiuzhen Cheng:
Extending On-chain Trust to Off-chain - A Trustworthy Vaccine Shipping Example. CoRR abs/2106.15934 (2021) - [i9]Qin Hu, Shengling Wang, Zeihui Xiong, Xiuzhen Cheng:
Nothing Wasted: Full Contribution Enforcement in Federated Edge Learning. CoRR abs/2110.08330 (2021) - 2020
- [j43]Shengling Wang, Hongwei Shi, Qin Hu, Bin Lin, Xiuzhen Cheng:
Moving Target Defense for Internet of Things Based on the Zero-Determinant Theory. IEEE Internet Things J. 7(1): 661-668 (2020) - [j39]Qin Hu, Shengling Wang, Xiuzhen Cheng, Liran Ma, Rongfang Bie:
Solving the Crowdsourcing Dilemma Using the Zero-Determinant Strategies. IEEE Trans. Inf. Forensics Secur. 15: 1778-1789 (2020) - [j38]Qin Hu, Shengling Wang, Peizi Ma, Xiuzhen Cheng, Weifeng Lv, Rongfang Bie:
Quality Control in Crowdsourcing Using Sequential Zero-Determinant Strategies. IEEE Trans. Knowl. Data Eng. 32(5): 998-1009 (2020) - [j37]Minghui Xu, Shengling Wang, Qin Hu, Hao Sheng, Xiuzhen Cheng:
Quantum Analysis on Task Allocation and Quality Control for Crowdsourcing With Homogeneous Workers. IEEE Trans. Netw. Sci. Eng. 7(4): 2830-2839 (2020) - [j36]Shengling Wang, Weiman Sun, Liran Ma, Weifeng Lv, Xiuzhen Cheng:
Quantum Game Analysis on Extrinsic Incentive Mechanisms for P2P Services. IEEE Trans. Parallel Distributed Syst. 31(1): 159-170 (2020) - [i8]Shengling Wang, Peizi Ma, Qin Hu, Xiuzhen Cheng, Weifeng Lv:
Egoistic Incentives Based on Zero-Determinant Alliances for Large-Scale Systems. CoRR abs/2001.02324 (2020) - [i7]Kun Li, Shengling Wang, Xiuzhen Cheng, Qin Hu:
A Misreport- and Collusion-Proof Crowdsourcing Mechanism without Quality Verification. CoRR abs/2003.11814 (2020) - [i6]Shengling Wang, Lina Shi, Junshan Zhang, Xiuzhen Cheng, Jiguo Yu:
Privacy-aware Data Trading. CoRR abs/2003.13897 (2020) - [i5]Chun-Chi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lv:
Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things. CoRR abs/2011.04919 (2020) - [i4]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng, Jianhui Huang:
Cap the Gap: Solving the Egoistic Dilemma under the Transaction Fee-Incentive Bitcoin. CoRR abs/2012.14561 (2020) - 2019
- [j35]Kun Li, Shengling Wang, Xiuzhen Cheng:
Crowdsourcee evaluation based on persuasion game. Comput. Networks 159: 1-9 (2019) - [j33]Chun-Chi Liu, Yinhao Xiao, Vishesh Javangula, Qin Hu, Shengling Wang, Xiuzhen Cheng:
NormaChain: A Blockchain-Based Normalized Autonomous Transaction Settlement System for IoT-Based E-Commerce. IEEE Internet Things J. 6(3): 4680-4693 (2019) - [c41]Shengling Wang, Shasha Chen, Xiuzhen Cheng, Weifeng Lv, Jiguo Yu:
Analysis of Antagonistic Dynamics for Rumor Propagation. ICDCS 2019: 1253-1263 - [c39]Qin Hu, Shengling Wang, Xiuzhen Cheng:
A game theoretic analysis on block withholding attacks using the zero-determinant strategy. IWQoS 2019: 41:1-41:10 - [i3]Hongwei Shi, Shengling Wang, Qin Hu, Xiuzhen Cheng, Junshan Zhang, Jiguo Yu:
Hopping-Proof and Fee-Free Pooled Mining in Blockchain. CoRR abs/1912.11575 (2019) - [i1]Xidi Qu, Shengling Wang, Qin Hu, Xiuzhen Cheng:
Proof of Federated Learning: A Novel Energy-recycling Consensus Algorithm. CoRR abs/1912.11745 (2019) - 2018
- [j26]Chunqiang Hu, Wei Li, Xiuzhen Cheng, Jiguo Yu, Shengling Wang, Rongfang Bie:
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds. IEEE Trans. Big Data 4(3): 341-355 (2018) - [j25]Shengling Wang, Xiangheng Meng, Jiguo Yu, Rongfang Bie, Yunchuan Sun, Xiuzhen Cheng:
N-in-One: A Novel Location-Based Service. IEEE Trans. Veh. Technol. 67(6): 5274-5286 (2018) - [j24]Qin Hu, Shengling Wang, Chunqiang Hu, Jian-Hui Huang, Wei Li, Xiuzhen Cheng:
Messages in a Concealed Bottle: Achieving Query Content Privacy With Accurate Location-Based Services. IEEE Trans. Veh. Technol. 67(8): 7698-7711 (2018) - 2017
- [j23]Ruinian Li, Hongjuan Li, Xiuzhen Cheng, Xiaobo Zhou, Keqiu Li, Shengling Wang, Rongfang Bie:
Perturbation-Based Private Profile Matching in Social Networks. IEEE Access 5: 19720-19732 (2017) - [j21]Qin Hu, Shengling Wang, Rongfang Bie, Xiuzhen Cheng:
Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy. Sensors 17(5): 1012 (2017) - [j20]Shengling Wang, Xia Wang, Xiuzhen Cheng, Jian-Hui Huang, Rongfang Bie, Feng Zhao:
Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lévy Mobility. IEEE Trans. Veh. Technol. 66(5): 4173-4187 (2017) - [c34]Qin Hu, Shengling Wang, Liran Ma, Rongfang Bie, Xiuzhen Cheng:
Anti-Malicious Crowdsourcing Using the Zero-Determinant Strategy. ICDCS 2017: 1137-1146 - [c31]Chun-Chi Liu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie, Jiguo Yu:
Mechanism design games for thwarting malicious behavior in crowdsourcing applications. INFOCOM 2017: 1-9 - [c29]Shengling Wang, Jian-Hui Huang, Luyun Li, Liran Ma, Xiuzhen Cheng:
Quantum Game Analysis of Privacy-Leakage for Application Ecosystems. MobiHoc 2017: 13:1-13:10 - [c28]Ruinian Li, Hongjuan Li, Xiuzhen Cheng, Keqiu Li, Shengling Wang, Rongfang Bie:
Poster: Perturbation Based Private Profile Matching in Social Networks. PAC 2017: 198-199 - 2016
- [j19]Li Feng, Jiguo Yu, Xiuzhen Cheng, Shengling Wang:
Analysis and optimization of delayed channel access for wireless cyber-physical systems. EURASIP J. Wirel. Commun. Netw. 2016: 60 (2016) - [j18]Shengling Wang, Rongfang Bie, Feng Zhao, Nan Zhang, Xiuzhen Cheng, Hyeong-Ah Choi:
Security in wearable communications. IEEE Netw. 30(5): 61-67 (2016) - [j16]Jian-Hui Huang, Shengling Wang, Xiuzhen Cheng, Jingping Bi:
Big data routing in D2D communications with cognitive radio capability. IEEE Wirel. Commun. 23(4): 45-51 (2016) - [c20]Tianyi Song, Xiuzhen Cheng, Hongjuan Li, Jiguo Yu, Shengling Wang, Rongfang Bie:
Detecting driver phone calls in a moving vehicle based on voice features. INFOCOM 2016: 1-9 - [c19]Qin Hu, Shengling Wang, Liran Ma, Xiuzhen Cheng, Rongfang Bie:
Solving the crowdsourcing dilemma using the zero-determinant strategy: poster. MobiHoc 2016: 373-374 - 2015
- [j15]Shengling Wang, Xia Wang, Jian-Hui Huang, Rongfang Bie, Xiuzhen Cheng:
Analyzing the potential of mobile opportunistic networks for big data applications. IEEE Netw. 29(5): 57-63 (2015) - [c17]Qin Hu, Shengling Wang, Rongfang Bie, Xiuzhen Cheng:
Low Price to Win: Interactive scheme in cooperative cognitive radio networks. ICC 2015: 7546-7551 - [c16]Jiguo Yu, Lili Jia, Wei Li, Xiuzhen Cheng, Shengling Wang, Rongfang Bie, Dongxiao Yu:
A Self-Stabilizing Algorithm for CDS Construction with Constant Approximation in Wireless Networks under SINR Model. ICDCS 2015: 792-793 - [c15]Li Feng, Jiguo Yu, Xiuzhen Cheng, Shengling Wang:
Impact of a Deterministic Delay in the DCA Protocol. WASA 2015: 134-144 - 2014
- [j13]Wei Cheng, Shengling Wang, Xiuzhen Cheng:
Virtual track: applications and challenges of the RFID system on roads. IEEE Netw. 28(1): 42-47 (2014) - [j12]Wei Li, Shengling Wang, Xiuzhen Cheng, Rongfang Bie:
Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 18(1): 3-13 (2014) - [j11]Wei Li, Shengling Wang, Yong Cui, Xiuzhen Cheng, Ran Xin, Mznah Al-Rodhaan, Abdullah Al-Dhelaan:
AP Association for Proportional Fairness in Multirate WLANs. IEEE/ACM Trans. Netw. 22(1): 191-202 (2014) - [j10]Jian-Hui Huang, Shengling Wang, Xiuzhen Cheng, Min Liu, Zhongcheng Li, Biao Chen:
Mobility-Assisted Routing in Intermittently Connected Mobile Cognitive Radio Networks. IEEE Trans. Parallel Distributed Syst. 25(11): 2956-2968 (2014) - [j9]Shengling Wang, Jian-Hui Huang, Xiuzhen Cheng, Biao Chen:
Coverage adjustment for load balancing with an AP service availability guarantee in WLANs. Wirel. Networks 20(3): 475-491 (2014) - [c13]Shengling Wang, Xia Wang, Xiuzhen Cheng, Jian-Hui Huang, Rongfang Bie:
The Tempo-Spatial Information Dissemination Properties of Mobile Opportunistic Networks with Levy Mobility. ICDCS 2014: 124-133 - 2013
- [j8]Shengling Wang, Min Liu, Xiuzhen Cheng, Zhongcheng Li, Jian-Hui Huang, Biao Chen:
Opportunistic Routing in Intermittently Connected Mobile P2P Networks. IEEE J. Sel. Areas Commun. 31(9-Supplement): 369-378 (2013) - [c10]Wei Li, Shengling Wang, Xiuzhen Cheng:
Truthful multi-attribute auction with discriminatory pricing in cognitive radio networks. CRAB@MobiCom 2013: 21-30 - 2012
- [j7]Shengling Wang, Min Liu, Xiuzhen Cheng, Min Song:
Routing in pocket switched networks. IEEE Wirel. Commun. 19(1): 67-73 (2012) - [c9]Shengling Wang, Min Liu, Xiuzhen Cheng, Zhongcheng Li, Jian-Hui Huang, Biao Chen:
HERO - A Home Based Routing in Pocket Switched Networks. WASA 2012: 20-30 - 2010
- [c7]Wei Li, Yong Cui, Shengling Wang, Xiuzhen Cheng:
Approximate Optimization for Proportional Fair AP Association in Multi-rate WLANs. WASA 2010: 36-46
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-02 23:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint