default search action
Wenlong Tian
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Hongmu Han, Zhongpeng Wang, Zhigang Xu, Xinhua Dong, Wenlong Tian:
Enhancing IoT Security and Efficiency: A Blockchain-Assisted Multi-Keyword Searchable Encryption Scheme. IEEE Access 12: 148677-148692 (2024) - [j14]Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao:
PEO-Store: Delegation-Proof Based Oblivious Storage With Secure Redundancy Elimination. IEEE Trans. Dependable Secur. Comput. 21(5): 4815-4826 (2024) - [c19]Dan Zhang, Yun Zhang, Dai Gao, Wenlong Tian, Yilun Zhao, Wei He:
Research on Integrated Sensing and Communications Based on OCDM. IGARSS 2024: 6839-6842 - 2023
- [j13]Wenlong Tian, Qi Liu, Ruixuan Li, Zhiyong Xu, Yan Zhang, Yongfeng Huang:
A Blockchain-Based Secure Searching Strategy for Metadata in Mobile Edge Computing. IEEE Internet Things J. 10(22): 19795-19809 (2023) - [c18]Junwei Tang, Zilong Xu, Luyao Ye, Tao Peng, Ruhan He, Xinrong Hu, Wenlong Tian:
PE-FedAvg: A Privacy-Enhanced Federated Learning for Distributed Android Malware Detection. ISPA/BDCloud/SocialCom/SustainCom 2023: 474-481 - [c17]Yanan Guo, Xiaoqun Cao, Kecheng Peng, Wei Dong, Wenlong Tian, Mengge Zhou:
An Efficient Approximation Method Based on Enhanced Physics-Informed Neural Networks for Solving Localized Wave Solutions of PDEs. ICANN (5) 2023: 230-242 - [c16]Yanan Guo, Xiaoqun Cao, Kecheng Peng, Wenlong Tian, Mengge Zhou:
Surrogate Modeling for Soliton Wave of Nonlinear Partial Differential Equations via the Improved Physics-Informed Deep Learning. ICIC (2) 2023: 235-246 - [c15]Hongmu Han, Sheng Chen, Zhigang Xu, Xinhua Dong, Wenlong Tian:
GPChain: Optimizing Cross-Shard Transactions and Load Imbalance in Sharded Blockchain Networks. ICIOT 2023: 31-46 - [c14]Yanan Guo, Xiaoqun Cao, Mengge Zhou, Kecheng Peng, Wenlong Tian:
Solving Localized Wave Solutions of the Nonlinear PDEs Using Physics-Constraint Deep Learning Method. ICONIP (7) 2023: 290-302 - [c13]Junwei Tang, Qiaosen Pi, Ruhan He, Jin Huang, Tao Peng, Xinrong Hu, Wenlong Tian:
A lightweight method for Android malware classification based on teacher assistant distillation. MSN 2023: 819-824 - [c12]Yanan Guo, Xiaoqun Cao, Wei Dong, Kecheng Peng, Wenlong Tian, Mengge Zhou:
Learning Rogue Waves of Nonlinear Schrödinger Equation with Enhanced Physics-Informed Neural Networks Simulator. SMC 2023: 13-18 - [c11]Jinzhao Wang, Wenlong Tian, Ruixuan Li, Junwei Tang, Xuming Ye, Yaping Wan, Zhiyong Xu:
Sym-Fed: Unleashing the Power of Symmetric Encryption in Cross-Silo Federated Learning. TrustCom 2023: 833-840 - [i2]Wenlong Tian, Jian Guo, Zhiyong Xu, Ruixuan Li, Weijun Xiao:
PEO-Store: Practical and Economical Oblivious Store with Peer-to-Peer Delegation. IACR Cryptol. ePrint Arch. 2023: 291 (2023) - 2022
- [j12]Wenlong Tian, Ruixuan Li, Zhiyong Xu:
TSS: A two-party secure server-aid chunking algorithm. Concurr. Comput. Pract. Exp. 34(12) (2022) - [j11]Wenlong Tian, Xiaoqun Cao, Kecheng Peng:
Technology for Position Correction of Satellite Precipitation and Contributions to Error Reduction - A Case of the '720' Rainstorm in Henan, China. Sensors 22(15): 5583 (2022) - [j10]Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao:
Loco-Store: Locality-Based Oblivious Data Storage. IEEE Trans. Dependable Secur. Comput. 19(2): 1395-1406 (2022) - [c10]Yuqing Geng, Wenlong Tian, Ruixuan Li, Weijun Xiao, Chunping Ouyang, Yongbin Liu, Qifei Liu, Jing Li, Xuming Ye, Zhiyong Xu:
Context-aware Resemblance Detection based Deduplication Ratio Prediction for Cloud Storage. BDCAT 2022: 21-29 - [c9]Xuming Ye, Xiaoye Xue, Wenlong Tian, Ruixuan Li, Weijun Xiao, Zhiyong Xu, Yaping Wan:
Chunk Content is not Enough: Chunk-Context Aware Resemblance Detection for Deduplication Delta Compression. DCC 2022: 492 - [c8]Baisong Li, Wenlong Tian, Ruixuan Li, Weijun Xiao, Zhongming Fu, Xuming Ye, Renjiao Duan, Yusheng Li, Zhiyong Xu:
Cross-domain Resemblance Detection based on Meta-learning for Cloud Storage. IPCCC 2022: 374-379 - [c7]Wenlong Tian, Xiaoqun Cao, Xiaoyong Li, Kecheng Peng:
Position Error Correction for Satellite Precipitation Products Using Image Registration based on Unsupervised Learning. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 847-855 - [c6]Zhigang Xu, Qing Sun, Hongmu Han, Xinhua Dong, Zhongzhen Yan, Zhiqiang Zheng, Wenlong Tian:
BMTAC: a decentralized, auditable, time-limited, multi-authority attribute access control scheme in blockchain environment. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1997-2002 - 2021
- [j9]Wenlong Tian, Wei Yang, Xiaotao Shao:
A High-Precision Magnetic Induction Through-the-Earth Positioning Scheme. IEEE Access 9: 35109-35120 (2021) - [j8]Wenlong Tian, Wei Yang, Xiaotao Shao:
A High-Precision Dual-Frequency Magnetic Induction Through-the-Earth Positioning Method. IEEE Access 9: 162325-162336 (2021) - [j7]Wenlong Tian, Ruixuan Li, Cheng-Zhong Xu, Zhiyong Xu:
Sed-Dedup: An efficient secure deduplication system with data modifications. Concurr. Comput. Pract. Exp. 33(15) (2021) - [j6]Kecheng Peng, Xiaoqun Cao, Bainian Liu, Yanan Guo, Chaohao Xiao, Wenlong Tian:
Polar Vortex Multi-Day Intensity Prediction Relying on New Deep Learning Model: A Combined Convolution Neural Network with Long Short-Term Memory Based on Gaussian Smoothing Method. Entropy 23(10): 1314 (2021) - [j5]Kecheng Peng, Xiaoqun Cao, Bainian Liu, Yanan Guo, Wenlong Tian:
Ensemble Empirical Mode Decomposition with Adaptive Noise with Convolution Based Gated Recurrent Neural Network: A New Deep Learning Model for South Asian High Intensity Forecasting. Symmetry 13(6): 931 (2021) - [c5]Xuming Ye, Jia Tang, Wenlong Tian, Ruixuan Li, Weijun Xiao, Yuqing Geng, Zhiyong Xu:
Fast Variable-Grained Resemblance Data Deduplication For Cloud Storage. NAS 2021: 1-8 - [i1]Xuming Ye, Xiaoye Xue, Wenlong Tian, Zhiyong Xu, Weijun Xiao, Ruixuan Li:
Chunk Content is not Enough: Chunk-Context Aware Resemblance Detection for Deduplication Delta Compression. CoRR abs/2106.01273 (2021) - 2020
- [j4]Huikang Cao, Ruixuan Li, Wenlong Tian, Zhiyong Xu, Weijun Xiao:
Blockchain-based accountability for multi-party oblivious RAM. J. Parallel Distributed Comput. 137: 224-237 (2020) - [j3]Dongdong Yue, Ruixuan Li, Yan Zhang, Wenlong Tian, Yongfeng Huang:
Blockchain-based verification framework for data integrity in edge-cloud storage. J. Parallel Distributed Comput. 146: 1-14 (2020)
2010 – 2019
- 2018
- [c4]Wenlong Tian, Ruixuan Li, Weijun Xiao, Zhiyong Xu:
PTS-Dep: A High-Performance Two-Party Secure Deduplication for Cloud Storage. HPCC/SmartCity/DSS 2018: 700-707 - [c3]Dongdong Yue, Ruixuan Li, Yan Zhang, Wenlong Tian, Chengyi Peng:
Blockchain Based Data Integrity Verification in P2P Cloud Storage. ICPADS 2018: 561-568 - [c2]Huikang Cao, Ruixuan Li, Wenlong Tian, Zhiyong Xu, Weijun Xiao:
A Practical Accountability Scheme for Oblivious RAM in Cloud Storage. TrustCom/BigDataSE 2018: 397-402 - 2017
- [j2]Wenlong Tian, Zhaoyong Mao, Fuliang Zhao, Zhicao Zhao:
Layout Optimization of Two Autonomous Underwater Vehicles for Drag Reduction with a Combined CFD and Neural Network Method. Complex. 2017: 5769794:1-5769794:15 (2017) - [c1]Wenlong Tian, Ruixuan Li, Zhiyong Xu, Weijun Xiao:
Does the content defined chunking really solve the local boundary shift problem? IPCCC 2017: 1-8 - 2016
- [j1]Shuoyi Zhao, Ruixuan Li, Wenlong Tian, Weijun Xiao, Xinhua Dong, Dongjie Liao, Samee U. Khan, Keqin Li:
Divide-and-conquer approach for solving singular value decomposition based on MapReduce. Concurr. Comput. Pract. Exp. 28(2): 331-350 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 21:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint