Guojun Wang
Guojun Wang
Guangzhou University, China
Verified email at gzhu.edu.cn - Homepage
TitleCited byYear
Hierarchical attribute-based encryption for fine-grained access control in cloud storage services
G Wang, Q Liu, J Wu
Proceedings of the 17th ACM conference on Computer and communications …, 2010
7802010
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
G Wang, Q Liu, J Wu, M Guo
computers & security 30 (5), 320-331, 2011
2342011
Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
Q Liu, G Wang, J Wu
Information sciences 258, 355-370, 2014
2002014
Deploying wireless sensor networks with fault-tolerance for structural health monitoring
MZA Bhuiyan, G Wang, J Cao, J Wu
IEEE Transactions on Computers 64 (2), 382-395, 2013
1662013
Energy-efficient resource allocation for D2D communications underlaying cloud-RAN-based LTE-A networks
Z Zhou, M Dong, K Ota, G Wang, LT Yang
IEEE Internet of Things Journal 3 (3), 428-438, 2015
1542015
Dependable structural health monitoring using wireless sensor networks
MZA Bhuiyan, G Wang, J Wu, J Cao, X Liu, T Wang
IEEE Transactions on Dependable and Secure Computing 14 (4), 363-376, 2015
1502015
An efficient privacy preserving keyword search scheme in cloud computing
Q Liu, G Wang, J Wu
2009 International Conference on Computational Science and Engineering 2 …, 2009
1432009
Secure and privacy preserving keyword searching for cloud storage services
Q Liu, G Wang, J Wu
Journal of network and computer applications 35 (3), 927-933, 2012
1412012
Springer International Publishing: Cham
AF Frangi, JA Schnabel, C Davatzikos, C Alberola-López, G Fichtinger
Switerland, 2018
138*2018
Adaptive location updates for mobile sinks in wireless sensor networks
G Wang, T Wang, W Jia, M Guo, J Li
The Journal of Supercomputing 47 (2), 127-145, 2009
1172009
Generating trusted graphs for trust evaluation in online social networks
W Jiang, G Wang, J Wu
Future generation computer systems 31, 48-58, 2014
1162014
Local area prediction-based mobile target tracking in wireless sensor networks
MZA Bhuiyan, G Wang, AV Vasilakos
IEEE Transactions on Computers 64 (7), 1968-1982, 2014
1092014
Understanding graph-based trust evaluation in online social networks: Methodologies and challenges
W Jiang, G Wang, MZA Bhuiyan, J Wu
ACM Computing Surveys (CSUR) 49 (1), 10, 2016
1012016
Collaborative trajectory privacy preserving scheme in location-based services
T Peng, Q Liu, D Meng, G Wang
Information Sciences 387, 165-179, 2017
912017
Rare: An energy-efficient target tracking protocol for wireless sensor networks
E Olule, G Wang, M Guo, M Dong
2007 International Conference on Parallel Processing Workshops (ICPPW 2007 …, 2007
892007
Detecting movements of a target using face tracking in wireless sensor networks
G Wang, MZA Bhuiyan, J Cao, J Wu
IEEE Transactions on Parallel and Distributed Systems 25 (4), 939-949, 2013
822013
Local update-based routing protocol in wireless sensor networks with mobile sinks
G Wang, T Wang, W Jia, M Guo, HH Chen, M Guizani
2007 IEEE International Conference on Communications, 3094-3099, 2007
822007
Hole avoiding in advance routing in wireless sensor networks
W Jia, T Wang, G Wang, M Guo
2007 IEEE Wireless Communications and Networking Conference, 3519-3523, 2007
752007
Multi-dimensional evidence-based trust management with multi-trusted paths
G Wang, J Wu
Future Generation Computer Systems 27 (5), 529-538, 2011
712011
Preserving privacy with probabilistic indistinguishability in weighted social networks
Q Liu, G Wang, F Li, S Yang, J Wu
IEEE Transactions on Parallel and Distributed Systems 28 (5), 1417-1429, 2016
632016
The system can't perform the operation now. Try again later.
Articles 1–20