Follow
Mi Wen (温蜜)
Mi Wen (温蜜)
Shanghai University of Electric Power, China
Verified email at shiep.edu.cn
Title
Cited by
Cited by
Year
Energy theft detection with energy privacy preservation in the smart grid
D Yao, M Wen, X Liang, Z Fu, K Zhang, B Yang
IEEE Internet of Things Journal 6 (5), 7659-7669, 2019
1872019
A game theoretic approach to parked vehicle assisted content delivery in vehicular ad hoc networks
Z Su, Q Xu, Y Hui, M Wen, S Guo
IEEE Transactions on Vehicular Technology 66 (7), 6461-6474, 2016
1442016
Efficient and privacy-preserving truth discovery in mobile crowd sensing systems
G Xu, H Li, S Liu, M Wen, R Lu
IEEE Transactions on Vehicular Technology 68 (4), 3854-3865, 2019
1212019
Group-based authentication and key agreement with dynamic policy updating for MTC in LTE-A networks
J Li, M Wen, T Zhang
IEEE Internet of Things Journal 3 (3), 408-417, 2015
1202015
PTAS: Privacy-preserving thin-client authentication scheme in blockchain-based PKI
W Jiang, H Li, G Xu, M Wen, G Dong, X Lin
Future Generation Computer Systems 96, 185-195, 2019
1072019
PaRQ: A privacy-preserving range query scheme over encrypted metering data for smart grid
M Wen, R Lu, K Zhang, J Lei, X Liang, X Shen
IEEE Transactions on Emerging Topics in Computing 1 (1), 178-191, 2013
952013
Mesoporous single-crystal-like TiO2 mesocages threaded with carbon nanotubes for high-performance electrochemical energy storage
Y Peng, Z Le, M Wen, D Zhang, Z Chen, HB Wu, H Li, Y Lu
Nano Energy 35, 44-51, 2017
792017
Feddetect: A novel privacy-preserving federated learning framework for energy theft detection in smart grid
M Wen, R Xie, K Lu, L Wang, K Zhang
IEEE Internet of Things Journal 9 (8), 6069-6080, 2021
762021
Steganalysis over large-scale social networks with high-order joint features and clustering ensembles
F Li, K Wu, J Lei, M Wen, Z Bi, C Gu
IEEE Transactions on Information Forensics and Security 11 (2), 344-357, 2015
612015
SESA: An efficient searchable encryption scheme for auction in emerging smart grid marketing
M Wen, R Lu, J Lei, H Li, X Liang, X Shen
Security and Communication Networks 7 (1), 234-244, 2014
602014
TDOA-based Sybil attack detection scheme for wireless sensor networks
M Wen, H Li, YF Zheng, KF Chen
Journal of Shanghai University (English Edition) 12 (1), 66-70, 2008
572008
Secure data deduplication with reliable key management for dynamic updates in CPSS
M Wen, K Ota, H Li, J Lei, C Gu, Z Su
IEEE transactions on computational social systems 2 (4), 137-147, 2015
462015
Robust batch steganography in social networks with non-uniform payload and data decomposition
F Li, K Wu, X Zhang, J Yu, J Lei, M Wen
IEEE Access 6, 29912-29925, 2018
352018
Tectonic evolution of the Meso‐Tethys in the western segment of Bangonghu‐Nujiang suture zone: Insights from geochemistry and geochronology of the Lagkor Tso ophiolite
Y Yajuan, Y Zhengxin, L Weiliang, H Qiangtai, LI Jianfeng, L Hongfei, ...
Acta Geologica Sinica‐English Edition 89 (2), 369-388, 2015
342015
A key management protocol with robust continuity for sensor networks
M Wen, YF Zheng, W Ye, KF Chen, WD Qiu
Computer Standards & Interfaces 31 (4), 642-647, 2009
322009
Multi-client sub-linear boolean keyword searching for encrypted cloud storage with owner-enforced authorization
K Zhang, M Wen, R Lu, K Chen
IEEE Transactions on Dependable and Secure Computing 18 (6), 2875-2887, 2020
302020
HYBRID-CNN: An efficient scheme for abnormal flow detection in the SDN-Based Smart Grid
P Ding, J Li, L Wang, M Wen, Y Guan
Security and communication networks 2020, 1-20, 2020
292020
0-1 规划问题的 DNA 计算
殷志祥, 张凤月, 许进
电子与信息学报 25 (1), 62-66, 2003
282003
Bio-inspired computing: theories and applications
Z Yin, L Pan, X Fang
Proceedings of the 14th International Conference, BIC-TA 2019, 2019
262019
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication
M Wen, K Lu, J Lei, F Li, J Li
2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2015
252015
The system can't perform the operation now. Try again later.
Articles 1–20