“Smart” Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors I Chiuchisan, O Geman, V Balas, G Wang, M Arif, H Elahi, P Tao Soft Computing Applications: Proceedings of the 8th International Workshop …, 2021 | | 2021 |
: Enabling Verifiable Range-Aggregate Queries in Multi-Source Environments Q Liu, Y Peng, Q Xu, H Jiang, J Wu, T Wang, T Peng, G Wang, S Zhang IEEE Transactions on Dependable and Secure Computing, 2023 | 5 | 2023 |
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and … G Wang, Q Han, MZA Bhuiyan, X Ma, F Loulergue, P Li, M Roveri, L Chen | | |
2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications J Hu, G Min, G Wang, N Georgalas | | 2023 |
9 İD Tao Peng, and Jianer Chen School of Computer Science, Guangzhou University, Guangzhou 510006, People's Republic of China haroon. elahi@ e. gzhu. edu. cn,{csgjwang, jianer … H Elahi, G Wang Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th …, 2019 | | 2019 |
使用多层体系结构设计与开发酒店预计系统 F Abduljwad, W Guo-Jun 吉首大学学报 (自然科学版) 26 (1), 22, 2005 | | 2005 |
云存储中基于属性加密的通用型属性撤销系统 G Chen, Z Xu, J Zhang, G Wang, H Jiang, M Huang, AG Chen, AZ Xu, ... Frontiers 20 (6), 773-786, 2019 | | 2019 |
云存储中基于属性加密的通用型属性撤销系统 (英文) G CHEN, Z XU, J ZHANG, G WANG, H JIANG, M HUANG Frontiers 6, 2019 | | 2019 |
云计算环境下有效地查询分组策略 Q Liu, Y Guo, J Wu, G Wang 计算机科学技术学报 32 (6), 1231-1249, 2017 | | 2017 |
A blockchain-based decentralized data storage and access framework for pinger S Ali, G Wang, B White, RL Cottrell 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 127 | 2018 |
A blockchain-based nonrepudiation network computing service scheme for industrial IoT Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019 | 240 | 2019 |
A blockchain-enabled deduplicatable data auditing mechanism for network storage services Y Xu, C Zhang, G Wang, Z Qin, Q Zeng IEEE Transactions on Emerging Topics in Computing 9 (3), 1421-1432, 2020 | 153 | 2020 |
A blockchain‐based mobile crowdsensing scheme with enhanced privacy T Peng, K Guan, J Liu, J Chen, G Wang, J Zhu Concurrency and Computation: Practice and Experience 35 (19), e6664, 2023 | 11 | 2023 |
A body simulator with delayed health state transition Y Dai, X Liu, G Wang 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018 | 1 | 2018 |
A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services S Zhang, X Li, Z Tan, T Peng, G Wang Future Generation Computer Systems 94, 40-50, 2019 | 188 | 2019 |
A caching-based privacy-preserving scheme for continuous location-based services S Zhang, Q Liu, G Wang Security, Privacy and Anonymity in Computation, Communication and Storage …, 2016 | 5 | 2016 |
A channel-aware expected energy consumption minimization strategy in wireless networks G Wang, Q Zhao, T Xie, G Wang Soft Computing 23, 6051-6063, 2019 | 3 | 2019 |
A cleanroom monitoring system for network computing service based on remote attestation L Zhou, X Liu, Q Liu, G Wang 2016 IEEE Trustcom/BigDataSE/ISPA, 451-457, 2016 | 5 | 2016 |
A closed-loop healthcare processing approach based on deep reinforcement learning Y Dai, G Wang, K Muhammad, S Liu Multimedia Tools and Applications 81 (3), 3107-3129, 2022 | 13 | 2022 |
A clustering-based improved Grey-Markov target tracking algorithm in wireless sensor networks S Guo, J Zheng, N Xiong, G Wang International Journal of Computational Science and Engineering 12 (4), 287-297, 2016 | 10 | 2016 |