Name
Affiliation
Papers
LIANGMIN WANG
Jiangsu Univ, Dept Internet Things Engn, Zhenjiang 212013, Peoples R China
21
Collaborators
Citations 
PageRank 
35
159
10.11
Referers 
Referees 
References 
554
862
317
Search Limit
100862
Title
Citations
PageRank
Year
Covert Communications in D2D Underlaying Cellular Networks With Antenna Array Assisted Artificial Noise Transmission40.392020
A Robust Security Architecture for SDN-Based 5G Networks.20.362019
A Secure Data Forwarding Scheme in Vehicular Named Data Networking.00.342018
S2PD: A Selective Sharing Scheme for Privacy Data in Vehicular Social Networks.10.352018
An Energy-Aware Spatial Index Tree for Multi-Region Attribute Query Aggregation Processing in Wireless Sensor Networks.20.372017
A Cloud-Based Trust Management Framework for Vehicular Social Networks.40.412017
Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks.00.342017
An Efficient and Secure Authentication Scheme for In-vehicle Networks in Connected Vehicle.00.342017
Exploring Fog Computing-Based Adaptive Vehicular Data Scheduling Policies Through a Compositional Formal Method—PEPA130.522017
Secrecy Capacity Analysis of Artificial Noisy MIMO Channels - An Approach Based on Ordered Eigenvalues of Wishart Matrices.30.382017
Trust Mechanism Based AODV Routing Protocol for Forward Node Authentication in Mobile Ad Hoc Network.00.342017
Cooperative Query Answer Authentication Scheme Over Anonymous Sensing Data.00.342017
Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges411.072017
Non-repudiable Query Answer Authentication Scheme over Anonymous Cloud Data00.342016
ECDS: Efficient collaborative downloading scheme for popular content distribution in urban vehicular networks.80.512016
An Efficient Anonymous Batch Authentication Scheme Based on HMAC for VANETs.330.892016
Patient Flow Scheduling and Capacity Planning in a Smart Hospital Environment.50.542016
Composable Secure Roaming Authentication Protocol for Cloud-assisted Body Sensor Networks.50.462016
Message Authentication Using Proxy Vehicles in Vehicular Ad Hoc Networks260.852015
Fault-tolerant topology evolution and analysis of sensing systems in IoT based on complex networks40.462015
Secure Data Aggregation with Fully Homomorphic Encryption in Large-Scale Wireless Sensor Networks80.522015