


default search action
Wenlong Shen
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j11]Wenlong Shen, Yu Cheng
, Bo Yin
, Jin Du, Xianghui Cao
:
Diffie-Hellman in the Air: A Link Layer Approach for In-Band Wireless Pairing. IEEE Trans. Veh. Technol. 70(11): 11894-11907 (2021) - [c10]Jun Guo, Wenlong Shen, Lichun Zhang:
Design and Experiment of a New Bionic Serrated Rotary Tillage Blade. AIAM (ACM) 2021: 498-503 - 2020
- [j10]Bo Yin
, Wenlong Shen, Xianghui Cao
, Yu Cheng
, Qing Li:
Securely Solving Linear Algebraic Equations in a Distributed Framework Enhanced With Communication-Efficient Algorithms. IEEE Trans. Netw. Sci. Eng. 7(3): 1027-1042 (2020)
2010 – 2019
- 2019
- [j9]Kecheng Liu, Wenlong Shen, Yu Cheng
, Lin X. Cai
, Qing Li, Sheng Zhou
, Zhisheng Niu
:
Security Analysis of Mobile Device-to-Device Network Applications. IEEE Internet Things J. 6(2): 2922-2932 (2019) - [j8]Wenlong Shen, Bo Yin
, Xianghui Cao
, Yu Cheng
, Xuemin Shen
:
A Distributed Secure Outsourcing Scheme for Solving Linear Algebraic Equations in Ad Hoc Clouds. IEEE Trans. Cloud Comput. 7(2): 415-430 (2019) - [c9]Shuai Zhang, Wenlong Shen, Max Zhangt, Xianghui Cao, Yu Cheng
:
Experience-Driven Wireless D2D Network Link Scheduling: A Deep Learning Approach. ICC 2019: 1-6 - [i3]Wenlong Shen, Yu Cheng, Bo Yin, Kecheng Liu, Xianghui Cao:
Diffie-Hellman in the Air: A Link Layer Approach for In-Band Wireless Pairing. CoRR abs/1901.09520 (2019) - 2017
- [j7]Xianghui Cao
, Lu Liu, Wenlong Shen, Aurobinda Laha, Jin Tang, Yu Cheng
:
Real-Time Misbehavior Detection and Mitigation in Cyber-Physical Systems Over WLANs. IEEE Trans. Ind. Informatics 13(1): 186-197 (2017) - [j6]Devu Manikantan Shila, Wenlong Shen, Yu Cheng
, Xiaohua Tian, Xuemin Sherman Shen
:
AMCloud: Toward a Secure Autonomic Mobile Ad Hoc Cloud Computing System. IEEE Wirel. Commun. 24(2): 74-81 (2017) - [c8]Wenlong Shen, Bo Yin, Yu Cheng
, Xianghui Cao
, Qing Li:
Privacy-preserving mobile crowd sensing for big data applications. ICC 2017: 1-6 - [c7]Bo Yin, Wenlong Shen, Yu Cheng
, Lin X. Cai, Qing Li:
Distributed resource sharing in fog-assisted big data streaming. ICC 2017: 1-6 - 2016
- [j5]Wenlong Shen, Bo Yin, Lu Liu, Xianghui Cao
, Yu Cheng
, Qing Li, Wenjing Wang:
Secure In-Band Bootstrapping for Wireless Personal Area Networks. IEEE Internet Things J. 3(6): 1385-1394 (2016) - [j4]Wenlong Shen, Bo Yin, Xianghui Cao
, Lin X. Cai
, Yu Cheng
:
Secure device-to-device communications over WiFi direct. IEEE Netw. 30(5): 4-9 (2016) - [j3]Xianghui Cao
, Lu Liu, Wenlong Shen, Yu Cheng
:
Distributed Scheduling and Delay-Aware Routing in Multihop MR-MC Wireless Networks. IEEE Trans. Veh. Technol. 65(8): 6330-6342 (2016) - [c6]Kecheng Liu, Wenlong Shen, Bo Yin, Xianghui Cao
, Lin X. Cai
, Yu Cheng
:
Development of Mobile Ad-hoc Networks over Wi-Fi Direct with off-the-shelf Android phones. ICC 2016: 1-6 - [c5]Lu Liu, Xianghui Cao
, Wenlong Shen, Yu Cheng
, Lin X. Cai:
DAFEE: A Decomposed Approach for energy efficient networking in multi-radio multi-channel wireless networks. INFOCOM 2016: 1-9 - 2015
- [j2]Wenlong Shen, Dong Wang
, Bingyu Ye, Minglei Shi
, Lei Ma
, Yan Zhang, Zhihu Zhao:
GC3-biased gene domains in mammalian genomes. Bioinform. 31(19): 3081-3084 (2015) - [c4]Aurobinda Laha, Xianghui Cao
, Wenlong Shen, Xiaohua Tian, Yu Cheng
:
An energy efficient routing protocol for device-to-device based multihop smartphone networks. ICC 2015: 5448-5453 - [c3]Bo Yin, Wenlong Shen, Lin X. Cai, Yu Cheng
:
A Mobile Cloud Computing Middleware for Low Latency Offloading of Big Data. Mobidata@MobiHoc 2015: 31-35 - 2014
- [c2]Wenlong Shen, Weisheng Hong, Xianghui Cao
, Bo Yin, Devu Manikantan Shila, Yu Cheng
:
Secure key establishment for Device-to-Device communications. GLOBECOM 2014: 336-340 - [c1]Xianghui Cao
, Lu Liu, Wenlong Shen, Jin Tang, Yu Cheng
:
Real-time misbehavior detection in IEEE 802.11e based WLANs. GLOBECOM 2014: 631-636 - [i2]Xianghui Cao, Lu Liu, Wenlong Shen, Jin Tang, Yu Cheng:
Real-Time Misbehavior Detection in IEEE 802.11e Based WLANs. CoRR abs/1409.3960 (2014) - [i1]Wenlong Shen, Weisheng Hong, Xianghui Cao, Bo Yin, Devu Manikantan Shila, Yu Cheng:
Secure Key Establishment for Device-to-Device Communications. CoRR abs/1410.2620 (2014) - 2013
- [j1]Wenlong Shen, Lu Liu, Xianghui Cao
, Yong Hao, Yu Cheng
:
Cooperative Message Authentication in Vehicular Cyber-Physical Systems. IEEE Trans. Emerg. Top. Comput. 1(1): 84-97 (2013)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint