Guojun Wang
#173,624
Most Influential Person Now
Guojun Wang's AcademicInfluence.com Rankings
Guojun Wangcomputer-science Degrees
Computer Science
#10704
World Rank
#11256
Historical Rank
Big Data
#25
World Rank
#25
Historical Rank
Algorithms
#439
World Rank
#445
Historical Rank
Machine Learning
#4881
World Rank
#4938
Historical Rank

Download Badge
Computer Science
Guojun Wang's Degrees
- PhD Computer Science Stanford University
Similar Degrees You Can Earn
Why Is Guojun Wang Influential?
(Suggest an Edit or Addition)Guojun Wang's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A Survey on Deep Learning in Big Data (2017) (372)
- Energy-Efficient Resource Allocation for D2D Communications Underlaying Cloud-RAN-Based LTE-A Networks (2016) (228)
- Dependable Structural Health Monitoring Using Wireless Sensor Networks (2015) (197)
- Understanding Graph-Based Trust Evaluation in Online Social Networks (2016) (172)
- PrivacyProtector: Privacy-Protected Patient Data Collection in IoT-Based Healthcare Systems (2018) (168)
- A Blockchain-Based Nonrepudiation Network Computing Service Scheme for Industrial IoT (2019) (146)
- Fog-Based Computing and Storage Offloading for Data Synchronization in IoT (2019) (130)
- Preserving Privacy with Probabilistic Indistinguishability in Weighted Social Networks (2017) (122)
- A survey on security attacks in VANETs: Communication, applications and challenges (2019) (115)
- OBPP: An ontology-based framework for privacy-preserving in IoT-based smart city (2021) (112)
- Big Data Reduction for a Smart City’s Critical Infrastructural Health Monitoring (2018) (112)
- Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges (2017) (91)
- A Secure and Fast Image Encryption Scheme Based on Double Chaotic S-Boxes (2019) (81)
- Enabling Verifiable and Dynamic Ranked Search over Outsourced Data (2019) (80)
- Sensing and Decision Making in Cyber-Physical Systems: The Case of Structural Event Monitoring (2016) (78)
- A Blockchain-Enabled Deduplicatable Data Auditing Mechanism for Network Storage Services (2021) (77)
- A Three-Layer Privacy Preserving Cloud Storage Scheme Based on Computational Intelligence in Fog Computing (2018) (72)
- Achieving reliable and secure services in cloud computing environments (2017) (70)
- Cryptanalysis and Improvement on an Image Encryption Algorithm Design Using a Novel Chaos Based S-Box (2018) (68)
- Preserving Balance Between Privacy and Data Integrity in Edge-Assisted Internet of Things (2020) (68)
- Sustainable and Efficient Data Collection from WSNs to Cloud (2019) (67)
- Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system (2018) (67)
- Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things (2018) (64)
- Towards Secure Network Computing Services for Lightweight Clients Using Blockchain (2018) (64)
- e-Sampling (2017) (63)
- Blockchain-Enabled Accountability Mechanism Against Information Leakage in Vertical Industry Services (2020) (62)
- Fast curvelet transform through genetic algorithm for multimodal medical image fusion (2020) (61)
- A Trajectory Privacy-Preserving Scheme Based on Dual-K Mechanism for Continuous Location-Based Services (2017) (60)
- Improved Cryptanalysis and Enhancements of an Image Encryption Scheme Using Combined 1D Chaotic Maps (2018) (58)
- An efficient privacy‐enhanced attribute‐based access control mechanism (2020) (56)
- Hypergraph partitioning for social networks based on information entropy modularity (2017) (54)
- A Novel S-Box Design Algorithm Based on a New Compound Chaotic System (2019) (53)
- A Blockchain-Based Decentralized Data Storage and Access Framework for PingER (2018) (52)
- A Dual Privacy Preserving Scheme in Continuous Location-Based Services (2018) (51)
- Blockchain and Big Data to Transform the Healthcare (2018) (48)
- An adaptive and configurable protection framework against android privilege escalation threats (2019) (45)
- An Immunization Framework for Social Networks Through Big Data Based Influence Modeling (2019) (42)
- Maximizing positive influence spread in online social networks via fluid dynamics (2017) (41)
- Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts (2018) (41)
- Quality-Guaranteed Event-Sensitive Data Collection and Monitoring in Vibration Sensor Networks (2017) (39)
- A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking (2019) (39)
- Resource Management in a Peer to Peer Cloud Network for IoT (2020) (37)
- Feature Selection and Intrusion Detection in Cloud Environment Based on Machine Learning Algorithms (2017) (36)
- Security and Privacy in the Age of the Smart Internet of Things: An Overview from a Networking Perspective (2018) (33)
- SDN-Based Secure VANETs Communication with Fog Computing (2018) (31)
- SDN-based VANETs, Security Attacks, Applications, and Challenges (2020) (31)
- A Novel Verifiable and Dynamic Fuzzy Keyword Search Scheme over Encrypted Data in Cloud Computing (2016) (28)
- Security and Attack Vector Analysis of IoT Devices (2017) (27)
- PRMS: A Personalized Mobile Search Over Encrypted Outsourced Data (2018) (27)
- Analyzing Tongue Images Using a Conceptual Alignment Deep Autoencoder (2018) (27)
- Conceptual alignment deep neural networks (2018) (26)
- Prime Inner Product Encoding for Effective Wildcard-Based Multi-Keyword Fuzzy Search (2020) (26)
- Power Curtailment in Cloud Environment Utilising Load Balancing Machine Allocation (2018) (25)
- Secure Multi-keyword Fuzzy Searches With Enhanced Service Quality in Cloud Computing (2021) (25)
- Deep Learning with Non-parametric Regression Model for Traffic Flow Prediction (2018) (24)
- Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2I (2018) (24)
- SDN based communications privacy-preserving architecture for VANETs using fog computing (2020) (23)
- Combing Fuzzy Clustering and PSO Algorithms to Optimize Energy Consumption in WSN Networks (2018) (22)
- Efficient Data Collection in Sensor-Cloud System with Multiple Mobile Sinks (2016) (20)
- Directional and Explainable Serendipity Recommendation (2020) (20)
- IoT-SDNPP: A Method for Privacy-Preserving in Smart City with Software Defined Networking (2018) (18)
- Security, Privacy, and Anonymity in Computation, Communication, and Storage (2019) (18)
- Personalized Review Recommendation based on Users’ Aspect Sentiment (2020) (18)
- DABKS: Dynamic attribute-based keyword search in cloud computing (2017) (18)
- Content-Centric Event-Insensitive Big Data Reduction in Internet of Things (2017) (17)
- Event Detection Through Differential Pattern Mining in Cyber-Physical Systems (2020) (15)
- Temporal Topic-Based Multi-Dimensional Social Influence Evaluation in Online Social Networks (2017) (15)
- MAPP: A Modular Arithmetic Algorithm for Privacy Preserving in IoT (2017) (15)
- Enabling Cooperative Privacy-preserving Personalized search in cloud environments (2019) (15)
- A Feasible Fuzzy-Extended Attribute-Based Access Control Technique (2018) (15)
- Towards Cyber-Physical Systems Design for Structural Health Monitoring (2017) (15)
- A human-centered artificial intelligence approach for privacy protection of elderly App users in smart cities (2021) (15)
- Acoustic sensor networks in the Internet of Things applications (2018) (14)
- HAES: A New Hybrid Approach for Movie Recommendation with Elastic Serendipity (2019) (14)
- Performance Evaluation of Hypervisors and the Effect of Virtual CPU on Performance (2018) (13)
- Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect Level (2021) (13)
- Intelligent fusion of information derived from received signal strength and inertial measurements for indoor wireless localization (2016) (12)
- Preface: Security and privacy in big data clouds (2017) (12)
- A Multilevel Access Control Scheme for Data Security in Transparent Computing (2017) (12)
- Managing Heterogeneous Substrate Resources by Mapping and Visualization Based on Software-Defined Network (2018) (12)
- Smartphone Bloatware: An Overlooked Privacy Problem (2017) (11)
- Cssp: The Consortium Blockchain Model for Improving the Trustworthiness of Network Software Services (2017) (11)
- Optimization of communication in VANETs using fuzzy logic and artificial Bee colony (2020) (11)
- Secured Data Collection for a Cloud-Enabled Structural Health Monitoring System (2016) (10)
- Enhancing Location Privacy through User-Defined Grid in Location-Based Services (2016) (10)
- Band Segmentation and Detection of DNA by Using Fast Fuzzy C-mean and Neuro Adaptive Fuzzy Inference System (2019) (10)
- Aspect Based Sentiment Analysis of Ridesharing Platform Reviews for Kansei Engineering (2020) (10)
- Secure and Efficient Multi-Attribute Range Queries based on Comparable Inner Product Encoding (2018) (9)
- A multimodal deep architecture for traditional Chinese medicine diagnosis (2020) (9)
- Aggregating Author Profiles from Multiple Publisher Networks to Build a List of Potential Collaborators (2018) (8)
- A Privacy-Preserving Attribute-Based Access Control Scheme (2018) (8)
- Privacy preserving and data publication for vehicular trajectories with differential privacy (2020) (8)
- Securing Smart Offices Through an Intelligent and Multi-device Continuous Authentication System (2019) (8)
- Influence maximization by leveraging the crowdsensing data in information diffusion network (2019) (8)
- Wi-Fi Signal Coverage Distance Estimation in Collapsed Structures (2017) (8)
- Maximizing the Spread of Positive Influence Under LT-MLA Model (2016) (8)
- Optimal Execution Strategy for Large Orders in Big Data: Order Type using Q-learning Considerations (2020) (8)
- Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study (2017) (8)
- A High Throughput MAC Protocol for Wireless Body Area Networks in Intensive Care (2019) (8)
- Privacy-Protected Data Collection in Wireless Medical Sensor Networks (2017) (7)
- AI and Its Risks in Android Smartphones: A Case of Google Smart Assistant (2019) (7)
- Cloud-Based Service Oriented Architecture for Social Vehicular Ad-hoc Network Communications (2020) (7)
- A Scalable Feature Selection and Opinion Miner Using Whale Optimization Algorithm (2019) (7)
- Automatically Semantic Annotation of Network Document Based on Domain Knowledge Graph (2017) (7)
- Nighthawk: Transparent System Introspection from Ring -3 (2019) (7)
- Mal-Warehouse: A Data Collection-as-a-Service of Mobile Malware Behavioral Patterns (2018) (6)
- Personalised context-aware re-ranking in recommender system (2021) (6)
- FABAC: A Flexible Fuzzy Attribute-Based Access Control Mechanism (2017) (6)
- NMHP: A Privacy Preserving Profile Matching Protocol in Multi-hop Proximity Mobile Social Networks (2015) (6)
- Pleasure or pain? An evaluation of the costs and utilities of bloatware applications in android smartphones (2020) (6)
- KShot: Live Kernel Patching with SMM and SGX (2020) (6)
- Exploring Body Constitution in Traditional Chinese Medicine with K-Means Clustering (2016) (6)
- Medical Image Segmentation by Combining Adaptive Artificial Bee Colony and Wavelet Packet Decomposition (2019) (6)
- A Malware Detection Approach Using Malware Images and Autoencoders (2020) (6)
- A Service Oriented Healthcare Architecture (SOHA-CC) Based on Cloud Computing (2018) (6)
- Wi-Fi Halow Signal Coverage Estimation in Collapsed Structures (2018) (5)
- Detecting Anomalies from End-to-End Internet Performance Measurements (PingER) Using Cluster Based Local Outlier Factor (2017) (5)
- Re‐ranking with multiple objective optimization in recommender system (2021) (5)
- Dependable Structural Helath Monitoring Using Wireless Sensor Networks (2015) (5)
- Service Composition and Optimal Selection in Cloud Manufacturing: State-of-the-Art and Research Challenges (2020) (5)
- Attribute-Based Traceable Anonymous Proxy Signature Strategy for Mobile Healthcare (2016) (5)
- Achieving Secure and Effective Search Services in Cloud Computing (2018) (5)
- A Method for Privacy-Preserving in IoT-SDN Integration Environment (2018) (5)
- Towards Wi-Fi Radar in Collapsed Structures (2018) (5)
- Protected Bidding Against Compromised Information Injection in IoT-Based Smart Grid (2018) (5)
- Integration of 5G, VANETs and Blockchain Technology (2020) (5)
- Privacy Preserving Scheme for Location and Content Protection in Location-Based Services (2016) (5)
- Authentication of Skyline Query over Road Networks (2018) (4)
- Libra Critique Towards Global Decentralized Financial System (2019) (4)
- Research on Internet of Vehicles' Privacy Protection Based on Tamper-Proof with Ciphertext (2017) (4)
- A Fog-Based Hierarchical Trust Mechanism for Sensor-Cloud Underlying Structure (2017) (4)
- Backup Sensor Placement with Guaranteed Fault Tolerance for Structural Health Monitoring (2012) (4)
- Guest Editorial: Trustworthiness in Industrial Internet of Things Systems and Applications (2020) (4)
- A Privacy-Preserving Hybrid Cooperative Searching Scheme over Outsourced Cloud Data (2016) (4)
- Incremental Group-Level Popularity Prediction in Online Social Networks (2021) (4)
- Attribute-Based Encryption with Personalized Search (2017) (4)
- A Cleanroom Monitoring System for Network Computing Service Based on Remote Attestation (2016) (4)
- Authentication of Multi-Dimensional Top-$K$ Query on Untrusted Server (2018) (4)
- Who Should Be My Co-Author? Recommender System to Suggest a List of Collaborators (2017) (4)
- A User-Defined Location-Sharing Scheme with Efficiency and Privacy in Mobile Social Networks (2020) (3)
- A Lightweight Privacy Aware Friend Locator in Mobile Social Networks (2017) (3)
- A Consortium Blockchain-Based Model for Data Sharing in Internet of Vehicles (2019) (3)
- A Privacy Preserving Friend Discovery Strategy Using Proxy Re-encryption in Mobile Social Networks (2016) (3)
- Improving the Efficiency of Customer's Credit Rating with Machine Learning in Big Data Cloud Computing (2021) (3)
- A Light-Weight Framework for Pre-submission Vetting of Android Applications in App Stores (2019) (3)
- Fuzzy and Semantic Search over Encrypted Data in the Cloud (2016) (3)
- Segmentation of Sales for a Mobile Phone Service Through CART Classification Tree Algorithm (2019) (3)
- Secure fine-grained friend-making scheme based on hierarchical management in mobile social networks (2021) (3)
- Efficient Authentication of Multi-Dimensional Top- $k$ Queries (2019) (3)
- Smart world systems, applications, and technologies (2020) (3)
- Using asynchronous collaborative attestation to build a trusted computing environment for mobile applications (2017) (3)
- Trustworthy Data Collection for Cyber Systems: A Taxonomy and Future Directions (2019) (3)
- Security, Privacy, and Anonymity in Computation, Communication, and Storage (2019) (3)
- Resource-Efficient Vibration Data Collection in Cyber-Physical Systems (2015) (3)
- Internet Performance Analysis of South Asian Countries Using End-to-End Internet Performance Measurements (2017) (3)
- Building Bayesian Inference Graphs for Healthcare Statistic Evidence (2016) (3)
- Toward Wi-Fi Halow Signal Coverage Modeling in Collapsed Structures (2020) (3)
- Towards In-Network Generalized Trustworthy Data Collection for Trustworthy Cyber-Physical Systems (2019) (3)
- Towards Profit Optimization During Online Participant Selection in Compressive Mobile Crowdsensing (2019) (3)
- A Participatory Privacy Protection Framework for Smart-Phone Application Default Settings (2018) (2)
- A Body Simulator with Delayed Health State Transition (2018) (2)
- Semi-Disentangled Representation Learning in Recommendation System (2020) (2)
- RAitc: Securely Auditing the Remotely Executed Applications (2020) (2)
- Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors (2018) (2)
- Epidemiologic Evolution Platform Using Integrated Modeling and Geographic Information System (2021) (2)
- Exploring user topic influence for group recommendation on learning resources (2017) (2)
- Building deep architectures for traditional chinese medicine diagnosis (2017) (2)
- A Software Detection Mechanism Based on SMM in Network Computing (2016) (2)
- Unbalanced Multistage Heat Conduction and Mass Diffusion Algorithm in an Educational Digital Library (2019) (2)
- An Adaptive Android Security Extension against Privilege Escalation Attacks (2017) (2)
- Efficient personalized search over encrypted data for mobile edge-assisted cloud storage (2021) (2)
- Cyberspace Security for Future Internet (2018) (2)
- Investigation on Unauthorized Human Activity Watching Through Leveraging Wi-Fi Signals (2018) (2)
- Aggregating Author Profiles from Multiple Publisher Networks to Build Author Knowledge Graph (2018) (2)
- HAES (2019) (2)
- Hypergraph Partitioning for Big Data Applications (2018) (2)
- Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social Networks (2017) (2)
- On the Characterization and Risk Assessment of AI-Powered Mobile Cloud Applications (2021) (1)
- Scheduling Algorithm for Area Coverage Problem in Directional Sensor Networks (2018) (1)
- Portable Non-invasive Device for Measuring Saturated Oxygen of the Blood (2018) (1)
- Deep Hierarchical App Recommendation with Dynamic Behaviors (2020) (1)
- Prediction-Based Resource Deployment and Task Scheduling in Edge-Cloud Collaborative Computing (2022) (1)
- Generic attribute revocation systems for attribute-based encryption in cloud storage (2019) (1)
- A Privacy-Preserving Multi-Authority Attribute-Based Encryption Approach for Mobile Healthcare (2016) (1)
- Dependability in Sensor, Cloud, and Big Data Systems and Applications: 5th International Conference, DependSys 2019, Guangzhou, China, November 12–15, 2019, Proceedings (2019) (1)
- A Coprocessor-Based Introspection Framework Via Intel Management Engine (2021) (1)
- Android Malware Detection Using Category-Based Permission Vectors (2018) (1)
- Cognitive population initialization for swarm intelligence and evolutionary computing (2021) (1)
- On authenticated skyline query processing over road networks (2020) (1)
- Cloud-based service oriented architecture for social vehicular ad hoc network communications (2020) (1)
- Information Security Practice and Experience (2016) (1)
- DHMRF: A Dynamic Hybrid Movie Recommender Framework (2016) (1)
- A Fine-grained Privacy-Preserving Profile Matching Scheme in Mobile Social Networks (2021) (1)
- Wi-Fi Radar Placement for Coverage in Collapsed Structures (2018) (1)
- Towards Recommendation in Internet of Things: An Uncertainty Perspective (2020) (1)
- Recommender System for Decentralized Cloud Manufacturing (2019) (1)
- Internet Performance Prediction Framework Based on PingER Dataset (2018) (0)
- A Survey of Modern Gene Expression Based Techniques for Cancer Detection and Diagnosis (2018) (0)
- Sales Segmentation for a Mobile Phone Service Through Logistic Regression Algorithm (2019) (0)
- Naturalistic driving data for a smart cloud-based abnormal driving detector (2017) (0)
- Achieving Flow-Oriented Reliable Services in Cloud Computing (2017) (0)
- Personalized Search with Secure Updates in Educational Resources (2018) (0)
- Efficient task offloading with swarm intelligence evolution for edge‐cloud collaboration in vehicular edge computing (2022) (0)
- Trustworthy Data Acquisition and Faulty Sensor Detection using Gray Code in Cyber-Physical System (2020) (0)
- Module-Level Software Streaming Loading Model Based on Hypervisor (2017) (0)
- Data-Driven Influence Learning in Social Networks (2017) (0)
- Second Degree Social Connections - Research on Friend-Matching Privacy Preserving Model in Mobile Social Networks (2017) (0)
- Supplemental Materials of Paper “ Dependable Structural Health Monitoring Using Wireless Sensor Networks ” (2015) (0)
- User-Controlled Encrypted Data Sharing Model in Cloud Storage (2017) (0)
- A Function-Centric Risk Assessment Approach for Android Applications (2020) (0)
- In-network generalized trustworthy data collection for event detection in cyber-physical systems (2021) (0)
- AI bot to detect fake COVID‐19 vaccine certificate (2022) (0)
- A New User-controlled and Efficient Encrypted Data Sharing Model in Cloud Storage (2019) (0)
- Low-Dimensional Vectors Learning for Influence Maximization (2018) (0)
- DIV-SC: A Data Integrity Verification Scheme for Centralized Database Using Smart Contract (2022) (0)
- Towards Debris Information Analysis and Abstraction for Wi-Fi Radar Edge in Collapsed Structures (2019) (0)
- "Smart" Footwear for the Visually-Impaired People Based on Arduino Platform and Ultrasonic Sensors (2020) (0)
- A Privacy-Aware Conceptual Framework for Coordination (2017) (0)
- A Succinct Provable Data Possession Mechanism for Lightweight Clients in Network Computing (2018) (0)
- Superior Prosthetic Member Based on Assistive Technologies (2019) (0)
- Independent Worker Selection In Crowdsourcing (2020) (0)
- Location Based Communication Privacy in Internet of Vehicles Using Fog Computing (2020) (0)
This paper list is powered by the following services: