Personal information

Activities

Education and qualifications (2)

Nanjing University of Information Science and Technology: Nanjing, Jiangsu, CN

2016-09-01 to present | M.S. (School of Computer and Software)
Education
Source: Self-asserted source
Anxi Wang

Nanjing University of Information Science and Technology: Nanjing, Jiangsu, CN

2012-09-01 to 2016-06-30 | B. S. (School of Computer and Software)
Education
Source: Self-asserted source
Anxi Wang

Works (16)

A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data

IEEE Transactions on Emerging Topics in Computing
2018 | Journal article
EID:

2-s2.0-85046370144

Contributors: Shen, J.; Wang, C.; Wang, A.; Ji, S.; Zhang, Y.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Identity-Based Fast Authentication Scheme for Smart Mobile Devices in Body Area Networks

Wireless Communications and Mobile Computing
2018 | Journal article
EID:

2-s2.0-85053047339

Contributors: Wang, C.; Zheng, W.; Ji, S.; Liu, Q.; Wang, A.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Intelligent agent-based region division scheme for mobile sensor networks

Soft Computing
2018 | Journal article
EID:

2-s2.0-85044312604

Contributors: Shen, J.; Wang, C.; Wang, A.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks

International Journal of Sensor Networks
2018 | Journal article
EID:

2-s2.0-85049151846

Contributors: Liu, D.; Shen, J.; Wang, A.; Wang, C.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing

Peer-to-Peer Networking and Applications
2018 | Journal article
EID:

2-s2.0-85055944254

Contributors: Shen, J.; Yang, H.; Wang, A.; Zhou, T.; Wang, C.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

A fibonacci based batch auditing protocol for cloud data

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85034261114

Contributors: Shen, J.; Shen, J.; Wang, C.; Wang, A.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

A novel clustering solution for wireless sensor networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2017 | Book
EID:

2-s2.0-85019187472

Contributors: Wang, A.; Pan, S.; Wang, C.; Shen, J.; Liu, D.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

A RFID based localization algorithm applying trilateration for wireless sensor networks

Journal of Internet Technology
2017 | Journal article
EID:

2-s2.0-85031700633

Contributors: Shen, J.; Wang, A.; Wang, C.; Xiong, N.N.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT

IEEE Access
2017 | Journal article
EID:

2-s2.0-85029167782

Contributors: Shen, J.; Wang, A.; Wang, C.; Hung, P.C.K.; Lai, C.-F.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Content-centric Group User Authentication for Secure Social Networks

IEEE Transactions on Emerging Topics in Computing
2017 | Journal article
EID:

2-s2.0-85038384085

Contributors: Shen, J.; Wang, A.; Wang, C.; Li, J.; Zhang, Y.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Moving centroid based routing protocol for incompletely predictable cyber devices in Cyber-Physical-Social Distributed Systems

Future Generation Computer Systems
2017 | Journal article
EID:

2-s2.0-85034809316

Contributors: Shen, J.; Wang, C.; Wang, A.; Liu, Q.; Xiang, Y.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Organized topology based routing protocol in incompletely predictable ad-hoc networks

Computer Communications
2017 | Journal article
EID:

2-s2.0-84979763362

Contributors: Shen, J.; Wang, C.; Wang, A.; Sun, X.; Moh, S.; Hung, P.C.K.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

A RFID based localization algorithm for wireless sensor networks

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2016 | Book
EID:

2-s2.0-85015274526

Contributors: Shen, J.; Wang, A.; Wang, C.; Ren, Y.; Sun, X.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Direction Density-Based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks

IEEE Access
2016 | Journal article
EID:

2-s2.0-85015206696

Contributors: Shen, J.; Wang, C.; Lai, C.-F.; Wang, A.; Chao, H.-C.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Performance Comparison of Typical and Improved LEACH Protocols in Wireless Sensor Network

Proceedings - 2015 1st International Conference on Computational Intelligence Theory, Systems and Applications, CCITSA 2015
2016 | Conference paper
EID:

2-s2.0-84977655255

Contributors: Shen, J.; Wang, A.; Wang, C.; Ren, Y.; Wang, J.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier

Performance comparison of typical routing protocols in ad-hoc networks

Frontiers in Artificial Intelligence and Applications
2015 | Book
EID:

2-s2.0-84926443026

Contributors: Shen, J.; Wang, C.; Wang, A.; Li, L.; Yang, Y.; Wang, J.
Source: Self-asserted source
Anxi Wang via Scopus - Elsevier