Wenting Shen

ORCID: 0000-0003-1467-9619
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Cloud Data Security Solutions
  • Privacy-Preserving Technologies in Data
  • Blockchain Technology Applications and Security
  • Security and Verification in Computing
  • IoT and Edge/Fog Computing
  • User Authentication and Security Systems
  • Stochastic Gradient Optimization Techniques
  • Advanced Graph Neural Networks
  • Advanced Steganography and Watermarking Techniques
  • Pharmaceutical Practices and Patient Outcomes
  • Information Systems and Technology Applications
  • Caching and Content Delivery
  • Coding theory and cryptography
  • Machine Learning and ELM
  • Video Surveillance and Tracking Methods
  • Graph Theory and Algorithms
  • Parallel Computing and Optimization Techniques
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Vision and Imaging
  • Complexity and Algorithms in Graphs
  • Brain Tumor Detection and Classification
  • Environmental Chemistry and Analysis
  • Chaos-based Image/Signal Encryption
  • Cloud Computing and Resource Management

Yancheng Teachers University
2024

Chinese Research Academy of Environmental Sciences
2024

Tianjin Medical University
2023

Shandong Academy of Sciences
2023

Qilu University of Technology
2023

Qingdao University
2015-2023

Hunan University
2021

Shandong University
2018-2019

With cloud storage services, users can remotely store their data to the and realize sharing with others. Remote integrity auditing is proposed guarantee of stored in cloud. In some common systems such as electronic health records system, file might contain sensitive information. The information should not be exposed others when shared. Encrypting whole shared hiding, but will make this unable used by How hiding remote still has been explored up now. order address problem, we propose a scheme...

10.1109/tifs.2018.2850312 article EN IEEE Transactions on Information Forensics and Security 2018-06-25

Using cloud storage services, users can store their data in the to avoid expenditure of local and maintenance. To ensure integrity stored cloud, many auditing schemes have been proposed. In most, if not all, existing schemes, a user needs employ his private key generate authenticators for realizing auditing. Thus, has possess hardware token (e.g., USB token, smart card) memorize password activate this key. If is lost or forgotten, most current would be unable work. order overcome problem, we...

10.1109/tcc.2019.2921553 article EN IEEE Transactions on Cloud Computing 2019-06-07

The key exposure is a serious threat for the security of data integrity auditing. Once user's private auditing exposed, most existing schemes would inevitably become unable to work. To deal with this problem, we construct novel and efficient identity-based scheme key-exposure resilience cloud storage. This achieved by designing update technique, which fully compatible BLS signature used in In our design, Third Party Auditor (TPA) responsible generating information. user can his based on one...

10.1109/tdsc.2022.3228699 article EN cc-by IEEE Transactions on Dependable and Secure Computing 2022-12-19

Public auditing is a significant technique in cloud-based Internet of Things (IoT) systems, which enables the verifier to check integrity IoT data stored cloud. Nowadays, become core property for owners. Once one owner are sold another one, ownership these has be transferred. However, existing public schemes with transfer require all authenticators corresponding transferred transformed new ones auditing. It incurs computation cost because recomputing data, especially when vast quantity being...

10.1109/jiot.2023.3282939 article EN IEEE Internet of Things Journal 2023-06-05

Remote data integrity auditing, as a key technology for cloud storage, allows verifier to check without downloading entire file from server (CS). In practice, user might only concern the of files containing specific keyword and would like perform dynamic operations on data. this paper, we construct practical keyword-based remote auditing scheme supporting full dynamics. such scheme, novel construction called tag is designed. Using tag, TPA able simultaneously whether CS correctly keeps all...

10.1109/tsc.2023.3339521 article EN IEEE Transactions on Services Computing 2023-12-05

The cloud storage auditing with deduplication is able to verify the integrity of data stored in while needs keep only a single copy duplicated file. To best our knowledge, all existing schemes are vulnerable brute-force dictionary attacks, which incurs leakage user privacy. In this paper, we focus on new aspect being against attacks auditing. We propose scheme supporting strong privacy protection, user's file would not be disclosed and other parties when predictable or from small space....

10.1109/access.2020.2977721 article EN cc-by IEEE Access 2020-01-01

This report presents Wan, a comprehensive and open suite of video foundation models designed to push the boundaries generation. Built upon mainstream diffusion transformer paradigm, Wan achieves significant advancements in generative capabilities through series innovations, including our novel VAE, scalable pre-training strategies, large-scale data curation, automated evaluation metrics. These contributions collectively enhance model's performance versatility. Specifically, is characterized...

10.48550/arxiv.2503.20314 preprint EN arXiv (Cornell University) 2025-03-26

10.1109/tdsc.2025.3563396 article EN IEEE Transactions on Dependable and Secure Computing 2025-01-01

10.1109/tifs.2024.3449095 article EN IEEE Transactions on Information Forensics and Security 2024-01-01

Data deduplication technology is a very important in cloud storage. It widely applied various fields, such as electronic health care. can significantly eliminate redundant data and save storage space. For protecting the security of user's data, secure schemes based on popularity have been proposed. They use convergent encryption to encrypt with high double-layer low popularity. However, these huge computational overhead because adopted for whole complex symmetric key delivery. In order...

10.1109/jsyst.2023.3307883 article EN IEEE Systems Journal 2023-09-04

Many related scales have been developed and applied to measure patients' medication adherence, but the research on psychometric characteristics of scale still requires further studies. This study aims provide validation GMAS by using Rasch analysis make targeted recommendations for improvement.This is a cross-sectional secondary data. 312 Chinese adult patients were recruited from two tertiary hospitals one community health service center in Tianjin complete questionnaire containing GMAS,...

10.1080/03007995.2023.2196219 article EN Current Medical Research and Opinion 2023-03-28

Cloud storage is becoming more and popular because of its elasticity pay-as-you-go service manner. In some cloud scenarios, the data that are stored in may be shared by a group users. To verify integrity this kind applications, many auditing schemes for have been proposed. However, all these do not consider access authorization problem users, which makes revoked users still able to belonging group. order deal with problem, we propose novel public scheme paper. Different from previous work,...

10.3837/tiis.2016.07.025 article EN KSII Transactions on Internet and Information Systems 2016-08-03

Graph Neural Networks (GNNs) have shown promising results in various tasks, among which link prediction is an important one. GNN models usually follow a node-centric message passing procedure that aggregates the neighborhood information to central node recursively. Following this paradigm, features of nodes are passed through edges without caring about where located and role they played. However, neglected topological be valuable for tasks. In paper, we propose Structure Enhanced neural...

10.48550/arxiv.2201.05293 preprint EN other-oa arXiv (Cornell University) 2022-01-01
Coming Soon ...