default search action
Changjie Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Changjie Wang, Hao Zhang, Wei Ren, Quanhua Liu:
Design of polyphase sequence sets with good correlation properties under spectral distortion via majorization-minimization framework. Digit. Signal Process. 145: 104284 (2024) - [j7]Changjie Wang, Mariano Scazzariello, Alireza Farshin, Simone Ferlin, Dejan Kostic, Marco Chiesa:
NetConfEval: Can LLMs Facilitate Network Configuration? Proc. ACM Netw. 2(CoNEXT2): 1-25 (2024) - 2023
- [i1]Changjie Wang, Mariano Scazzariello, Alireza Farshin, Dejan Kostic, Marco Chiesa:
Making Network Configuration Human Friendly. CoRR abs/2309.06342 (2023) - 2021
- [j6]Changjie Wang, Zhihua Li, Benjamin Sarpong:
Multimodal adaptive identity-recognition algorithm fused with gait perception. Big Data Min. Anal. 4(4): 223-232 (2021)
2010 – 2019
- 2011
- [c18]Muhammad Asim, Milan Petkovic, Mike Qu, Changjie Wang:
An interoperable security framework for connected healthcare. CCNC 2011: 116-120 - 2010
- [c17]Hui Li, Li Zhao, Changjie Wang, Fulong Ma:
DRM system for multiple cascaded business operators. ICME 2010: 1651-1654
2000 – 2009
- 2006
- [c16]Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung:
Anonymity and Security Support for Persistent Enterprise Conversation. EDOC 2006: 471-476 - 2005
- [j5]Changjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang:
Use of cryptographic technologies for privacy protection of watermarks in internet retails of digital contents. Int. J. High Perform. Comput. Netw. 3(5/6): 385-394 (2005) - [c15]Changjie Wang, Ho-fung Leung:
A secure voter-resolved approval voting protocol over internet. ICEC 2005: 646-652 - [c14]Dickson K. W. Chiu, Changjie Wang, Ho-fung Leung, Irene Kafeza, Eleanna Kafeza:
Supporting the legal identities of contracting agents with an agent authorization platform. ICEC 2005: 721-728 - [c13]Changjie Wang, Ho-fung Leung:
A Private and Efficient Mobile Payment Protocol. CIS (2) 2005: 1030-1035 - [c12]Changjie Wang, Ho-fung Leung:
Mobile Agents for Secure Electronic Commerce Transactions with Privacy Protection of the Customers. EEE 2005: 530-535 - [c11]Qianhong Wu, Bo Qin, Changjie Wang, Xiaofeng Chen, Yumin Wang:
t-Out-of-n String/Bit Oblivious Transfers Revisited. ISPEC 2005: 410-421 - [c10]Changjie Wang, Dickson K. W. Chiu, Ho-fung Leung:
Anonymity and Security in Public Internet Forums. CEC 2005: 448-451 - 2004
- [c9]Changjie Wang, Ho-fung Leung:
A secure and private clarke tax voting protocol without trusted authorities. ICEC 2004: 556-565 - [c8]Changjie Wang, Ho-fung Leung, Shing-Chi Cheung, Yumin Wang:
Use of Cryptographic Technologies for Privacy Protection of Watermarks in Internet Retails of Digital Contents. AINA (1) 2004: 414-419 - [c7]Changjie Wang, Ho-fung Leung:
A Secure and Fully Private Borda Voting Protocol with Universal Verifiability. COMPSAC 2004: 224-229 - [c6]Qianhong Wu, Changjie Wang, Xiaofeng Chen, Yumin Wang:
Publicly Verifiable Auctions with Minimal Leakage. COMPSAC 2004: 384-389 - [c5]Shing-Chi Cheung, Ho-fung Leung, Changjie Wang:
A Commutative Encrypted Protocol for the Privacy Protection of Watermarks in Digital Contents. HICSS 2004 - [c4]Changjie Wang, Ho-fung Leung:
Anonymity and Security in Continuous Double Auctions for Internet Retails Market. HICSS 2004 - [c3]Qianhong Wu, Xiaofeng Chen, Changjie Wang, Yumin Wang:
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ISC 2004: 330-341 - 2003
- [j4]Changjie Wang, Fangguo Zhang, Yumin Wang:
Secure Web Transaction with Anonymous Mobile Agent over Internet. J. Comput. Sci. Technol. 18(1): 84-89 (2003) - [c2]Changjie Wang, Xiaofeng Chen, Yumin Wang:
An Agent-Based Multi Rounds Online Auction Protocol with Sealed Bids. AINA 2003: 194-197 - [c1]Changjie Wang, Ho-fung Leung, Yumin Wang:
Secure Double Auction Protocols with Full Privacy Protection. ICISC 2003: 215-229 - 2002
- [j3]Changjie Wang, Fangguo Zhang, Yumin Wang:
SAWT: A New System for Secure and Anonymous Web Transactions over the Internet. J. Res. Pract. Inf. Technol. 34(1): 34-46 (2002) - [j2]Changjie Wang, Yumin Wang, Fangguo Zhang:
An Anonymous Mobile Agents Scheme for Secure Web Transaction over the Internet. Informatica (Slovenia) 26(3) (2002) - [j1]Xiaofeng Chen, Changjie Wang, Yumin Wang:
Fair Electronic Cash Based on Double Signatur. J. Comput. Sci. Technol. 17(6): 830-835 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-03 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint