教育背景
学术论文
W. Huang, Wenjuan Tang*, H. Jiang, and Y. Zhang. Recognizing Voice Spoofing Attacks Via Acoustic Nonlinearity Dissection for Mobile Devices”, IEEE TMC,DOI: 10.1109/TMC.2024.3411791, 2024.(CCF A 类期刊)
X.Li, L.Wang, Wenjuan Tang, Y. Wang, X. Liao, X. Yang, “Segmented Hash-based Privacy-Preserving Image Retrieval Scheme in Cloud-Assisted IoT”, IEEE Internet of Things Journal, 2024.(SCI,中科院一区期刊)
W. Chen, Wenjuan Tang*, Y. Meng, Y. Zhang, “An HASM-Assisted Voice Disguise Scheme for Emotion Recognition of IoT-enabled Voice Interface”, IEEE Internet of Things Journal, 2024.(SCI,中科院一区期刊)
P.Xi, Wenjuan Tang, S. Peng, “Fighting Fire with Fire: Medical AI Models Defend Against Backdoor Attacks via Self-Learning”, In ISBRA, 2024.
P. Xi, Wenjuan Tang*, K. Xie, X. Liu, P. Zhao, S. Peng*, "RobustHealthFL: Robust Strategy Against Malicious Clients in Non-iid Healthcare Federated Learning", IEEE BIBM, 2023. (CCF B 类会议)
W. Huang, Wenjuan Tang*, H. Chen, H. Jiang, Y. Zhang. “Unauthorized Microphone Access Restraint Based on User Behavior Perception in Mobile Devices”, IEEE TMC, 2022. (CCF A 类期刊)
W. Huang, Wenjuan Tang*, K. Zhang, H. Zhu,, and Y. Zhang. “Thwarting Unauthorized Voice Eavesdropping via Touch Sensing in Mobile Systems.”, IEEE INFOCOM, 2022.(CCF A 类会议)
W. Huang, Wenjuan Tang*, H. Jiang, J. Luo, and Y. Zhang. “Stop deceiving! aneffective defense scheme against voice impersonation attacks on smart devices.” IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2021.3110588, 2021.(SCI,中科院一区期刊)
Hao, Jialu, Cheng Huang, Wenjuan Tang, Yang Zhang, and Shuai Yuan. “Smart Contract-based Access Control through Off-chain Signature and On-chain Evaluation.” IEEE Transactions on Circuits and Systems II: Express Briefs,DOI: 10.1109/TCSII.2021.3125500,2021.
J. Hao, Wenjuan Tang*, C. Huang, J. Liu, H. Wang, and M. Xian. “Secure Data Sharing with Flexible User Access Privilege Update in Cloud-assisted IoMT,” IEEE Transactions on Emerging Topics in Computing, DOI:10.1109/TETC.2021.3052377, 2021.
Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, and Xuemin (Sherman) Shen.“Flexible and Efficient Authenticated Key Agreement Scheme for BANs Based on Physiological Features”, IEEE Transactions on Mobile Computing, 2019, 18(4): 845-856. (SCI, CCF A类期刊)
Wenjuan Tang, Ju Ren,and Yaoxue Zhang. “Enabling Trusted and Privacy-preserving Healthcare Services in Social Media Health Networks”, IEEE Transactions on Multimedia, 2019, 21(3): 579 – 590. (CCF B,中科院一区期刊)
Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, and Xuemin (Sherman) Shen. “Privacy-preserving Task Recommendation with Win-win Incentives for Mobile Crowdsourcing”, Information Sciences, DOI:10.1016/j.ins.2019.02.011. (SCI,中科院一区期刊)
Wenjuan Tang, Ju Ren, Kun Deng, Yaoxue Zhang. “Secure Data Aggregation of Lightweight E-healthcare IoT Devices with Fair Incentives”, IEEE Internet of Things Journal, 2019, 6(5), 8714-8726. (SCI, 中科院一区期刊)
Wenjuan Tang, Ju Ren, Kuan Zhang, Deyu Zhang, Yaoxue Zhang and Xuemin (Sherman) Shen, “Efficient and Privacy-preserving Fog-assisted Health Data Sharing Scheme”, ACM Transactions on Intelligent Systems and Technology, 2019, 10(6), p.68.
Wenjuan Tang, Kuan Zhang, Deyu Zhang, Ju Ren, Yaoxue Zhang and Xuemin (Sherman) Shen, “Fog-enabledSmart Health: Towards Cooperative and Secure Healthcare Service Provision”, IEEE Communications Magazine, 2019, 57(5):42–48. (SCI, 中科院一区)
Feng Lyu, Ju Ren, Peng Yang, Nan Cheng, Wenjuan Tang*, Yaoxue Zhang, and Xuemin (Sherman) Shen, “Fine-Grained TDMA MAC Design Towards Ultra-Reliable Broadcast for Autonomous Driving”, IEEE Wireless Communications, 2019, 26(4):46–53. (SCI, 中科院一区)
Wenjuan Tang, Kuan Zhang, Ju Ren, Yaoxue Zhang, Xuemin (Sherman) Shen. “Lightweight and Privacy-preserving Fog-assisted Information Sharing Scheme for Health Big Data”, In Proc. of IEEE Globecom, 2017.
Kaichuan Zhao, Yuezhi Zhou, Wenjuan Tang, Shuang Li, and Yaoxue Zhang. “A Game Theoretic D2D Local Caching System under Heterogeneous Video Preferences and Social Reciprocity”, In Proc. of ICA3PP, 2018.
科研状况
学生培养