scispace - formally typeset
D

Dongfeng Wang

Researcher at Qufu Normal University

Publications -  7
Citations -  44

Dongfeng Wang is an academic researcher from Qufu Normal University. The author has contributed to research in topics: Trusted third party & Pattern recognition (psychology). The author has an hindex of 2, co-authored 5 publications receiving 17 citations.

Papers
More filters
Journal ArticleDOI

Wireless Communications and Mobile Computing Blockchain-Based Trust Management in Distributed Internet of Things

TL;DR: Wang et al. as mentioned in this paper proposed a blockchain-based trust mechanism for distributed IoT devices, where trustrank is quantified by normative trust and risk measures, and a new storage structure is designed for the domain administration manager to identify and delete the malicious evaluations of the devices.
Journal ArticleDOI

Privacy-Aware Secure Anonymous Communication Protocol in CPSS Cloud Computing

TL;DR: In this paper, the authors proposed a certificateless encryption scheme, and conduct a security analysis under the assumption of Computational Diffie-Hellman(CDH) Problem, based on the proposed cryptography mechanism, they achieve a novel anonymous communication protocol to protect the identity privacy of communicating units in CPSS.
Journal ArticleDOI

A systematic mapping study for blockchain based on complex network

TL;DR: This article revisits the problem of complex networks in the form of scientific collaboration networks and utilizes the method of systematic mapping to implement them into blockchain technology.
Journal ArticleDOI

Context Data Fusion Model Enlightened Multi-Scale Capsule Network for Fruit Diseases Identification

TL;DR: Fruit-GAN as mentioned in this paper uses context data fusion and capsule network to improve the quality of the generated images, and the feature reconstruction loss function is proposed for the Cycle-GAN method, named Fruit-GAN.
Book ChapterDOI

Research and Application of Trusted Service Evaluation Model in Social Network

TL;DR: Through security analysis and performance evaluation, it is proved that this new trustworthy service evaluation model achieves better performance in terms of current service review system submission rate, and can effectively resist mainstream service comment attacks.