Wenjun FAN
University of Colorado Colorado Springs
H-index: 12
North America-United States
Top articles of Wenjun FAN
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
An SDN-enabled Elliptic-curve Diffie-Hellman Key Exchange towards Secure P2P Networking | Wenjun Fan Siyuan Wu Hao Chen | 2024/2/27 | |
Classification and Identification of Phishing Websites based on Machine Learning | Sheng Fang Tianyang Liu Yaning Zhu Wenjun Fan | 2024/2/21 | |
Privacy-preserving Deep Learning for Grey Scale Image Classification with Pixel-based Encryption | Jingyi Deng San Hu Wenjun Fan | 2024/2/21 | |
A Chaotic Encryption Approach Improving Digital Image Security | Chenlei Zhang Xinlin Li Yuchen Luan Wenjun Fan | 2024/2/21 | |
Investigation and Countermeasure toward Unintentional Access to Docker Container | Yueyang Li Luyi Li Ruxue Luo Yuzhen Chen Arijet Sarker | 2023/5/20 | |
QKD-Based Secure Communication for UAV | Zhenxu Gao Wenjun Fan Ruxue Luo | 2023/9 | |
An SDN-NFV-enabled Honeypot for Manipulating Command & Control Shell TCP Connection | Siyuan Wu Wenjun Fan | 2023/5/8 | |
A Honey-Imprint Enabled Approach for Resisting Social Engineering Attacks | Zhaoxi Zhong Wenjun Fan | 2023/9 | |
Machine Learning-Based Approach for Enhancing Multi-Step Attack Prediction | Yueyang Li Wenjun Fan Ruxue Luo | 2023/9 | |
A Machine Learning-Based Intrusion Detection Approach for Intelligent Connected Vehicles | Jia Liu Wenjun Fan | 2023/9 | |
Still Not Aware of the Loophole of Unintentional Access to Docker? A Proof of Concept | Luyi Li Yueyang Li Ruxue Luo Yuzhen Chen Wenjun Fan | 2023/7 | |
A Machine Learning Approach to Anomaly Detection based on Traffic Monitoring for Secure Blockchain Networking | IEEE Transactions on Network and Service Management (TNSM) | Jinoh Kim Makiya Nakashima Wenjun Fan Simeon Wuthier Xiaobo Zhou | 2022/5/9 |
Lightweight and Identifier-Oblivious Engine for Cryptocurrency Networking Anomaly Detection | IEEE Transactions on Dependable and Secure Computing | Wenjun Fan Hsiang-Jen Hong Jinoh Kim Simeon Wuthier Makiya Nakashima | 2022/2/23 |
Robust P2P networking connectivity estimation engine for permissionless Bitcoin cryptocurrency | Computer Networks | Hsiang-Jen Hong Wenjun Fan Simeon Wuthier Jinoh Kim C Edward Chow | 2022/12/24 |
A Blockchain-based Retribution Mechanism for Collaborative Intrusion Detection | Wenjun Fan Shubham Kumar Sang-Yoon Chang Younghee Park | 2022/8/17 | |
The Security Investigation of Ban Score and Misbehavior Tracking in Bitcoin Network | Wenjun Fan Simeon Wuthier Hsiang-Jen Hong Xiaobo Zhou Yan Bai | 2022/7/10 | |
Performance Analyses for Applying Machine Learning on Bitcoin Miners | Wenjun Fan Jinoh Kim Ikkyun Kim Xiaobo Zhou Sang-Yoon Chang | 2021/1/31 | |
Robust p2p connectivity estimation for permissionless bitcoin network | Hsiang-Jen Hong Wenjun Fan Simeon Wuthier Jinoh Kim Xiaobo Zhou | 2021/6/25 | |
A Generic Blockchain Framework to Secure Decentralized Applications | Wenjun Fan Hsiang-Jen Hong Xiaobo Zhou Sang-Yoon Chang | 2021/6/14 | |
Blockchain-Enabled Collaborative Intrusion Detection in Software Defined Networks | IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) | Wenjun Fan Younghee Park Shubham Kumar Priyatham Ganta Xiaobo Zhou | 2021/1 |