


default search action
Weidong Fang 0002
Person information
- affiliation: Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China
Other persons with the same name
- Weidong Fang — disambiguation page
- Weidong Fang 0001
— Fujian University of Technology, Fujian, Fuzhou, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j27]Minglong Cheng
, Tingting Xu, Wei Chen
, Weidong Fang, Minda Yao
, Jueting Liu, Zehua Wang
:
DLGTrust: Graph neural network-based trust evaluation using dynamic line graph. Inf. Process. Manag. 63(2): 104455 (2026)- 2025
[j26]Minglong Cheng
, Wei Chen
, Weidong Fang, Zehua Wang, Tingting Xu, Jueting Liu
, Victor C. M. Leung:
MFTE: Multifactor and fuzzy trust evaluation for federated learning in mobile edge computing. Comput. Networks 265: 111340 (2025)
[c29]Minglong Cheng
, Tingting Xu
, Wei Chen
, Weidong Fang
, Minda Yao
, Kangning Bu
, Yu Zhang
, Zehua Wang
:
Efficient Data Integrity Verification Scheme Based on Multi-Branch Authentication Tree for Electronic Health Record. BIBM 2025: 7308-7315
[c28]Minglong Cheng
, Tingting Xu, Wei Chen, Weidong Fang, Jueting Liu, Xiang Zhong, Zehua Wang:
CNN-DST-IDS: CNN and D-S Evidence Theory Based Intrusion Detection System. ICIC (4) 2025: 78-89- 2024
[j25]Weidong Fang
, Chunsheng Zhu
, Wuxiong Zhang
:
Toward Secure and Lightweight Data Transmission for Cloud-Edge-Terminal Collaboration in Artificial Intelligence of Things. IEEE Internet Things J. 11(1): 105-113 (2024)
[c27]Zhiqi Li, Weidong Fang, Chunsheng Zhu, Guannan Song, Wuxiong Zhang:
Toward Deep Learning based Intrusion Detection System: A Survey. BDE 2024: 25-32
[c26]Hao Huang, Wentao Chen, Weidong Fang, Zhiqi Li, Wei Chen, Wai-Hung Ip, Kai-Leung Yung:
State-of-the-art Review on Intelligent Computing-based Privacy Preservation Technologies for Power Internet of Things. BDE 2024: 54-59
[c25]Zhiqi Li
, Weidong Fang
, Chunsheng Zhu
, Wentao Chen, Tianpeng Hao, Wuxiong Zhang
:
Trust Evaluation with Deep Learning in Online Social Networks: A State-of-the-Art Review. ICIC (3) 2024: 3-12
[c24]Zhiqi Li
, Weidong Fang
, Chunsheng Zhu
, Wentao Chen, Zhiwei Gao, Xinhang Jiang, Wuxiong Zhang
:
Deep Neural Network-Based Intrusion Detection in Internet of Things: A State-of-the-Art Review. ICIC (3) 2024: 13-23
[c23]Hao Huang, Wentao Chen, Weidong Fang
, Wei Chen, Wai-Hung Ip
, Kai-Leung Yung:
A State of the Art Review on Artificial Intelligence-Enabled Cyber Security in Smart Grid. ICIC (9) 2024: 38-48
[c22]Guoqing Jia, Changhui Sun, Weidong Fang
, Wei Chen
, Guannan Song, Wuxiong Zhang
:
Trusted Secure Routing Schemes Based on Intelligent Computing: A Brief Review. ICIC (LNAI 5) 2024: 275-284
[c21]Tian Wang, Weidong Fang
, Mufan Ni, Xiaoliang Yang, Wei Chen
, Wentao Chen, Wuxiong Zhang
:
Intelligent Computing Making Access Control More Secure: From Cipher to Trust. ICIC (8) 2024: 307-317
[c20]Minglong Cheng
, Wei Chen, Weidong Fang, Jueting Liu, Tingting Xu, Zehua Wang:
Feedback Mechanism-Based Trust Evaluation Model for Mobile Edge Computing in Industrial IoT. ICIC (8) 2024: 461-469
[c19]Zhiqi Li
, Weidong Fang
, Wuxiong Zhang
:
Weibo-FA: A Benchmark Dataset for Fake Account Detection in Weibo Platform. WISE (5) 2024: 166-176- 2023
[j24]Wuxiong Zhang
, Haohui Sun
, Weidong Fang
, Chunsheng Zhu
, Guoqing Jia:
Trust Evaluation and Decision Based on D-S Evidence Theory: Early Models and Future Perspectives. IEEE Access 11: 16032-16041 (2023)
[j23]Zhiqi Li
, Weidong Fang
, Chunsheng Zhu
, Zhiwei Gao, Wuxiong Zhang
:
AI-Enabled Trust in Distributed Networks. IEEE Access 11: 88116-88134 (2023)
[j22]Weidong Fang
, Chunsheng Zhu
, Mohsen Guizani
, Joel J. P. C. Rodrigues
, Wuxiong Zhang
:
HC-TUS: Human Cognition-Based Trust Update Scheme for AI-Enabled VANET. IEEE Netw. 37(5): 247-252 (2023)
[c18]Weidong Fang, Chunsheng Zhu, Mohsen Guizani, Zhiqi Li, Wuxiong Zhang, Joel J. P. C. Rodrigues:
TEEM: Two-Factor Energy Evaluation Metric Toward Green Big Data System. GLOBECOM 2023: 4722-4727- 2022
[j21]Peng Gao, Xiao Yue, Wei Chen, Weidong Fang, Zijian Tian, Fan Zhang:
A state-of-the-art review on person re-identification with deep learning. Int. J. Ad Hoc Ubiquitous Comput. 41(2): 69-91 (2022)
[j20]Wei Chen
, Bobin Zhang, Xiao Yang, Weidong Fang, Wuxiong Zhang, Xiaorong Jiang:
C-EEUC: a Cluster Routing Protocol for Coal Mine Wireless Sensor Network Based on Fog Computing and 5G. Mob. Networks Appl. 27(5): 1853-1866 (2022)
[j19]Weidong Fang
, Chunsheng Zhu
, F. Richard Yu
, Kun Wang
, Wuxiong Zhang
:
Towards Energy-Efficient and Secure Data Transmission in AI-Enabled Software Defined Industrial Networks. IEEE Trans. Ind. Informatics 18(6): 4265-4274 (2022)
[c17]Weidong Fang, Li Yi, Chunsheng Zhu, Guoqing Jia, Wuxiong Zhang:
TML-CDS: Trusted Multi-layer Connected Dominating Set for Secure Routing in Distributed Networks. GLOBECOM 2022: 2728-2732
[c16]Li Yi, Weidong Fang, Wei Chen, Wuxiong Zhang, Guoqing Jia:
Overlapped Connected Dominating Set for Big Data Security. INFOCOM Workshops 2022: 1-5
[c15]Zhenru Huo, Guoqing Jia, Weidong Fang, Wei Chen, Wuxiong Zhang:
A-VMD: Adaptive Variational Mode Decomposition Scheme for Noise Reduction in Sensor-Cloud. UbiSec 2022: 485-496- 2021
[j18]Li Yi
, Weidong Fang
, Wuxiong Zhang
, Weiwei Gao, Baoqing Li:
Game-Based Trust in Complex Networks: Past, Present, and Future. Complex. 2021: 6614941:1-6614941:7 (2021)
[j17]Weidong Fang
, Wuxiong Zhang, Wei Chen
, Jin Liu, Yepeng Ni, Yinxuan Yang:
MSCR: multidimensional secure clustered routing scheme in hierarchical wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2021(1): 14 (2021)
[j16]Chaogang Tang
, Shixiong Xia, Qing Li
, Wei Chen, Weidong Fang:
Resource pooling in vehicular fog computing. J. Cloud Comput. 10(1): 19 (2021)
[j15]Weidong Fang
, Ningning Cui, Wei Chen
, Wuxiong Zhang
, Yunliang Chen
:
A Trust-Based Security System for Data Collection in Smart City. IEEE Trans. Ind. Informatics 17(6): 4131-4140 (2021)
[c14]Weidong Fang, Chunsheng Zhu, Tian Min Ma, Wuxiong Zhang, Baoqing Li, Li Yi, Fangchen Xu, Tianchen Zhang, Bo Wang:
Dynamic Aging Weight Scheme for Trust Model in Internet of Medical Things. BIBM 2021: 3366-3369
[c13]Weidong Fang, Wuxiong Zhang, Wei Chen, Li Yi, Weiwei Gao:
PDTM: Poisson Distribution-based Trust Model for Web of Things. WWW (Companion Volume) 2021: 85-89- 2020
[j14]Weidong Fang, Wei Chen
, Wuxiong Zhang, Jun Pei, Weiwei Gao, Guohui Wang:
Digital signature scheme for information non-repudiation in blockchain: a state of the art review. EURASIP J. Wirel. Commun. Netw. 2020(1): 56 (2020)
[j13]Weidong Fang
, Wuxiong Zhang, Yang Liu, Weiming Yang, Zhiwei Gao:
BTDS: Bayesian-based trust decision scheme for intelligent connected vehicles in VANETs. Trans. Emerg. Telecommun. Technol. 31(12) (2020)
[j12]Weidong Fang, Wuxiong Zhang, Lianhai Shan, Biruk Assefa, Wei Chen:
Hierarchical routing protocol in wireless sensor network: a state-of-the-art review. Int. J. Comput. Sci. Eng. 22(1): 107-113 (2020)
[j11]Wei Chen, Kun Zhou, Weidong Fang, Ke Wang, Fangming Bi, Biruk Assefa:
Review on blockchain technology and its application to the simple analysis of intellectual property protection. Int. J. Comput. Sci. Eng. 22(4): 437-444 (2020)
[j10]Libingyi Huang, Guoqing Jia, Weidong Fang
, Wei Chen
, Wuxiong Zhang
:
Towards Security Joint Trust and Game Theory for Maximizing Utility: Challenges and Countermeasures. Sensors 20(1): 221 (2020)
[j9]Yepeng Ni
, Jianping Chai, Yan Wang, Weidong Fang
:
A Fast Radio Map Construction Method Merging Self-Adaptive Local Linear Embedding (LLE) and Graph-Based Label Propagation in WLAN Fingerprint Localization Systems. Sensors 20(3): 767 (2020)
[j8]Weidong Fang
, Wuxiong Zhang
, Wei Chen
, Tao Pan, Yepeng Ni, Yinxuan Yang:
Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey. Wirel. Commun. Mob. Comput. 2020: 2643546:1-2643546:20 (2020)
[j7]Weidong Fang
, Wuxiong Zhang, Wei Chen
, Yang Liu, Chaogang Tang
:
TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wirel. Networks 26(5): 3169-3182 (2020)
2010 – 2019
- 2019
[j6]Weidong Fang
, Ming Xu, Chunsheng Zhu
, Weili Han, Wuxiong Zhang, Joel J. P. C. Rodrigues
:
FETMS: Fast and Efficient Trust Management Scheme for Information-Centric Networking in Internet of Things. IEEE Access 7: 13476-13485 (2019)
[j5]Yang Liu
, Wuxiong Zhang
, Yang Yang
, Weidong Fang
, Fei Qin
, Xuewu Dai:
RAMTEL: Robust Acoustic Motion Tracking Using Extreme Learning Machine for Smart Cities. IEEE Internet Things J. 6(5): 7555-7569 (2019)
[j4]Bobin Zhang, Xiuyan Shao, Wei Chen, Fangming Bi, Weidong Fang, Tongfeng Sun, Chaogang Tang
:
Visual tracking based on robust appearance model. Image Vis. Comput. 89: 211-221 (2019)
[c12]Weidong Fang, Wuxiong Zhang, Lianhai Shan, Qianqian Zhao, Wei Chen:
A Converged Network Architecture Oriented Towards NB-IoT. 5GWN 2019: 31-39
[c11]Wei Chen
, Xiao Yang, Weidong Fang, Wuxiong Zhang, Xiaorong Jiang:
Cluster Routing Protocol for Coal Mine Wireless Sensor Network Based on 5G. 5GWN 2019: 60-67
[c10]Weidong Fang, Wuxiong Zhang, Wei Chen, Yang Liu, Chaogang Tang:
TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network. 5GWN 2019: 155-173
[c9]Weidong Fang, Wuxiong Zhang, Wei Chen, Weiwei Gao, Guoqing Jia:
IONSS: Indirect Observation Node Selection Scheme in Trust Management for UAV Network. GLOBECOM Workshops 2019: 1-6
[c8]Yang Liu, Wuxiong Zhang, Yang Yang, Weidong Fang, Fei Qin, Xuewu Dai:
PAMT: Phase-based Acoustic Motion Tracking in Multipath Fading Environments. INFOCOM 2019: 2386-2394- 2018
[j3]Chaogang Tang
, Xianglin Wei, Shuo Xiao, Wei Chen
, Weidong Fang, Wuxiong Zhang, Mingyang Hao:
A Mobile Cloud Based Scheduling Strategy for Industrial Internet of Things. IEEE Access 6: 7262-7275 (2018)
[c7]Bobin Zhang, Weidong Fang, Wei Chen, Fangming Bi, Chaogang Tang
, Xiaohua Huang
:
Visual Tracking Based on Cooperative Model. FG 2018: 614-620
[c6]Wei Chen, Yuequn, Ke Wang, Weidong Fang, Wuxiong Zhang, Tao Pan:
Research on Wireless Sensor Networks Routing Algorithms for Coal Mine Mobile Sensing. iThings/GreenCom/CPSCom/SmartData 2018: 1759-1764
[c5]Fangming Bi, Xuzhi Miao, Wei Chen, Weidong Fang, Wuxiong Zhang, Deyu Wang:
An Overview on the Applications and Security Issues of Fog Computing. iThings/GreenCom/CPSCom/SmartData 2018: 1792-1797
[c4]Weidong Fang, Chunsheng Zhu, Wei Chen, Wuxiong Zhang, Joel J. P. C. Rodrigues:
BDTMS: Binomial Distribution-based Trust Management Scheme for Healthcare-oriented Wireless Sensor Network. IWCMC 2018: 382-387
[c3]Yang Liu, Yang Yang, Weidong Fang, Wuxiong Zhang:
Demo: Phase-based Acoustic Localization and Motion Tracking for Mobile Interaction. ACM Multimedia 2018: 1228-1230- 2017
[j2]Weidong Fang, Wuxiong Zhang, Yang Yang, Yang Liu, Wei Chen:
A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution. Sci. China Inf. Sci. 60(4): 40305 (2017)
[j1]Weidong Fang, Wuxiong Zhang, Jinchao Xiao, Yang Yang, Wei Chen
:
A Source Anonymity-Based Lightweight Secure AODV Protocol for Fog-Based MANET. Sensors 17(6): 1421 (2017)- 2016
[c2]Weidong Fang, Wei He, Wei Chen, Lian-Hai Shan, Feng-Ying Ma:
Research on the Application-Driven Architecture in Internet of Things. FSDM 2016: 458-465
[c1]Weidong Fang, Chuanlei Zhang, Wei He, Wei Chen, Feng-Ying Ma:
Industrial Wireless Sensor Network-Oriented Energy-Efficient Secure AODV Protocol. QSHINE 2016: 406-415
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-04-04 00:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







