发表论文
在CCF A类会议和期刊CCS、NDSS、NIPS、CVPR、DAC、TDSC、TCAD及TCC、计算机学报、软件学报、电子学报等期刊上发表论文80余篇;
[1] Yong Zhuang, Keyan Guo, Juan Wang*, Yiheng Jing , Xiaoyang Xu , Wenzhe Yi , Mengda Yang , Bo Zhao ,et.al. “I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models”,The Network and Distributed System Security (NDSS) Symposium,2025.(CCF A)
[2] He Yu, Boheng Li, Yao Wang, Mengda Yang, Juan Wang*, et.al. "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks." In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security(CCS), 2024.(CCF A)
[3] Wang, Jie, Wang, Juan*, and Zhang, Yinqian. Zion: A Practical Confidential Virtual Machine Architecture on Commodity RISC-V Processors.(DAC) Proceedings of the 62th ACM/IEEE Design Automation Conference, 2025.(CCF A)
[4] Yang, Mengda, Ziang Li, Juan Wang*, et.al. "Measuring data reconstruction defenses in collaborative inference systems." Advances in Neural Information Processing Systems(NIPS),2022. (CCF A)
[5] Li Ziang, Mengda Yang, Yaxin Liu, Juan Wang*, et.al. . "GAN you see me? enhanced data reconstruction attacks against split inference." Advances in Neural Information Processing Systems(NIPS),2023. (CCF A)
[6] Ziang Li, Hongguang Zhang, Juan Wang,et.al. “From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning”.In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR), 2025.(CCF A)
[7] Xu Xiaoyang, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang*, ,et.al. "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning." In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR), 2024.(CCF A)
[8] Juan Wang*, Zhi Hong, Yuhan Zhan, Yier Jin. Enabling Security-enhanced Attestation With Intel SGX for Remote Terminal and IoT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2018.1. (CCF A)
[9] Juan Wang*, Ru Wen, Jiangqi Li. Detecting and Mitigating Target Link-Flooding Attacks Using SDN. Transactions on Dependable and Secure Computing, 2018.3. (CCF A)
[10] Wang Juan*, Shirong Hao, Ru Wen, Boxian Zhang, Liqiang Zhang, Hongxin Hu, and Rongxing Lu. "IoT-praetor: Undesired behaviors detection for IoT devices." IEEE Internet of Things Journal 8, no. 2 (2020): 927-940.(SCI 1区)
[11] Liu Linbin, June Li, Jianming Lv, Juan Wang, Siyu Zhao, and Qiuyu Lu. "Privacy-Preserving and Secure Industrial Big Data Analytics: A Survey and the Research Framework." IEEE Internet of Things Journal 11, no. 11 (2024): 18976-18999. (SCI 1区)
[12] Juan Wang; Jie Wang; Chengyang Fan; Fei Yan; Yueqiang Cheng; Yinqian Zhang; Wenhui Zhang; Mengda Yang. SvTPM: SGX-based Virtual Trusted Platform Modules for Cloud Computing, Transactions on Cloud Computing, 2023, doi: 10.1109/TCC.2023.3243891.9(SCI 2区)
[13] Juan Wang ; Shirong Hao; Hongxin Hu; Bo Zhao; Hongda Li; Jun Xu; Peng Liu; S-Blocks: Lightweight and Trusted Virtual Security Function with SGX, Transactions on Cloud Computing.2020 (SCI 1区 )
[14] Guoliang He, Xin Xin, Rong Peng, Min Han, Juan Wang, Xiaoqun Wu, Online Rule-Based Classifier Learning on Dynamic Unlabeled Multivariate Time Series Data, IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2020(SCI 1区)
[15] Juan Wang,Bo Zhao,Fei Yan,Fajing Yu,Liqiang Zhang,Huanguo Zhang.Poster:An E2E Trusted Cloud Infrastructure. 21st ACM Conference on Computer and Communications Security.2014,11. (CCF A)
[16] 王鹃, 樊成阳, 程越强,赵波,韦韬,严飞,张焕国. SGX 技术的分析和研究. 软件学报.2018.5. (中文CCF A)
[17] 王鹃,王江,焦虹阳,王勇,陈诗雅,胡宏新.一种基于OpenFlow的SDN访问控制策略实时冲突检测与解决方法. 计算机学报. 2015.4( (中文CCF A)