发表论文
在CCF A类会议和期刊CCS、NDSS、NIPS、CVPR、DAC、TDSC、TCAD及TCC、计算机学报、软件学报、电子学报等期刊上发表论文80余篇;
[1] Yong Zhuang, Keyan Guo, Juan Wang*, Yiheng Jing , Xiaoyang Xu , Wenzhe Yi , Mengda Yang , Bo Zhao , Hongxin Hu “I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models”,The Network and Distributed System Security (NDSS) Symposium,2025.(CCF A)
[2] He Yu, Boheng Li, Yao Wang, Mengda Yang, Juan Wang*, Hongxin Hu, and Xingyu Zhao. "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks." In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security(CCS), 2024.(CCF A)
[3] Wang, Jie, Wang, Juan*, and Zhang, Yinqian. Zion: A Practical Confidential Virtual Machine Architecture on Commodity RISC-V Processors.(DAC) Proceedings of the 62th ACM/IEEE Design Automation Conference, 2025.(CCF A)
[4] Yang, Mengda, Ziang Li, Juan Wang*, Hongxin Hu, Ao Ren, Xiaoyang Xu, and Wenzhe Yi. "Measuring data reconstruction defenses in collaborative inference systems." Advances in Neural Information Processing Systems(NIPS),2022. (CCF A)
[5] Li Ziang, Mengda Yang, Yaxin Liu, Juan Wang*, Hongxin Hu, Wenzhe Yi, and Xiaoyang Xu. "GAN you see me? enhanced data reconstruction attacks against split inference." Advances in Neural Information Processing Systems(NIPS),2023. (CCF A)
[6] Ziang Li, Hongguang Zhang, Juan Wang,et.al. “From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning”.In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR), 2025.(CCF A)
[7] Xu Xiaoyang, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang*, Hongxin Hu, Yong Zhuang, and Yaxin Liu. "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning." In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR), 2024.(CCF A)
[8] Juan Wang*, Zhi Hong, Yuhan Zhan, Yier Jin. Enabling Security-enhanced Attestation With Intel SGX for Remote Terminal and IoT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2018.1. (CCF A)
[9] Juan Wang*, Ru Wen, Jiangqi Li. Detecting and Mitigating Target Link-Flooding Attacks Using SDN. Transactions on Dependable and Secure Computing, 2018.3. (CCF A)
[10] Wang Juan*, Shirong Hao, Ru Wen, Boxian Zhang, Liqiang Zhang, Hongxin Hu, and Rongxing Lu. "IoT-praetor: Undesired behaviors detection for IoT devices." IEEE Internet of Things Journal 8, no. 2 (2020): 927-940.(SCI 1区)
[11] Liu Linbin, June Li, Jianming Lv, Juan Wang, Siyu Zhao, and Qiuyu Lu. "Privacy-Preserving and Secure Industrial Big Data Analytics: A Survey and the Research Framework." IEEE Internet of Things Journal 11, no. 11 (2024): 18976-18999. (SCI 1区)
[12] Juan Wang; Jie Wang; Chengyang Fan; Fei Yan; Yueqiang Cheng; Yinqian Zhang; Wenhui Zhang; Mengda Yang. SvTPM: SGX-based Virtual Trusted Platform Modules for Cloud Computing, Transactions on Cloud Computing, 2023, doi: 10.1109/TCC.2023.3243891.9(SCI 2区)
[13] Juan Wang ; Shirong Hao; Hongxin Hu; Bo Zhao; Hongda Li; Jun Xu; Peng Liu; S-Blocks: Lightweight and Trusted Virtual Security Function with SGX, Transactions on Cloud Computing.2020 (SCI 1区 )
[14] Guoliang He, Xin Xin, Rong Peng, Min Han, Juan Wang, Xiaoqun Wu, Online Rule-Based Classifier Learning on Dynamic Unlabeled Multivariate Time Series Data, IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2020(SCI 1区)
[15] Juan Wang,Bo Zhao,Fei Yan,Fajing Yu,Liqiang Zhang,Huanguo Zhang.Poster:An E2E Trusted Cloud Infrastructure. 21st ACM Conference on Computer and Communications Security.2014,11. (CCF A)
[16] 王鹃, 樊成阳, 程越强,赵波,韦韬,严飞,张焕国. SGX 技术的分析和研究. 软件学报.2018.5. (中文CCF A)
[17] 王鹃,王江,焦虹阳,王勇,陈诗雅,胡宏新.一种基于OpenFlow的SDN访问控制策略实时冲突检测与解决方法. 计算机学报. 2015.4( (中文CCF A)