發表論文
在CCF A類會議和期刊CCS、NDSS、NIPS、CVPR、DAC、TDSC、TCAD及TCC、計算機學報、軟件學報、電子學報等期刊上發表論文80餘篇;
[1] Yong Zhuang, Keyan Guo, Juan Wang*, Yiheng Jing , Xiaoyang Xu , Wenzhe Yi , Mengda Yang , Bo Zhao , Hongxin Hu “I know what you MEME! Understanding and Detecting Harmful Memes with Multimodal Large Language Models”,The Network and Distributed System Security (NDSS) Symposium,2025.(CCF A)
[2] He Yu, Boheng Li, Yao Wang, Mengda Yang, Juan Wang*, Hongxin Hu, and Xingyu Zhao. "Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks." In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security(CCS), 2024.(CCF A)
[3] Wang, Jie, Wang, Juan*, and Zhang, Yinqian. Zion: A Practical Confidential Virtual Machine Architecture on Commodity RISC-V Processors.(DAC) Proceedings of the 62th ACM/IEEE Design Automation Conference, 2025.(CCF A)
[4] Yang, Mengda, Ziang Li, Juan Wang*, Hongxin Hu, Ao Ren, Xiaoyang Xu, and Wenzhe Yi. "Measuring data reconstruction defenses in collaborative inference systems." Advances in Neural Information Processing Systems(NIPS),2022. (CCF A)
[5] Li Ziang, Mengda Yang, Yaxin Liu, Juan Wang*, Hongxin Hu, Wenzhe Yi, and Xiaoyang Xu. "GAN you see me? enhanced data reconstruction attacks against split inference." Advances in Neural Information Processing Systems(NIPS),2023. (CCF A)
[6] Ziang Li, Hongguang Zhang, Juan Wang,et.al. “From Head to Tail: Efficient Black-box Model Inversion Attack via Long-tailed Learning”.In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR), 2025.(CCF A)
[7] Xu Xiaoyang, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang*, Hongxin Hu, Yong Zhuang, and Yaxin Liu. "A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning." In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition(CVPR), 2024.(CCF A)
[8] Juan Wang*, Zhi Hong, Yuhan Zhan, Yier Jin. Enabling Security-enhanced Attestation With Intel SGX for Remote Terminal and IoT. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2018.1. (CCF A)
[9] Juan Wang*, Ru Wen, Jiangqi Li. Detecting and Mitigating Target Link-Flooding Attacks Using SDN. Transactions on Dependable and Secure Computing, 2018.3. (CCF A)
[10] Wang Juan*, Shirong Hao, Ru Wen, Boxian Zhang, Liqiang Zhang, Hongxin Hu, and Rongxing Lu. "IoT-praetor: Undesired behaviors detection for IoT devices." IEEE Internet of Things Journal 8, no. 2 (2020): 927-940.(SCI 1區)
[11] Liu Linbin, June Li, Jianming Lv, Juan Wang, Siyu Zhao, and Qiuyu Lu. "Privacy-Preserving and Secure Industrial Big Data Analytics: A Survey and the Research Framework." IEEE Internet of Things Journal 11, no. 11 (2024): 18976-18999. (SCI 1區)
[12] Juan Wang; Jie Wang; Chengyang Fan; Fei Yan; Yueqiang Cheng; Yinqian Zhang; Wenhui Zhang; Mengda Yang. SvTPM: SGX-based Virtual Trusted Platform Modules for Cloud Computing, Transactions on Cloud Computing, 2023, doi: 10.1109/TCC.2023.3243891.9(SCI 2區)
[13] Juan Wang ; Shirong Hao; Hongxin Hu; Bo Zhao; Hongda Li; Jun Xu; Peng Liu; S-Blocks: Lightweight and Trusted Virtual Security Function with SGX, Transactions on Cloud Computing.2020 (SCI 1區 )
[14] Guoliang He, Xin Xin, Rong Peng, Min Han, Juan Wang, Xiaoqun Wu, Online Rule-Based Classifier Learning on Dynamic Unlabeled Multivariate Time Series Data, IEEE Transactions on Systems, Man, and Cybernetics: Systems. 2020(SCI 1區)
[15] Juan Wang,Bo Zhao,Fei Yan,Fajing Yu,Liqiang Zhang,Huanguo Zhang.Poster:An E2E Trusted Cloud Infrastructure. 21st ACM Conference on Computer and Communications Security.2014,11. (CCF A)
[16] 王鵑, 樊成陽, 程越強,趙波,韋韬,嚴飛,張煥國. SGX 技術的分析和研究. 軟件學報.2018.5. (中文CCF A)
[17] 王鵑,王江,焦虹陽,王勇,陳詩雅,胡宏新.一種基于OpenFlow的SDN訪問控制策略實時沖突檢測與解決方法. 計算機學報. 2015.4( (中文CCF A)