Fan Wu mainly focuses on Computer network, Incentive, Wireless, Distributed computing and Data quality. Computer network connects with themes related to Game theory in his study. His Incentive study integrates concerns from other disciplines, such as Service provider, Common value auction and Profit.
His work carried out in the field of Wireless brings together such families of science as Radio spectrum and Beamforming. His Distributed computing research includes elements of Provisioning and Routing protocol. He combines subjects such as Overhead, Data mining and k-anonymity with his study of Data quality.
Fan Wu spends much of his time researching Computer network, Distributed computing, Wireless, Computer security and Wireless network. His studies deal with areas such as Channel allocation schemes, Communication channel and Throughput as well as Computer network. His research investigates the connection with Distributed computing and areas like Static routing which intersect with concerns in Destination-Sequenced Distance Vector routing.
Wireless is closely attributed to Radio spectrum in his research. His work on Nash equilibrium expands to the thematically related Wireless network. In his study, White spaces and Energy consumption is inextricably linked to Real-time computing, which falls within the broad field of Wireless sensor network.
The scientist’s investigation covers issues in Wireless, Distributed computing, Operations research, Artificial intelligence and Overhead. He studies Wireless network which is a part of Wireless. His Federated learning study in the realm of Distributed computing interacts with subjects such as Software deployment.
The study incorporates disciplines such as Incentive, Opportunity cost, Competitive analysis and Mechanism design in addition to Operations research. His Incentive study combines topics from a wide range of disciplines, such as Data quality, Budget constraint and Risk analysis. Fan Wu usually deals with Mobile relay and limits it to topics linked to Computer network and Privacy preserving.
His primary areas of study are Distributed computing, Operations research, Differential privacy, Leverage and Upload. His Distributed computing study incorporates themes from Missing data and Minification. His work in Differential privacy addresses subjects such as Scalability, which are connected to disciplines such as Scheduling, Algorithm, Distributed algorithm, Approximation algorithm and Mobile sensor networks.
He has researched Leverage in several fields, including Generative grammar, Fake news and Data science. He combines topics linked to Profit with his work on Computer security. He has included themes like Wireless and Mathematical optimization in his Robustness study.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
Xiong Li;Jianwei Niu;Saru Kumari;Fan Wu.
Journal of Network and Computer Applications (2018)
A Robust ECC-Based Provable Secure Authentication Protocol With Privacy Preserving for Industrial Internet of Things
Xiong Li;Jianwei Niu;Zakirul Alam Bhuiyan;Fan Wu.
IEEE Transactions on Industrial Informatics (2018)
Pay as How Well You Do: A Quality Based Incentive Mechanism for Crowdsensing
Dan Peng;Fan Wu;Guihai Chen.
mobile ad hoc networking and computing (2015)
Millimeter-Wave Wireless Communications for IoT-Cloud Supported Autonomous Vehicles: Overview, Design, and Challenges
Linghe Kong;Muhammad Khurram Khan;Fan Wu;Guihai Chen.
IEEE Communications Magazine (2017)
Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks
Tong Meng;Fan Wu;Zheng Yang;Guihai Chen.
IEEE Transactions on Computers (2016)
Unsupervised Fake News Detection on Social Media: A Generative Approach
Shuo Yang;Kai Shu;Suhang Wang;Renjie Gu.
national conference on artificial intelligence (2019)
A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers
Saru Kumari;Marimuthu Karuppiah;Ashok Kumar Das;Xiong Li.
The Journal of Supercomputing (2018)
A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
Fan Wu;Xiong Li;Arun Kumar Sangaiah;Lili Xu.
Future Generation Computer Systems (2017)
An efficient authentication and key agreement scheme for multi-gateway wireless sensor networks in IoT deployment
Fan Wu;Lili Xu;Saru Kumari;Xiong Li.
Journal of Network and Computer Applications (2017)
A Robust and Energy Efficient Authentication Protocol for Industrial Internet of Things
Xiong Li;Jieyao Peng;Jianwei Niu;Fan Wu.
IEEE Internet of Things Journal (2018)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Nanjing University
The University of Texas at Dallas
University of Electronic Science and Technology of China
Chaudhary Charan Singh University
Shanghai Jiao Tong University
Nanjing University
Georgetown University
International Institute of Information Technology, Hyderabad
King Saud University
University at Buffalo, State University of New York
North Carolina State University
Infineon Technologies (Germany)
University of Zurich
Sichuan University
Pennsylvania State University
University of Cambridge
École Polytechnique Fédérale de Lausanne
Karolinska University Hospital
University of Cologne
King's College London
University of Tokyo
University of Hawaii at Manoa
University of Colorado Boulder
University of Duisburg-Essen
Johns Hopkins University School of Medicine
Wageningen University & Research