default search action
Jing Chen 0003
Person information
- affiliation: Wuhan University, State Key Laboratory of Software Engineering, China
- affiliation (PhD 2008): Huazhong University of Science and Technology, Wuhan, China
Other persons with the same name
- Jing Chen — disambiguation page
- Jing Chen 0001 — Huaqiao University, School of Information Science and Engineering, Xiamen, China (and 1 more)
- Jing Chen 0002 — Lanzhou University, The School of Information Science and Engineering, China
- Jing Chen 0004 — Ocean University of China, Optics and Optoelectronics Laboratory, Qingdao, China
- Jing Chen 0005 — New Mexico State University, Department of Psychology, Las Cruces, NM, USA (and 2 more)
- Jing Chen 0006 — Wuhan University, LIESMARS, China
- Jing Chen 0007 — Wuxi Professional College of Science and Technology, China (and 1 more)
- Jing Chen 0008 — University of Macau, Faculty of Science and Technology, Macau (and 1 more)
- Jing Chen 0009 — Huazhong University of Science and Technology, School of Mathematics and Statistics, Wuhan, China
- Jing Chen 0010 — Hangzhou Dianzi University, School of Computer Science and Technology, China (and 1 more)
- Jing Chen 0011 — Flatiron Institute, Center for Computational Quantum Physics, New York, NY, USA (and 1 more)
- Jing Chen 0012 — Chinese Academy of Sciences, Institute of Electronics, Beijing, China
- Jing Chen 0013 — China Agricultural University, College of Plant Protection, Beijing, China
- Jing Chen 0014 — Central China Normal University, School of Information Management, Wuhan, China (and 1 more)
- Jing Chen 0015 — University at Buffalo, SUNY, Jacobs Management Center, Buffalo, NY, USA
- Jing Chen 0016 — DJI Technology Co. Ltd, Hong Kong (and 1 more)
- Jing Chen 0017 — Stony Brook University, Computer Science Department, NY, USA (and 1 more)
- Jing Chen 0018 — Beijing Institute of Technology, School of Optoelectronics, China
- Jing Chen 0019 — Peking University, Department of Machine Intelligence, Speech and Hearing Research Center, China
- Jing Chen 0020 — University of Texas at Dallas, Richardson, TX, USA
- Jing Chen 0021 — University of Cincinnati College of Medicine, Department of Environmental Health, OH, USA (and 1 more)
- Jing Chen 0022 — Fuzhou University, College of Electrical Engineering and Automation, China
- Jing Chen 0023 — Beijing Institute of Technology, School of Information and Electronics, Radar Research Laboratory, China
- Jing Chen 0024 — Realbio Genomics Institute, Shanghai, China
- Jing Chen 0025 — Shandong University, Department of Nursing, School of Stomatology, Jinan, China
- Jing Chen 0026 — Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China
- Jing Chen 0027 — Sichuan University, School of Electronics and Information Engineering, Chengdu, China
- Jing Chen 0028 — Nanjing University of Science and Technology, School of Automation, China
- Jing Chen 0029 — Virginia Polytechnic Institute and State University College of Science, Blacksburg, VA, USA (and 2 more)
- Jing Chen 0030 — Shandong University of Science and Technology, Qingdao, China
- Jing Chen 0031 — Nova Southeastern University, Department of Mathematics, Fort Lauderdale, FL, USA (and 1 more)
- Jing Chen 0032 — Nanjing University of Posts and Telecommunications, College of Electronic and Optical Engineering / College of Microelectronics, China
- Jing Chen 0033 — Beijing University of Posts and Telecommunications, School of Electronic Engineering, China
- Jing Chen 0034 — Xi'an University of Architecture and Technology, School of Information and Control Engineering, China (and 1 more)
- Jing Chen 0035 — Dalhousie University, Rowe School of Business, Halifax, Canada
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Shixiong Yao, Pei Li, Jing Chen, Yuexing Zeng, Jiageng Chen, Donghui Wang:
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain. Comput. J. 67(3): 864-874 (2024) - [j53]Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Model-agnostic adversarial example detection via high-frequency amplification. Comput. Secur. 141: 103791 (2024) - [j52]Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791]. Comput. Secur. 146: 104006 (2024) - [j51]Yizhong Liu, Xinxin Xing, Ziheng Tong, Xun Lin, Jing Chen, Zhenyu Guan, Qianhong Wu, Willy Susilo:
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain. IEEE Trans. Dependable Secur. Comput. 21(4): 2603-2618 (2024) - [j50]Meng Jia, Jing Chen, Kun He, Min Shi, Yuanzheng Wang, Ruiying Du:
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation. IEEE Trans. Inf. Forensics Secur. 19: 2549-2564 (2024) - [j49]Cong Wu, Jing Chen, Qianru Fang, Kun He, Ziming Zhao, Hao Ren, Guowen Xu, Yang Liu, Yang Xiang:
Rethinking Membership Inference Attacks Against Transfer Learning. IEEE Trans. Inf. Forensics Secur. 19: 6441-6454 (2024) - [j48]Siqin Li, Kun He, Jing Chen, Min Shi, Meng Jia, Ruiying Du, Ling Han:
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality. IEEE Trans. Inf. Forensics Secur. 19: 7853-7865 (2024) - [j47]Xuanang Yang, Jing Chen, Yuqing Li, Kun He, Xiaojie Huang, Zikuan Jiang, Hao Bai, Ruiying Du:
Fregata: Fast Private Inference With Unified Secure Two-Party Protocols. IEEE Trans. Inf. Forensics Secur. 19: 8472-8484 (2024) - [j46]Yangyang Gu, Jing Chen, Kun He, Cong Wu, Ziming Zhao, Ruiying Du:
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices. IEEE Trans. Mob. Comput. 23(6): 6997-7011 (2024) - [j45]Mei Wang, Jing Chen, Kun He, Ruozhou Yu, Ruiying Du, Zhihao Qian:
UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials. IEEE/ACM Trans. Netw. 32(2): 1110-1123 (2024) - [c29]Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu:
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG). ICSE 2024: 64:1-64:12 - [c28]Nan Yan, Yuqing Li, Jing Chen, Xiong Wang, Jianan Hong, Kun He, Wei Wang:
Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning. INFOCOM 2024: 791-800 - [i13]Xiping Sun, Jing Chen, Cong Wu, Kun He, Haozhe Xu, Yebo Feng, Ruiying Du, Xianhao Chen:
MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones. CoRR abs/2404.01106 (2024) - [i12]Xinyu Liang, Ruiying Du, Jing Chen, Yu Zhang, Meng Jia, Shuangxi Cao, Yufeng Wei, Shixiong Yao:
A Distributed Scalable Cross-chain State Channel Scheme Based on Recursive State Synchronization. CoRR abs/2404.09408 (2024) - [i11]Xiping Sun, Jing Chen, Kun He, Zhixiang He, Ruiying Du, Yebo Feng, Qingchuan Zhao, Cong Wu:
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing. CoRR abs/2404.15000 (2024) - [i10]Haolin Wu, Jing Chen, Ruiying Du, Cong Wu, Kun He, Xingcan Shang, Hao Ren, Guowen Xu:
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning. CoRR abs/2404.15854 (2024) - [i9]Haozhe Xu, Cong Wu, Yangyang Gu, Xingcan Shang, Jing Chen, Kun He, Ruiying Du:
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems. CoRR abs/2405.17100 (2024) - [i8]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Weisong Sun, Ruiying Du, Qingchuan Zhao, Yang Liu:
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph. CoRR abs/2406.00921 (2024) - [i7]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Yang Liu, Ziming Zhao:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. CoRR abs/2408.10116 (2024) - [i6]Qiao Li, Cong Wu, Jing Chen, Zijun Zhang, Kun He, Ruiying Du, Xinxin Wang, Qingchuang Zhao, Yang Liu:
Privacy-preserving Universal Adversarial Defense for Black-box Models. CoRR abs/2408.10647 (2024) - 2023
- [j44]Yangyang Gu, Jing Chen, Cong Wu, Kun He, Ziming Zhao, Ruiying Du:
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(4): 160:1-160:24 (2023) - [j43]Xuanang Yang, Jing Chen, Kun He, Hao Bai, Cong Wu, Ruiying Du:
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks. IEEE Trans. Inf. Forensics Secur. 18: 4815-4829 (2023) - [j42]Jing Chen, Wenjun Jiang, Jie Wu, Kenli Li, Keqin Li:
Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts. ACM Trans. Internet Techn. 23(2): 32:1-32:28 (2023) - [c27]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks. ICCV 2023: 4986-4996 - [c26]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Wenhui Zhang, Liming Fang, Jing Chen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. ACM Multimedia 2023: 8463-8474 - [c25]Ran Yan, Ruiying Du, Kun He, Jing Chen:
Efficient Adversarial Training with Membership Inference Resistance. PRCV (1) 2023: 474-486 - [c24]Min Shi, Jing Chen, Kun He, Haoran Zhao, Meng Jia, Ruiying Du:
Formal Analysis and Patching of BLE-SC Pairing. USENIX Security Symposium 2023: 37-52 - [i5]Ziheng Huang, Boheng Li, Yan Cai, Run Wang, Shangwei Guo, Liming Fang, Jing Chen, Lina Wang:
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network. CoRR abs/2307.15860 (2023) - 2022
- [j41]Mei Wang, Kun He, Jing Chen, Ruiying Du, Bingsheng Zhang, Zengpeng Li:
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices. Future Gener. Comput. Syst. 131: 28-42 (2022) - [j40]Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information. IEEE Internet Things J. 9(13): 10434-10445 (2022) - [j39]Xinyu Liang, Jing Chen, Ruiying Du, Tianrui Zhao:
Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification. KSII Trans. Internet Inf. Syst. 16(8): 2507-2528 (2022) - [j38]Jing Chen, Xin Chen, Kun He, Ruiying Du, Weihang Chen, Yang Xiang:
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. IEEE Trans. Dependable Secur. Comput. 19(5): 3286-3300 (2022) - [j37]Jing Chen, Zeyi Zhan, Kun He, Ruiying Du, Donghui Wang, Fei Liu:
XAuth: Efficient Privacy-Preserving Cross-Domain Authentication. IEEE Trans. Dependable Secur. Comput. 19(5): 3301-3311 (2022) - [j36]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors. IEEE Trans. Dependable Secur. Comput. 19(6): 4002-4018 (2022) - [j35]Yang Yang, Yanjiao Chen, Fei Chen, Jing Chen:
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage. IEEE Trans. Inf. Forensics Secur. 17: 1359-1371 (2022) - [j34]Meng Jia, Jing Chen, Kun He, Ruiying Du, Li Zheng, Mingxi Lai, Donghui Wang, Fei Liu:
Redactable Blockchain From Decentralized Chameleon Hash Functions. IEEE Trans. Inf. Forensics Secur. 17: 2771-2783 (2022) - [c23]Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du, Chen Zhang:
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. CCS 2022: 2931-2945 - [c22]Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang:
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. IJCAI 2022: 761-767 - [c21]Run Wang, Haoxuan Li, Lingzhou Mu, Jixing Ren, Shangwei Guo, Li Liu, Liming Fang, Jing Chen, Lina Wang:
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations? ACM Multimedia 2022: 1808-1818 - [i4]Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang:
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. CoRR abs/2206.00477 (2022) - [i3]Run Wang, Jixing Ren, Boheng Li, Tianyi She, Chenhao Lin, Liming Fang, Jing Chen, Chao Shen, Lina Wang:
Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks. CoRR abs/2210.07809 (2022) - 2021
- [j33]Jing Chen, Jiong Chen, Kun He, Ruiying Du:
SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures. Future Gener. Comput. Syst. 115: 448-458 (2021) - [j32]Jing Chen, Chiheng Wang, Kun He, Ziming Zhao, Min Chen, Ruiying Du, Gail-Joon Ahn:
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Trans. Dependable Secur. Comput. 18(1): 15-29 (2021) - [j31]Kun He, Jing Chen, Quan Yuan, Shouling Ji, Debiao He, Ruiying Du:
Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(3): 1394-1408 (2021) - [j30]Kun He, Jing Chen, Qinxi Zhou, Ruiying Du, Yang Xiang:
Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost. IEEE Trans. Inf. Forensics Secur. 16: 1538-1549 (2021) - [j29]Yongfeng Qian, Yujun Ma, Jing Chen, Di Wu, Daxin Tian, Kai Hwang:
Optimal Location Privacy Preserving and Service Quality Guaranteed Task Allocation in Vehicle-Based Crowdsensing Networks. IEEE Trans. Intell. Transp. Syst. 22(7): 4367-4375 (2021) - [j28]Wenjun Jiang, Jing Chen, Xiaofei Ding, Jie Wu, Jiawei He, Guojun Wang:
Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios. ACM Trans. Web 15(3): 13:1-13:33 (2021) - [c20]Mei Wang, Kun He, Jing Chen, Zengpeng Li, Wei Zhao, Ruiying Du:
Biometrics-Authenticated Key Exchange for Secure Messaging. CCS 2021: 2618-2631 - [c19]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CCS 2021: 3141-3158 - [c18]Jing Chen, Peidong Jiang, Kun He, Cheng Zeng, Ruiying Du:
HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors. ICICS (1) 2021: 136-152 - [c17]Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, Shouling Ji:
PROCESS: Privacy-Preserving On-Chain Certificate Status Service. INFOCOM 2021: 1-10 - [c16]Xiao Wang, Zheng Wang, Wu Liu, Xin Xu, Jing Chen, Chia-Wen Lin:
Consistency-Constancy Bi-Knowledge Learning for Pedestrian Detection in Night Surveillance. ACM Multimedia 2021: 4463-4471 - [i2]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CoRR abs/2111.00197 (2021) - 2020
- [j27]Jiping Li, Ning Zhang, Jianbing Ni, Jing Chen, Ruiying Du:
Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems. IEEE Internet Things J. 7(8): 7334-7344 (2020) - [j26]Cong Wu, Kun He, Jing Chen, Ruiying Du, Yang Xiang:
CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake. IEEE Internet Things J. 7(12): 11420-11430 (2020) - [j25]Jiong Chen, Kun He, Jing Chen, Yingying Fang, Ruiying Du:
PowerPrint: Identifying Smartphones through Power Consumption of the Battery. Secur. Commun. Networks 2020: 3893106:1-3893106:13 (2020) - [j24]Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu:
Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing. IEEE Trans. Cloud Comput. 8(4): 1274-1283 (2020) - [j23]Jing Chen, Kun He, Lan Deng, Quan Yuan, Ruiying Du, Yang Xiang, Jie Wu:
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data. IEEE Trans. Serv. Comput. 13(6): 1072-1085 (2020) - [c15]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. ICDE 2020: 1609-1620 - [c14]Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du:
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. USENIX Security Symposium 2020: 2219-2236
2010 – 2019
- 2019
- [j22]Shixiong Yao, Jing Chen, Kun He, Ruiying Du, Tianqing Zhu, Xin Chen:
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management. IEEE Access 7: 6117-6128 (2019) - [j21]Fajiang Yu, Jing Chen, Yang Xiang, Jiacheng Zhu, Yangdi Zhao:
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electron. Commer. Res. 19(3): 689-718 (2019) - [j20]Yongfeng Qian, Long Hu, Jing Chen, Xin Guan, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Privacy-aware service placement for mobile edge computing via federated learning. Inf. Sci. 505: 562-570 (2019) - [j19]Long Hu, Yongfeng Qian, Jing Chen, Xiaobo Shi, Jing Zhang, Shiwen Mao:
Photo Crowdsourcing Based Privacy-Protected Healthcare. IEEE Trans. Sustain. Comput. 4(2): 168-177 (2019) - [c13]Cong Wu, Kun He, Jing Chen, Ruiying Du:
ICAuth: Implicit and Continuous Authentication When the Screen Is Awake. ICC 2019: 1-6 - 2018
- [j18]Yongfeng Qian, Yingying Jiang, Jing Chen, Yu Zhang, Jeungeun Song, Ming Zhou, Matevz Pustisek:
Towards decentralized IoT security enhancement: A blockchain approach. Comput. Electr. Eng. 72: 266-273 (2018) - [j17]Yongfeng Qian, Min Chen, Jing Chen, M. Shamim Hossain, Atif Alamri:
Secure Enforcement in Cognitive Internet of Vehicles. IEEE Internet Things J. 5(2): 1242-1250 (2018) - [j16]Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn:
Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection. IEEE Trans. Inf. Forensics Secur. 13(5): 1286-1300 (2018) - [j15]Jing Chen, Kun He, Quan Yuan, Min Chen, Ruiying Du, Yang Xiang:
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services. IEEE Trans. Mob. Comput. 17(11): 2524-2535 (2018) - [c12]Jing Chen, Shixiong Yao, Quan Yuan, Kun He, Shouling Ji, Ruiying Du:
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. INFOCOM 2018: 2060-2068 - [i1]Chenyang Lv, Shouling Ji, Yuwei Li, Junfeng Zhou, Jianhai Chen, Pan Zhou, Jing Chen:
SmartSeed: Smart Seed Generation for Efficient Fuzzing. CoRR abs/1807.02606 (2018) - 2017
- [j14]Jian Zhang, Yang Yang, Yanjiao Chen, Jing Chen, Qian Zhang:
A general framework to design secure cloud storage protocol using homomorphic encryption scheme. Comput. Networks 129: 37-50 (2017) - [j13]Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi:
Secure independent-update concise-expression access control for video on demand in cloud. Inf. Sci. 387: 75-89 (2017) - [j12]Yonghong Tian, Xilin Chen, Hongkai Xiong, Hong-Liang Li, Li-Rong Dai, Jing Chen, Junliang Xing, Jing Chen, Xihong Wu, Weiming Hu, Yu Hu, Tiejun Huang, Wen Gao:
Towards human-like and transhuman perception in AI 2.0: a review. Frontiers Inf. Technol. Electron. Eng. 18(1): 58-67 (2017) - [j11]Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang:
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Trans. Mob. Comput. 16(6): 1530-1543 (2017) - [c11]Jing Chen, Yingying Fang, Kun He, Ruiying Du:
Charge-Depleting of the Batteries Makes Smartphones Recognizable. ICPADS 2017: 33-40 - [c10]Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue:
Checks and balances: A tripartite public key infrastructure for secure web-based connections. INFOCOM 2017: 1-9 - 2016
- [j10]Jing Chen, Kun He, Quan Yuan, Ruiying Du, Lina Wang, Jie Wu:
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks. Comput. Networks 105: 194-206 (2016) - [j9]Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang, Cai Fu:
A multi-objective optimization model based on immune algorithm in wireless mesh networks. Int. J. Commun. Syst. 29(1): 155-169 (2016) - [j8]Jing Chen, Lihong Zhang, Kun He, Min Chen, Ruiying Du, Lina Wang:
Message-locked proof of ownership and retrievability with remote repairing in cloud. Secur. Commun. Networks 9(16): 3452-3466 (2016) - [j7]Shungan Zhou, Ruiying Du, Jing Chen, Debiao He, Hua Deng:
ESDR: an efficient and secure data repairing paradigm in cloud storage. Secur. Commun. Networks 9(16): 3646-3657 (2016) - [j6]Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du:
A γ-Strawman privacy-preserving scheme in weighted social networks. Secur. Commun. Networks 9(18): 5625-5638 (2016) - [j5]Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang:
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Trans. Computers 65(12): 3631-3645 (2016) - 2015
- [j4]Jing Chen, Kun He, Ruiying Du, Minghui Zheng, Yang Xiang, Quan Yuan:
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks. IEEE Trans. Parallel Distributed Syst. 26(2): 423-433 (2015) - [c9]Quan Yuan, Ionut Cardei, Jing Chen, Jie Wu:
Multi-Copy Routing with Trajectory Prediction in Social Delay-Tolerant Networks. GLOBECOM 2015: 1-6 - [c8]Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du:
Game-theory-based batch identification of invalid signatures in wireless mobile networks. INFOCOM 2015: 262-270 - [c7]Jing Chen, Quan Yuan, Ruiying Du, Jie Wu:
MuCAR: A greedy multi-flow-based coding-aware routing in wireless networks. SECON 2015: 310-318 - [c6]Jing Chen, Yuling Peng, Ruiying Du, Quan Yuan, Minghui Zheng:
Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage. TrustCom/BigDataSE/ISPA (1) 2015: 143-150 - 2014
- [c5]Shixiong Yao, Jing Chen, Ruiying Du, Lan Deng, Chiheng Wang:
A Survey of Security Network Coding toward Various Attacks. TrustCom 2014: 252-259 - [c4]Yu Zhang, Jing Chen, Ruiying Du, Lan Deng, Yang Xiang, Qing Zhou:
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. TrustCom 2014: 310-319 - [c3]Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng:
Proofs of Ownership and Retrievability in Cloud Storage. TrustCom 2014: 328-335 - 2013
- [c2]Jing Chen, Ruiying Du, Li Zhao, Chiheng Wang, Minghui Zheng, Yang Xiang:
Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs. NSS 2013: 590-598 - [c1]Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao:
Secure Routing Based on Network Coding in Wireless Sensor Networks. TrustCom/ISPA/IUCC 2013: 58-64 - 2012
- [j3]Jianwei Liu, Ruiying Du, Jing Chen, Kun He:
A key distribution scheme using network coding for mobile ad hoc network. Secur. Commun. Networks 5(1): 59-67 (2012) - 2010
- [j2]Jing Chen, Shiguo Lian, Cai Fu, Ruiying Du:
A hybrid game model based on reputation for spectrum allocation in wireless networks. Comput. Commun. 33(14): 1623-1631 (2010) - [j1]Ruiying Du, Chunyu Ai, Longjiang Guo, Jing Chen, Jianwei Liu, Jing He, Yingshu Li:
A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks. J. Commun. 5(9): 654-664 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint