


Остановите войну!
for scientists:


default search action
Jian Ren 0001
Person information

- affiliation: Michigan State University, Department of ECE, East Lansing, MI, USA
- affiliation (PhD): Xidian University, Xi'an, China
Other persons with the same name
- Jian Ren — disambiguation page
- Jian Ren 0002
— Sun Yat-Sen University, School of Life Sciences, Guangzhou, China (and 1 more)
- Jian Ren 0003
— Massachusetts General Hospital, Harvard Medical School, Wellman Center for Photomedicine, Boston, MA, USA
- Jian Ren 0004
— Beihang University, School of Computer Science and Engineering, Beijing, China (and 1 more)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j51]Tongtong Li
, Jinxian Deng, Jian Ren
:
Security and Energy Efficiency: Breaking the Barriers of High Peak-to-Average Power Ratio and Disguised Jamming in NextG IoT System Design. IEEE Internet Things J. 10(3): 2658-2666 (2023) - [j50]Zixiao Yu
, Haohong Wang, Aggelos K. Katsaggelos
, Jian Ren
:
A Novel Automatic Content Generation and Optimization Framework. IEEE Internet Things J. 10(14): 12338-12351 (2023) - [c71]Yu Zheng, David C. Zhu, Jian Ren, Taosheng Liu, Karl Friston, Tongtong Li:
A Mathematical Model for Neuronal Activity and Brain Information Processing Capacity. ICASSP 2023: 1-5 - [c70]Jian Ren, Jian Li, Tongtong Li:
Optimal Codes for Distributed Storage. ICNC 2023: 42-46 - [c69]Tongtong Li, Jinxian Deng, Jian Ren:
Can We Have a Better System than OFDM? ICNC 2023: 383-387 - [c68]Zixiao Yu, Xinyi Wu, Haohong Wang, Aggelos K. Katsaggelos, Jian Ren:
Adaptive Auto-Cinematography in Open Worlds. MIPR 2023: 1-6 - [i14]Jialong Zhou, Yuni Lai, Jian Ren, Kai Zhou:
Black-Box Attacks against Signed Graph Analysis via Balance Poisoning. CoRR abs/2309.02396 (2023) - 2022
- [j49]Zixiao Yu
, Haohong Wang, Jian Ren
:
RealPRNet: A Real-Time Phoneme-Recognized Network for "Believable" Speech Animation. IEEE Internet Things J. 9(7): 5357-5367 (2022) - [j48]Jian Ren
, Jian Li
, Tongtong Li
, Matt W. Mutka
:
Feasible Region of Secure and Distributed Data Storage in Adversarial Networks. IEEE Internet Things J. 9(11): 8980-8988 (2022) - [j47]Ehab Zaghloul
, Tongtong Li
, Matt W. Mutka
, Jian Ren
:
$d$d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. IEEE Trans. Serv. Comput. 15(3): 1592-1605 (2022) - [c67]Yulin Zhu
, Yuni Lai
, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou:
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. ICDE 2022: 14-26 - [c66]Zixiao Yu, Chenyu Yu, Haohong Wang, Jian Ren:
Enabling Automatic Cinematography with Reinforcement Learning. MIPR 2022: 103-108 - [c65]Zixiao Yu, Enhao Guo, Haohong Wang, Jian Ren:
Bridging Script and Animation Utilizing a New Automatic Cinematography Model. MIPR 2022: 268-273 - [i13]Yulin Zhu
, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou:
Adversarial Robustness of Graph-based Anomaly Detection. CoRR abs/2206.08260 (2022) - 2021
- [j46]Ehab Zaghloul
, Tongtong Li
, Jian Ren
:
d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting. IEEE Internet Things J. 8(22): 16585-16597 (2021) - [j45]Kai Zhou
, Jian Ren
:
CASO: Cost-Aware Secure Outsourcing of General Computational Problems. IEEE Trans. Serv. Comput. 14(2): 386-399 (2021) - [i12]Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou:
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. CoRR abs/2106.09989 (2021) - 2020
- [j44]Ehab Zaghloul
, Tongtong Li
, Matt W. Mutka
, Jian Ren
:
Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J. 7(10): 10288-10313 (2020) - [j43]Ehab Zaghloul
, Kai Zhou
, Jian Ren
:
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing. IEEE Trans. Big Data 6(4): 804-815 (2020) - [j42]Yuan Liang
, Jian Ren
, Tongtong Li
:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. IEEE Trans. Inf. Forensics Secur. 15: 738-752 (2020) - [j41]Jian Li
, Tongtong Li
, Jian Ren
:
Beyond the MDS Bound in Distributed Cloud Storage. IEEE Trans. Inf. Theory 66(7): 3957-3975 (2020) - [c64]Ehab Zaghloul, Tongtong Li, Jian Ren:
Anonymous and Coercion-Resistant Distributed Electronic Voting. ICNC 2020: 389-393 - [c63]Yuan Liang, Jian Ren, Tongtong Li:
Secure and Efficient OFDM System Design under Disguised Jamming. ICNC 2020: 394-399 - [c62]Zixiao Yu, Haohong Wang, Jian Ren:
A Hybrid Temporal Modeling Phoneme Recognized Network for Real-Time Speech Animation. MIPR 2020: 55-60
2010 – 2019
- 2019
- [c61]Yuan Liang, Yunhao Liu, Jian Ren, Tongtong Li:
Malicious Link Detection in Multi-Hop Wireless Sensor Networks. GLOBECOM 2019: 1-6 - [c60]Ehab Zaghloul, Tongtong Li, Jian Ren:
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts. ICNC 2019: 375-379 - [c59]Ahmed Alahmadi, Yuan Liang, Run Tian, Jian Ren, Tongtong Li:
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry. ICNC 2019: 509-514 - [i11]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
$d$-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. CoRR abs/1904.11432 (2019) - [i10]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
Bitcoin and Blockchain: Security and Privacy. CoRR abs/1904.11435 (2019) - 2018
- [j40]M. H. Afifi, Liang Zhou
, Shantanu Chakrabartty
, Jian Ren
:
Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things. IEEE Internet Things J. 5(4): 2927-2935 (2018) - [j39]Kai Zhou
, Jian Ren
:
PassBio: Privacy-Preserving User-Centric Biometric Authentication. IEEE Trans. Inf. Forensics Secur. 13(12): 3050-3063 (2018) - [j38]M. H. Afifi, Kai Zhou
, Jian Ren
:
Privacy Characterization and Quantification in Data Publishing. IEEE Trans. Knowl. Data Eng. 30(9): 1756-1769 (2018) - [j37]Jian Li
, Tongtong Li, Jian Ren, Han-Chieh Chao:
Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks. Wirel. Commun. Mob. Comput. 2018: 3473910:1-3473910:13 (2018) - [c58]M. H. Afifi, Ehab Zaghloul, Tongtong Li, Jian Ren:
UBNB-PPDP: Utility-Boosting Negotiation-Based Privacy Preserving Data Publishing. GLOBECOM 2018: 1-6 - [c57]Yuan Liang, Jian Ren, Tongtong Li:
The Worst Jamming Distribution for Securely Precoded OFDM. GLOBECOM 2018: 1-6 - [c56]Zhe Wang, Yu Zheng, Michael Jigo, Taosheng Liu, Jian Ren, Zhi Tian, Tongtong Li:
Decoding Behavioral Accuracy in an Attention Task Using Brain fMRI Data. GLOBECOM 2018: 1-6 - [c55]Ehab Zaghloul, Tongtong Li, Jian Ren:
An Attribute-Based Distributed Data Sharing Scheme. GLOBECOM 2018: 1-6 - [c54]Kai Zhou
, Jian Ren, Tongtong Li:
Security and Privacy Enhancement for Outsourced Biometric Identification. GLOBECOM 2018: 1-5 - [c53]M. H. Afifi, Liang Zhou, Shantanu Chakrabartty, Jian Ren:
HPMAP: A Hash-Based Privacy-Preserving Mutual Authentication Protocol for Passive IoT Devices Using Self-Powered Timers. ICC 2018: 1-6 - [c52]Maozhen Liu, Chao Yang, Qi Jiang
, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data. ICC 2018: 1-7 - [c51]Yuan Liang, Yu Zheng, Jian Ren, Tongtong Li:
End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment. ICNC 2018: 513-517 - [i9]Ehab Zaghloul, Kai Zhou, Jian Ren:
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing. CoRR abs/1801.02685 (2018) - [i8]Kai Zhou, Jian Ren:
Security and Privacy Enhancement for Outsourced Biometric Identification. CoRR abs/1809.04219 (2018) - 2017
- [j36]Jian Li
, Yun Liu, Zhen-Jiang Zhang, Jian Ren, Nan Zhao:
Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage. IEEE Access 5: 8780-8791 (2017) - [j35]Di Tang, Tongtong Li, Jian Ren:
Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(3-4): 281-300 (2017) - [j34]Chao Yang, Min Zhang, Qi Jiang
, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren:
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive Mob. Comput. 41: 243-258 (2017) - [j33]Kai Zhou
, M. H. Afifi, Jian Ren
:
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. IEEE Trans. Inf. Forensics Secur. 12(11): 2518-2531 (2017) - [j32]Jian Li, Tongtong Li, Jian Ren
:
Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks. IEEE Trans. Inf. Theory 63(7): 4414-4429 (2017) - [c50]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang
, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
A client-based secure deduplication of multimedia data. ICC 2017: 1-6 - [i7]Jian Li, Yun Liu, Zhen-Jiang Zhang, Jian Ren, Nan Zhao:
Performance Optimization of Network Coding Based Communication and Reliable Storage in Internet of Things. CoRR abs/1703.03210 (2017) - [i6]Zhe Wang, Yu Zheng, David C. Zhu, Jian Ren, Tongtong Li:
Discrete Dynamic Causal Modeling and Its Relationship with Directed Information. CoRR abs/1709.06134 (2017) - [i5]Kai Zhou, Jian Ren:
PassBio: Privacy-Preserving User-Centric Biometric Authentication. CoRR abs/1711.04902 (2017) - 2016
- [j31]Yong Yu, Yi Mu, Rongxing Lu, Jian Ren:
Recent advances in security and privacy in large-scale networks. Concurr. Comput. Pract. Exp. 28(4): 1080-1082 (2016) - [j30]Leron Lightfoot, Yun Li, Jian Ren:
STaR: design and quantitative measurement of source-location privacy for wireless sensor networks. Secur. Commun. Networks 9(3): 220-228 (2016) - [j29]Jian Ren, Yun Li, Tingting Jiang, Tongtong Li:
Anonymous communication in overlay networks. Secur. Commun. Networks 9(3): 229-240 (2016) - [j28]Di Tang, Jian Ren:
A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network. IEEE Trans. Veh. Technol. 65(4): 2578-2588 (2016) - [c49]Kai Zhou
, Tianlong Song, Jian Ren, Tongtong Li:
Robust CDMA receiver design under disguised jamming. ICASSP 2016: 2179-2183 - [c48]Kai Zhou
, Jian Ren:
Secure outsourcing of scalar multiplication on elliptic curves. ICC 2016: 1-5 - [c47]Kai Zhou
, Jian Ren:
LinSOS: Secure outsourcing of linear computations based on affine mapping. ICC 2016: 1-5 - [c46]Kai Zhou
, Jian Ren:
Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud. ICCCN 2016: 1-9 - [i4]Kai Zhou, M. H. Afifi, Jian Ren:
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. CoRR abs/1602.08472 (2016) - 2015
- [j27]Chao Yang, Jianfeng Ma, Jian Ren:
Provable Ownership of Encrypted Files in De-duplication Cloud Storage. Ad Hoc Sens. Wirel. Networks 26(1-4): 43-72 (2015) - [j26]Yong Yu, Man Ho Au
, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo
, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Sec. 14(4): 307-318 (2015) - [j25]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of files in deduplication cloud storage. Secur. Commun. Networks 8(14): 2457-2468 (2015) - [j24]Di Tang, Tongtong Li, Jian Ren, Jie Wu:
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 960-973 (2015) - [c45]Mai Abdelhakim
, Zhaoxi Fang, Jian Ren, Tongtong Li:
Hybrid mobile access coordinated wireless sensor networks - Design and analysis. ChinaSIP 2015: 453-457 - [c44]Mai Abdelhakim
, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Reliable Communications over Multihop Networks under Routing Attacks. GLOBECOM 2015: 1-6 - [c43]Di Tang, Jian Ren:
A delay-aware and secure data forwarding scheme for urban sensing networks. ICC 2015: 3003-3007 - [c42]Jian Li, Tongtong Li, Jian Ren:
Rate-matched regenerating code in hostile networks. ICC 2015: 5728-5732 - [i3]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS Bound in Distributed Cloud Storage. CoRR abs/1510.01292 (2015) - [i2]Kai Zhou, Jian Ren:
CASO: Cost-Aware Secure Outsourcing of General Computational Problems. CoRR abs/1511.02375 (2015) - [i1]Jian Li, Tongtong Li, Jian Ren:
Optimal Construction of Regenerating Code through Rate-matching in Hostile Networks. CoRR abs/1511.02378 (2015) - 2014
- [j23]Ahmed Alahmadi, Mai Abdelhakim
, Jian Ren, Tongtong Li:
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. IEEE Trans. Inf. Forensics Secur. 9(5): 772-781 (2014) - [j22]Mai Abdelhakim
, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks. IEEE Trans. Parallel Distributed Syst. 25(4): 950-959 (2014) - [j21]Jian Li, Yun Li, Jian Ren, Jie Wu:
Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks. IEEE Trans. Parallel Distributed Syst. 25(5): 1223-1232 (2014) - [j20]Tongtong Li, Mai Abdelhakim
, Jian Ren:
N-Hop networks: a general framework for wireless systems. IEEE Wirel. Commun. 21(2): 98-105 (2014) - [c41]Jian Li, Tongtong Li, Jian Ren:
Secure regenerating code. GLOBECOM 2014: 770-774 - [c40]Tianlong Song, Zhaoxi Fang, Jian Ren, Tongtong Li:
Precoding for OFDM under disguised jamming. GLOBECOM 2014: 3958-3963 - [c39]Mai Abdelhakim
, Jian Ren, Tongtong Li:
Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. GLOBECOM 2014: 4616-4621 - [c38]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS bound in distributed cloud storage. INFOCOM 2014: 307-315 - [c37]Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. ISPEC 2014: 359-372 - 2013
- [j19]Jian Ren, Lein Harn:
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications. IEEE Trans. Wirel. Commun. 12(3): 1018-1025 (2013) - [c36]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of file in de-duplication cloud storage. GLOBECOM 2013: 695-700 - [c35]Jian Li, Tongtong Li, Jian Ren:
Combating network pollution attacks: A cascaded error-control coding approach. GLOBECOM 2013: 844-848 - [c34]Ahmed Alahmadi, Mai Abdelhakim
, Jian Ren, Tongtong Li:
Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. GLOBECOM 2013: 3229-3234 - [c33]Mai Abdelhakim
, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Architecture design of mobile access coordinated wireless sensor networks. ICC 2013: 1720-1724 - 2012
- [j18]Yun Li, Jian Ren, Jie Wu:
Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(7): 1302-1311 (2012) - [j17]Lei Zhang, Jian Ren, Tongtong Li:
Time-Varying Jamming Modeling and Classification. IEEE Trans. Signal Process. 60(7): 3902-3907 (2012) - [j16]Tongtong Li, Jian Ren, Xiaochen Tang:
Secure wireless monitoring and control systems for smart grid and smart home. IEEE Wirel. Commun. 19(3): 66-73 (2012) - [j15]Tingting Jiang, Tongtong Li, Jian Ren:
Toward secure cognitive communications in wireless networks. IEEE Wirel. Commun. 19(4): 82-88 (2012) - [c32]Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren:
Characterization of linear network coding for pollution detection. GLOBECOM 2012: 1066-1071 - [c31]Mai Abdelhakim
, Jian Ren, Tongtong Li:
Reliable OFDM system design under hostile multi-tone jamming. GLOBECOM 2012: 4290-4295 - [c30]Di Tang, Tongtong Li, Jian Ren:
Quantitative security and efficiency analysis of SEAR in wireless sensor networks. ICC 2012: 944-948 - [c29]Yun Li, Jian Li, Jian Ren, Jie Wu:
Providing hop-by-hop authentication and source privacy in wireless sensor networks. INFOCOM 2012: 3071-3075 - [c28]Mai Abdelhakim
, Jian Ren, Tongtong Li:
Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper). WASA 2012: 206-217 - 2011
- [j14]Lein Harn, Jian Ren:
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications. IEEE Trans. Wirel. Commun. 10(7): 2372-2379 (2011) - [c27]Wenbo Qiao, Jian Li, Jian Ren:
An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding. GLOBECOM 2011: 1-5 - [c26]Jian Ren, Di Tang:
Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c25]Mai Abdelhakim
, Lei Zhang, Jian Ren, Tongtong Li:
Cooperative sensing in cognitive networks under malicious attack. ICASSP 2011: 3004-3007 - 2010
- [j13]Jian Ren, Jie Wu:
Survey on anonymous communications in computer networks. Comput. Commun. 33(4): 420-431 (2010) - [j12]Jian Ren, Yun Li, Tongtong Li:
SPM: Source Privacy for Mobile Ad Hoc Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c24]Leron Lightfoot, Yun Li, Jian Ren:
Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing. GLOBECOM 2010: 1-5 - [c23]Di Tang, Tingting Jiang, Jian Ren:
Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks. GLOBECOM 2010: 1-5 - [c22]Huahui Wang, Jian Ren, Tongtong Li:
Resource Allocation with Load Balancing for Cognitive Radio Networks. GLOBECOM 2010: 1-5 - [c21]Yun Li, Jian Ren:
Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. INFOCOM 2010: 2660-2668 - [c20]Lei Zhang, Jian Ren, Tongtong Li:
A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping. WASA 2010: 235-244
2000 – 2009
- 2009
- [j11]Jian Ren:
A cryptographic watermarking technique for multimedia signals. Adv. Comput. Math. 31(1-3): 267-281 (2009) - [j10]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks. EURASIP J. Adv. Signal Process. 2009 (2009) - [j9]Lein Harn, Jian Ren, Changlu Lin:
Efficient identity-based GQ multisignatures. Int. J. Inf. Sec. 8(3): 205-210 (2009) - [j8]Lein Harn, Jian Ren, Changlu Lin:
Design of DL-based certificateless digital signatures. J. Syst. Softw. 82(5): 789-793 (2009) - [j7]Jian Ren:
An identity-based single-sign-on scheme for computer networks. Secur. Commun. Networks 2(3): 255-258 (2009) - [c19]Yun Li, Leron Lightfoot, Jian Ren:
Routing-based source-location privacy protection in wireless sensor networks. EIT 2009: 29-34 - [c18]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems. EIT 2009: 260-265 - [c17]Lei Zhang, Jian Ren, Tongtong Li:
Jamming Mitigation Techniques Based on Message-Driven Frequency Hopping. GLOBECOM 2009: 1-6 - [c16]