Jing Chen
Jing Chen
Professor, Wuhan University
Verified email at
Cited by
Cited by
Towards decentralized IoT security enhancement: A blockchain approach
Y Qian, Y Jiang, J Chen, Y Zhang, J Song, M Zhou, M Pustišek
Computers & Electrical Engineering 72, 266-273, 2018
Uncovering the face of android ransomware: Characterization and real-time detection
J Chen, C Wang, Z Zhao, K Chen, R Du, GJ Ahn
IEEE Transactions on Information Forensics and Security 13 (5), 1286-1300, 2017
Certchain: Public and efficient certificate audit based on blockchain for tls connections
J Chen, S Yao, Q Yuan, K He, S Ji, R Du
IEEE INFOCOM 2018-IEEE conference on computer communications, 2060-2068, 2018
Identification of kidney transplant recipients with coronavirus disease 2019
H Zhang, Y Chen, Q Yuan, QX Xia, XP Zeng, JT Peng, J Liu, XY Xiao, ...
European urology 77 (6), 742-747, 2020
Privacy protection and intrusion avoidance for cloudlet-based medical data sharing
M Chen, Y Qian, J Chen, K Hwang, S Mao, L Hu
IEEE transactions on Cloud computing 8 (4), 1274-1283, 2016
Privacy-aware service placement for mobile edge computing via federated learning
Y Qian, L Hu, J Chen, X Guan, MM Hassan, A Alelaiwi
Information Sciences 505, 562-570, 2019
DeyPoS: Deduplicatable dynamic proof of storage for multi-user environments
K He, J Chen, R Du, Q Wu, G Xue, X Zhang
IEEE Transactions on Computers 65 (12), 3631-3645, 2016
Backdoor pre-trained models can transfer to all
L Shen, S Ji, X Zhang, J Li, J Chen, J Shi, C Fang, J Yin, T Wang
arXiv preprint arXiv:2111.00197, 2021
Secure enforcement in cognitive internet of vehicles
Y Qian, M Chen, J Chen, MS Hossain, A Alamri
IEEE Internet of Things Journal 5 (2), 1242-1250, 2018
Blind filtering at third parties: An efficient privacy-preserving framework for location-based services
J Chen, K He, Q Yuan, M Chen, R Du, Y Xiang
IEEE Transactions on Mobile Computing 17 (11), 2524-2535, 2018
Secure dynamic searchable symmetric encryption with constant client storage cost
K He, J Chen, Q Zhou, R Du, Y Xiang
IEEE Transactions on Information Forensics and Security 16, 1538-1549, 2020
Dominating Set and Network Coding-based Routing in Wireless Mesh Networks
J Chen, K He, R Du, Y Xiang, M Zheng, Q Yuan
IEEE Transactions on Parallel and Distributed System, 2014
Dynamic group-oriented provable data possession in the cloud
K He, J Chen, Q Yuan, S Ji, D He, R Du
IEEE Transactions on Dependable and Secure Computing 18 (3), 1394-1408, 2019
Batch identification game model for invalid signatures in wireless mobile networks
J Chen, K He, Q Yuan, G Xue, R Du, L Wang
IEEE Transactions on Mobile Computing 16 (6), 1530-1543, 2016
Smartseed: Smart seed generation for efficient fuzzing
C Lyu, S Ji, Y Li, J Zhou, J Chen, J Chen
arXiv preprint arXiv:1807.02606, 2018
XAuth: Efficient privacy-preserving cross-domain authentication
J Chen, Z Zhan, K He, R Du, D Wang, F Liu
IEEE Transactions on Dependable and Secure Computing 19 (5), 3301-3311, 2021
Liveness is not enough: Enhancing fingerprint authentication with behavioral biometrics to defeat puppet attacks
C Wu, K He, J Chen, Z Zhao, R Du
29th USENIX Security Symposium (USENIX Security 20), 2219-2236, 2020
Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters
W Liu, W Du, J Chen, W Wang, G Zeng
Journal of Network and Computer Applications, 2013
PBCert: privacy-preserving blockchain-based certificate status validation toward mass storage management
S Yao, J Chen, K He, R Du, T Zhu, X Chen
IEEE Access 7, 6117-6128, 2018
EliMFS: achieving efficient, leakage-resilient, and multi-keyword fuzzy search on encrypted cloud data
J Chen, K He, L Deng, Q Yuan, R Du, Y Xiang, J Wu
IEEE Transactions on Services Computing 13 (6), 1072-1085, 2017
The system can't perform the operation now. Try again later.
Articles 1–20