Fan Jiang

Affiliations:
  • University of Science and Technology of China, School of Computer Science and Technology, Hefei, China


According to our database1, Fan Jiang authored at least 26 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Image steganography using texture features and GANs.
Proceedings of the International Joint Conference on Neural Networks, 2019

Detecting and Resolving Flow Entries Collisions in Software Defined Networks.
Proceedings of the CSAI 2019: 2019 3rd International Conference on Computer Science and Artificial Intelligence, 2019

2018
A Novel Android Malware Detection Approach Using Operand Sequences.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

2017
An Ensemble Model for Diabetes Diagnosis in Large-scale and Imbalanced Dataset.
Proceedings of the Computing Frontiers Conference, 2017

FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Strengthen Software-Defined Network in Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

AALRSMF: An Adaptive Learning Rate Schedule for Matrix Factorization.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Find Referral Social Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

ADKAM: A-Diversity K-Anonymity Model via Microaggregation.
Proceedings of the Information Security Practice and Experience, 2015

An Optimization to CHARM Algorithm for Mining Frequent Closed Itemsets.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2013
Effective Method for Promoting Viral Marketing in Microblog.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

DroidFuzzer: Fuzzing the Android Apps with Intent-Filter Tag.
Proceedings of the 11th International Conference on Advances in Mobile Computing & Multimedia, 2013

Static Detection of Dangerous Behaviors in Android Apps.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Novel user influence measurement based on user interaction in microblog.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
AUTrust: A Practical Trust Measurement for Adjacent Users in Social Networks.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

InfluenceRank: An Efficient Social Influence Measurement for Millions of Users in Microblog.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2011
LoongChecker: Practical Summary-Based Semi-simulation to Detect Vulnerability in Binary Code.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
PDVDS: A Pattern-Driven Software Vulnerability Detection System.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2008
DBTG: Demand-Driven Backtracking Test Generation.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Providing Balanced and Enhanced Transmission for WLANs with Multi-beam Access Point.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

2006
Brief Announcement: Exploration and Mitigation of Deafness Problems in Directional Antennas Based Wireless Ad-Hoc Networks.
Proceedings of the Stabilization, 2006

A Probabilistic Energy-Efficient Routing (PEER) Scheme for Ad-hoc Sensor Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006

A new method of generating synchronizable test sequences that detect output-shifting faults based on multiple UIO sequences.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

A New Media Access Control Protocol for Ad-Hoc Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, Second International Conference, 2006

Testing a Distributed System: Generating Test Sequences without Potential Controllability and Observability Problems.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

2005
Generating Minimal Synchronizable Test Sequence That Detects Output-Shifting Faults.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005


  Loading...