Jia Yu

According to our database1, Jia Yu authored at least 160 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A framework of experimental transiogram modelling for Markov chain geostatistical simulation of landscape categories.
Computers, Environment and Urban Systems, 2019

Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2019

Privacy-preserving incentive and rewarding scheme for crowd computing in social media.
Inf. Sci., 2019

ULW-DMM: An Effective Topic Modeling Method for Microblog Short Text.
IEEE Access, 2019

2018
Learning distributed sentence representations for story segmentation.
Signal Processing, 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

Provable Multiple-Replica Dynamic Data Possession for Big Data Storage in Cloud Computing.
I. J. Network Security, 2018

Integrating multi-agent evacuation simulation and multi-criteria evaluation for spatial allocation of urban emergency shelters.
International Journal of Geographical Information Science, 2018

Tibetan Weibo User Group Division Based on Semantic Information in the Era of Big Data.
Complexity, 2018

CLDA: An Effective Topic Model for Mining User Interest Preference under Big Data Background.
Complexity, 2018

Enabling secure auditing and deduplicating data without owner-relationship exposure in cloud storage.
Cluster Computing, 2018

Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing.
IEEE Access, 2018

Enabling Efficient Verifiable Fuzzy Keyword Search Over Encrypted Data in Cloud Computing.
IEEE Access, 2018

GeoSparkViz: a scalable geospatial data visualization framework in the apache spark ecosystem.
Proceedings of the 30th International Conference on Scientific and Statistical Database Management, 2018

Leveraging the Power of Component-based Development for Front-End Components: Insights from a Study of React Applications (S).
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Properties Emulation on TD-LTE Electric Power Wireless Private.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Mobile VR Game Design for Stroke Rehabilitation.
Proceedings of the Cross-Cultural Design. Applications in Cultural Heritage, Creativity and Social Development, 2018

Coverage Analysis in TD-LTE Wireless Private Networks for Power Systems: A 3D Ray-Tracing Approach.
Proceedings of the 2018 IEEE International Conference on Big Data and Smart Computing, 2018

Design of Audio system for the 4K-UHD Studio of Communication University of China.
Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science, 2018

2017
Strong Key-Exposure Resilient Auditing for Secure Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

SRC: geospatial visual analytics belongs to database systems: the BABYLON approach.
SIGSPATIAL Special, 2017

RAID v2.0: an updated resource of RNA-associated interactions across organisms.
Nucleic Acids Research, 2017

How to securely outsource the inversion modulo a large composite number.
Journal of Systems and Software, 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Network and Computer Applications, 2017

An Efficient Symmetric Searchable Encryption Scheme for Cloud Storage.
J. Internet Serv. Inf. Secur., 2017

A hybrid neural network hidden Markov model approach for automatic story segmentation.
J. Ambient Intelligence and Humanized Computing, 2017

Enabling efficient and verifiable multi-keyword ranked search over encrypted cloud data.
Inf. Sci., 2017

Remote data possession checking with privacy-preserving authenticators for cloud storage.
Future Generation Comp. Syst., 2017

Knowledge entity learning and representation for ontology matching based on deep neural networks.
Cluster Computing, 2017

Probabilistic Risk Analysis of Diversion Tunnel Construction Simulation.
Comp.-Aided Civil and Infrastruct. Engineering, 2017

Analysis of Crowdsourcing Based Multiple Cellular Network: A Game Theory Approach.
Proceedings of the Wireless Internet - 10th International Conference, 2017

Indexing the Pickup and Drop-Off Locations of NYC Taxi Trips in PostgreSQL - Lessons from the Road.
Proceedings of the Advances in Spatial and Temporal Databases, 2017

Hippo in Action: Scalable Indexing of a Billion New York City Taxi Trips and Beyond.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Fault Attack on an Improved CRT-RSA Algorithm with the Modulus Chaining Method.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Topic embedding of sentences for story segmentation.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

An end-to-end neural network approach to story segmentation.
Proceedings of the 2017 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wireless Personal Communications, 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wireless Networks, 2016

Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates.
IEEE Trans. Information Forensics and Security, 2016

Two Birds, One Stone: A Fast, yet Lightweight, Indexing Scheme for Modern Database Systems.
PVLDB, 2016

Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability.
Journal of Systems and Software, 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Network and Computer Applications, 2016

Access-Authorizing and Privacy-Preserving Auditing with Group Dynamic for Shared Cloud Data.
TIIS, 2016

IRIBE: Intrusion-resilient identity-based encryption.
Inf. Sci., 2016

Cross-Entropy-Based Energy-Efficient Radio Resource Management in HetNets with Coordinated Multiple Points.
Information, 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
IJWIN, 2016

A public cloud storage auditing scheme for resource-constrained clients.
IJHPSA, 2016

Bibliometrics course offerings by library and information science programs in China.
Education for Information, 2016

Diffusion-based EM gradient algorithm for density estimation in sensor networks.
Proceedings of the 17th IEEE International Workshop on Signal Processing Advances in Wireless Communications, 2016

A CORDIC with Unified Rotation Strategy.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Substrate thickness effect on transformer.
Proceedings of the International Symposium on Integrated Circuits, 2016

A DNN-HMM Approach to Story Segmentation.
Proceedings of the Interspeech 2016, 2016

A demonstration of GeoSpark: A cluster computing framework for processing big spatial data.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Enabling Cloud Storage Auditing With Key-Exposure Resistance.
IEEE Trans. Information Forensics and Security, 2015

An Efficient Adaptive Angle-Doppler Compensation Approach for Non-Sidelooking Airborne Radar STAP.
Sensors, 2015

Improving write amplification in a virtualized and multimedia SSD system.
Multimedia Tools Appl., 2015

Visual Analysis of Multimodal Movie Network Data Based on the Double-Layered View.
IJDSN, 2015

A novel low-power high-efficiency 3-state filterless bang-bang class D amplifier.
Proceedings of the 2015 IEEE International Conference on Electronics, 2015

Energy-efficient radio resource management in a HetNet downlink system with JT CoMP.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

A uniform framework for network selection in Cognitive Radio Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Language independent query-by-example spoken term detection using N-best phone sequences and partial matching.
Proceedings of the 2015 IEEE International Conference on Acoustics, 2015

GeoSpark: a cluster computing framework for processing large-scale spatial data.
Proceedings of the 23rd SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2015

Symmetric-Key Based Proofs of Retrievability Supporting Public Verification.
Proceedings of the Computer Security - ESORICS 2015, 2015

Space-time adaptive monopulse for RD-STAP parameters estimation.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

A density peak clustering approach to unsupervised acoustic subword units discovery.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2015

A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation.
Proceedings of the 10th International Conference on P2P, 2015

Analysis and Improvement of a Verifiable Phrase Search over Encrypted Data in a Single Phrase.
Proceedings of the 10th International Conference on P2P, 2015

A Novel Privacy Preserving Keyword Search Scheme over Encrypted Cloud Data.
Proceedings of the 10th International Conference on P2P, 2015

2014
KNN-based weighted rough ν-twin support vector machine.
Knowl.-Based Syst., 2014

Applying link stability estimation mechanism to multicast routing in MANETs.
Journal of Systems Architecture - Embedded Systems Design, 2014

Radio Resource Management of CoMP System in HetNet under Power and Backhaul Constraints.
TIIS, 2014

One forward-secure signature scheme using bilinear maps and its applications.
Inf. Sci., 2014

Key-insulated aggregate signature.
Frontiers Comput. Sci., 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Probabilistic assessment of the impact of distributed generation and non-linear load on harmonic propagation in power networks.
Proceedings of the 2014 Power Systems Computation Conference, 2014

The NNI Query-by-Example System for MediaEval 2014.
Proceedings of the Working Notes Proceedings of the MediaEval 2014 Workshop, 2014

Power allocation for CoMP system with backhaul limitation.
Proceedings of the IEEE International Conference on Communications, 2014

User-satisfaction-based weighted SLNR beamforming in TD-LTE-A system.
Proceedings of the IEEE International Conference on Communications, 2014

Separate-combine recovery for compressed sensing of large images.
Proceedings of the IEEE International Conference on Communications, 2014

Incentive mechanism design for crowdsourcing-based cooperative transmission.
Proceedings of the IEEE Global Communications Conference, 2014

A History-Based Dynamic Random Software Testing.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

Dynamic Random Testing with Parameter Adjustment.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

The Analysis of Compressive Sensing Theory.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
An ID-Based Short Group Signature Scheme.
JSW, 2013

TUMIR: an experimentally supported database of microRNA deregulation in various cancers.
J. Clinical Bioinformatics, 2013

Security analysis and improvement of two verifiable multi-secret sharing schemes.
IJSN, 2013

Enabling polarisation filtering in wireless communications: models, algorithms and characteristics.
IET Communications, 2013

The spatial framework for weight sensitivity analysis in AHP-based multi-criteria decision making.
Environmental Modelling and Software, 2013

A Performance Optimization Mechanism for SSD in Virtualized Environment.
Comput. J., 2013

Diibuted componentwise EM algorithm or mixture models in sensor networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Intrusion-resilient identity-based signature: Security definition and construction.
Journal of Systems and Software, 2012

Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
J. Inf. Sci. Eng., 2012

A Practical ID-Based Group Signature Scheme.
JCP, 2012

Erratum to the paper: Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2012

A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Improving the throughput and delay performance of network processors by applying push model.
Proceedings of the 20th IEEE International Workshop on Quality of Service, 2012

Network-in-the-Loop Simulation Platform for Control System.
Proceedings of the AsiaSim 2012, 2012

Vtrim: A Performance Optimization Mechanism for SSD in Virtualized Environment.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Modeling and implementation of classification rule discovery by ant colony optimisation for spatial land-use suitability assessment.
Computers, Environment and Urban Systems, 2011

An efficient fault-tolerant routing algorithm in bijective connection networks with restricted faulty edges.
Theor. Comput. Sci., 2011

ID-Based Sequential Aggregate Signatures.
JSW, 2011

A local construction of the Smith normal form of a matrix polynomial.
J. Symb. Comput., 2011

New Forward-Secure Signature Scheme with Untrusted Update.
J. Inf. Sci. Eng., 2011

A New Approach to Group Signature Schemes.
JCP, 2011

Forward-secure identity-based signature: Security notions and construction.
Inf. Sci., 2011

Embedding meshes into twisted-cubes.
Inf. Sci., 2011

Efficient unicast in bijective connection networks with the restricted faulty node set.
Inf. Sci., 2011

Cellular automata-based spatial multi-criteria land suitability simulation for irrigated agriculture.
International Journal of Geographical Information Science, 2011

Forward-Secure Identity-Based Public-Key Encryption without Random Oracles.
Fundam. Inform., 2011

Probabilistic Path Selection in Mobile Wireless Sensor Networks for Stochastic Events Detection.
Proceedings of the Ubiquitous Intelligence and Computing - 8th International Conference, 2011

Two Protocols for Member Revocation in Secret Sharing Schemes.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

Security Analysis of an RSA Key Generation Algorithm with a Large Private Key.
Proceedings of the Information Security, 14th International Conference, 2011

2010
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes.
JNW, 2010

Design and Implementation of Mobile Sink Node in SDMA Applications.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010

Channel reservation and queuing in Low Earth Orbit mobile satellite system.
Proceedings of the International Conference on Ultra Modern Telecommunications, 2010

A Novel Method of DOA Estimation Based on Subarray Beamforming for Uniform Circular Arrays.
Proceedings of the 2010 International Conference on Signal Acquisition and Processing, 2010

Experience on Applying Push Model to Packet Processors in High Performance Routers.
Proceedings of the Global Communications Conference, 2010

2009
A Forward Secure Threshold Signature Scheme Based on the Structure of Binary Tree.
JSW, 2009

Design and Implementation of a Mobile GIS for Field Data Collection.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
How to Construct Forward Secure Single-Server, Multi-Server and Threshold-Server Assisted Signature Schemes Using Bellare-Miner Scheme.
JCM, 2008

Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures.
JCM, 2008

A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005.
Proceedings of the Provable Security, Second International Conference, 2008

Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps.
Proceedings of the Provable Security, Second International Conference, 2008

How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme.
Proceedings of the Intelligence and Security Informatics, 2008

Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Revisiting the Cache Effect on Multicore Multithreaded Network Processors.
Proceedings of the 11th Euromicro Conference on Digital System Design: Architectures, 2008

A Hybrid Recommendation Architecture for Mobile Commerce System.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

The Design of an Open Hybrid Recommendation System for Mobile Commerce.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

Security Research on an Information-Theoretically Secure Secret Key Agreement Using LDPC Matrices.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

2007
Conserving network processor power consumption by exploiting traffic variability.
TACO, 2007

Protecting Against Key Escrow and Key Exposure in Identity-Based Cryptosystem.
Proceedings of the Theory and Applications of Models of Computation, 2007

New Left-to-Right Radix- r Signed-Digit Recoding Algorithm for Pairing-Based Cryptosystems.
Proceedings of the Theory and Applications of Models of Computation, 2007

Publicly Verifiable Secret Sharing with Enrollment Ability.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Key-Insulated Group Signature Scheme with Verifier-Local Revocation.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

An Approach to Convert Any Threshold Signature into a Threshold Group Signature.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Proceedings of the 8th ACIS International Conference on Software Engineering, 2007

A New Identity-Based Blind Signature Scheme with Batch Verifications.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Two Threshold Multisignature Schemes from Bilinear Pairings.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Key-Insulated Group Signature Scheme with Selective Revocation.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Multi-objective planning for workflow execution on Grids.
Proceedings of the 8th IEEE/ACM International Conference on Grid Computing (GRID 2007), 2007

Program Mapping onto Network Processors by Recursive Bipartitioning and Refining.
Proceedings of the 44th Design Automation Conference, 2007

Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A Market-Oriented Grid Directory Service for Publication and Discovery of Grid Service Providers and their Services.
The Journal of Supercomputing, 2006

Scheduling scientific workflow applications with deadline and budget constraints using genetic algorithms.
Scientific Programming, 2006

Improved generalized Atkin algorithm for computing square roots in finite fields.
Inf. Process. Lett., 2006

Forward Secure Threshold Signature Scheme from Bilinear Pairings.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
A taxonomy of scientific workflow systems for grid computing.
SIGMOD Record, 2005

A low energy cache design for multimedia applications exploiting set access locality.
Journal of Systems Architecture, 2005

A Taxonomy of Workflow Management Systems for Grid Computing.
J. Grid Comput., 2005

Enhancing Network Processor Simulation Speed with Statistical Input Sampling.
Proceedings of the High Performance Embedded Architectures and Compilers, 2005

Cost-Based Scheduling of Scientific Workflow Application on Utility Grids.
Proceedings of the First International Conference on e-Science and Grid Technologies (e-Science 2005), 2005

Assertion-Based Design Exploration of DVS in Network Processor Architectures.
Proceedings of the 2005 Design, 2005

Low power network processor design using clock gating.
Proceedings of the 42nd Design Automation Conference, 2005

2004
Assertion-based power/performance analysis of network processor architectures.
Proceedings of the Ninth IEEE International High-Level Design Validation and Test Workshop 2004, 2004

A Novel Architecture for Realizing Grid Workflow using Tuple Spaces.
Proceedings of the 5th International Workshop on Grid Computing (GRID 2004), 2004

2003
JINI/J2EE Bridge for Large-scale IP Phone Services.
Proceedings of the 10th Asia-Pacific Software Engineering Conference (APSEC 2003), 2003


  Loading...