Jian Mao

Orcid: 0000-0003-1345-7408

According to our database1, Jian Mao authored at least 103 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Denoising low SNR electromagnetic conducted emissions using an improved DnCNN based mode.
J. Intell. Fuzzy Syst., February, 2024

SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems.
IEEE Internet Things J., February, 2024

2023
A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing.
IEEE Trans. Veh. Technol., December, 2023

Blind source separation of electromagnetic signals based on deep focusing U-Net.
J. Intell. Fuzzy Syst., November, 2023

Rolling Bearing Fault Diagnosis Method Based on Attention CNN and BiLSTM Network.
Neural Process. Lett., June, 2023

EScope: Effective Event Validation for IoT Systems Based on State Correlation.
Big Data Min. Anal., June, 2023

I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association.
IEEE Trans. Dependable Secur. Comput., 2023

Fast Algorithm for VVC Video Image Coding Based on Machine Learning.
Proceedings of the 5th International Conference on Robotics, 2023

An Improved CNN-LSTM Algorithm for Detection of DGA Domain Name.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

2022
Video Aficionado: We Know What You Are Watching.
IEEE Trans. Mob. Comput., 2022

Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages.
IEEE Internet Things J., 2022

SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors.
Neurocomputing, 2022

Deep Learning-based Road Crack Detection Technology.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

A denoising method based on CNN through multi-layer separation.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

Blind source separation of electromagnetic signals based on one-dimensional U-Net.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

Key Technologies of Electronic Perimeter System Based on Deep Learning.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022

2021
Empirical Analysis of Attribute Inference Techniques in Online Social Network.
IEEE Trans. Netw. Sci. Eng., 2021

A method for detecting image information leakage risk from electromagnetic emission of computer monitors.
J. Intell. Fuzzy Syst., 2021

Development of a New Tabular Zenith Tropospheric Delay Model for Real-Time GNSS Applications.
IEEE Access, 2021

Development and Assessment of Improved Global Pressure and Temperature Series Models.
IEEE Access, 2021

An improved social attribute inference scheme based on multi-attribute correlation.
Proceedings of the 2021 IEEE SmartWorld, 2021

WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

2020
DNS anti-attack machine learning model for DGA domain name detection.
Phys. Commun., 2020

An inaudible voice attack to context-based device authentication in smart IoT systems.
J. Syst. Archit., 2020

Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems.
IEEE Internet Things J., 2020

Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks.
Int. J. Sens. Networks, 2020

A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods.
IEEE Access, 2020

Research on image enhancement algorithm based on Retinex theory.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

A Survey of Moving Target Detection Methods Based on Machine Vision.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Optimization analysis of assembly system based on digital twin and deep learning.
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020

Mixed-Models Method Based on Machine Learning in Detecting WebShell Attack.
Proceedings of the CIPAE 2020: 2020 International Conference on Computers, 2020

2019
Feasibility Study on Temperature Distribution Measurement Method of Thrust Sliding Bearing Bush Based on FBG Quasi-Distributed Sensing.
Sensors, 2019

Anomalous Power-Usage Behavior Detection from Smart Home Wireless Communications.
J. Commun. Inf. Networks, 2019

Phishing page detection via learning classifiers from page layout feature.
EURASIP J. Wirel. Commun. Netw., 2019

An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance.
IEEE Access, 2019

Identification of Multi-Dimensional Electromagnetic Information Leakage Using CNN.
IEEE Access, 2019

Detecting Android Side Channel Probing Attacks Based on System States.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Cloud-based Multi-core Architecture against DNS Attacks.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

Transforming knowledge into intelligence The research on Wisdom Class Teaching Theory and Practice.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

2018
Sensitivity Enhancement of FBG-Based Strain Sensor.
Sensors, 2018

An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature.
Secur. Commun. Networks, 2018

A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN.
Secur. Commun. Networks, 2018

Application of learning algorithms in smart home IoT system security.
Math. Found. Comput., 2018

Understanding structure-based social network de-anonymization techniques via empirical analysis.
EURASIP J. Wirel. Commun. Netw., 2018

On the Security of a Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018

Detecting Malicious Behaviors in JavaScript Applications.
IEEE Access, 2018

OSCO: An Open Security-Enhanced Compatible OpenFlow Platform.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Robust Detection of Android UI Similarity.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking.
J. Signal Process. Syst., 2017

A position-aware Merkle tree for dynamic cloud data integrity verification.
Soft Comput., 2017

Toward Exposing Timing-Based Probing Attacks in Web Applications.
Sensors, 2017

Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment.
Secur. Commun. Networks, 2017

Management System for Dam-Break Hazard Mapping in a Complex Basin Environment.
ISPRS Int. J. Geo Inf., 2017

Anonymous multi-receiver broadcast encryption scheme with strong security.
Int. J. Embed. Syst., 2017

Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems.
Int. J. Commun. Syst., 2017

Method for Detecting electromagnetic Information Leakage from Computer Monitor.
Control. Intell. Syst., 2017

Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017

Phishing Website Detection Based on Effective CSS Features of Web Pages.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Privilege Leakage and Information Stealing through the Android Task Mechanism.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Deeply Understanding Structure-based Social Network De-anonymization.
Proceedings of the 2017 International Conference on Identification, 2017

Detecting Phishing Websites via Aggregation Analysis of Page Layouts.
Proceedings of the 2017 International Conference on Identification, 2017

Enabling practical experimentation in cyber-security training.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Attack on Chen <i>et al.</i>'s certificateless aggregate signature scheme.
Secur. Commun. Networks, 2016

Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model.
J. Inf. Sci. Eng., 2016

Detecting injected behaviors in HTML5-based Android applications.
J. High Speed Networks, 2016

Automatic permission inference for hybrid mobile apps.
J. High Speed Networks, 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Gener. Comput. Syst., 2016

Efficient public key encryption with revocable keyword search in cloud computing.
Clust. Comput., 2016

IPad: ID-based public auditing for the outsourced data in the standard model.
Clust. Comput., 2016

Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure.
Proceedings of the Provable Security, 2016

A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications.
Proceedings of the International Conference on Identification, 2016

Design and implement of a MCU based random number generater.
Proceedings of the 11th International Conference on Computer Science & Education, 2016

On the security of a dynamic-hash-table based public auditing protocol.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

NSV-GUARD: Constructing Secure Routing Paths in Software Defined Networking.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
A Multi-Scale Fuzzy Spatial Analysis Framework for Large Data Based on IT2 FS.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2015

Rating cloud storage service by collaborative remote data checking.
Int. J. High Perform. Comput. Netw., 2015

An improved anonymous multi-receiver identity-based encryption scheme.
Int. J. Commun. Syst., 2015

Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning.
Comput. Secur., 2015

Information Leakage from Computer Based on electromagnetic radiation.
Control. Intell. Syst., 2015

An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systems.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Efficient public verification proof of retrievability scheme in cloud.
Clust. Comput., 2014

Hierarchical Solution for Access Control and Authentication in Software Defined Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Website Credibility Assessment Scheme Based on Page Association.
Proceedings of the Information Security Practice and Experience, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
On the security of an ID-based anonymous proxy signature scheme and its improved scheme.
Int. J. Embed. Syst., 2013

BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Rating Web Pages Using Page-Transition Evidence.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

2012
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Another Efficient Proxy Signature Scheme in the Standard Model.
J. Inf. Sci. Eng., 2011

Three-axis NC milling simulation based on adaptive triangular mesh.
Comput. Ind. Eng., 2011

NIST Cloud Computing Reference Architecture.
Proceedings of the World Congress on Services, 2011

Research on Yangtze River Dangerous Articles Logistics Port Hierarchical Layout Evaluation of Jiangsu Province Based on Disaster Theory.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2009
A novel identity-based multi-signcryption scheme.
Comput. Commun., 2009

2008
Ergodic Capacity of LTE Downlink Multiuser MIMO Systems.
Proceedings of IEEE International Conference on Communications, 2008

2007
A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007

A Novel Verifiably Encrypted Signature Scheme Without Random Oracle.
Proceedings of the Information Security Practice and Experience, 2007

Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Linkability Analysis of Some Blind Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

1995
Sliding-exponential window RLS algorithm and its square-root method's DFE for the TDMA digital mobile radio.
Proceedings of the 6th IEEE International Symposium on Personal, 1995


  Loading...