Jian Mao
Orcid: 0000-0003-1345-7408
According to our database1,
Jian Mao
authored at least 103 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Denoising low SNR electromagnetic conducted emissions using an improved DnCNN based mode.
J. Intell. Fuzzy Syst., February, 2024
SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems.
IEEE Internet Things J., February, 2024
2023
A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing.
IEEE Trans. Veh. Technol., December, 2023
J. Intell. Fuzzy Syst., November, 2023
Neural Process. Lett., June, 2023
Big Data Min. Anal., June, 2023
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association.
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 5th International Conference on Robotics, 2023
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
2022
Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages.
IEEE Internet Things J., 2022
Neurocomputing, 2022
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
A method for detecting image information leakage risk from electromagnetic emission of computer monitors.
J. Intell. Fuzzy Syst., 2021
Development of a New Tabular Zenith Tropospheric Delay Model for Real-Time GNSS Applications.
IEEE Access, 2021
Development and Assessment of Improved Global Pressure and Temperature Series Models.
IEEE Access, 2021
Proceedings of the 2021 IEEE SmartWorld, 2021
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
Phys. Commun., 2020
An inaudible voice attack to context-based device authentication in smart IoT systems.
J. Syst. Archit., 2020
IEEE Internet Things J., 2020
Int. J. Sens. Networks, 2020
IEEE Access, 2020
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020
Proceedings of the EITCE 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020, 2020
Proceedings of the CIPAE 2020: 2020 International Conference on Computers, 2020
2019
Feasibility Study on Temperature Distribution Measurement Method of Thrust Sliding Bearing Bush Based on FBG Quasi-Distributed Sensing.
Sensors, 2019
J. Commun. Inf. Networks, 2019
EURASIP J. Wirel. Commun. Netw., 2019
An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019
Proceedings of the 14th International Conference on Computer Science & Education, 2019
Transforming knowledge into intelligence The research on Wisdom Class Teaching Theory and Practice.
Proceedings of the 14th International Conference on Computer Science & Education, 2019
2018
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Math. Found. Comput., 2018
Understanding structure-based social network de-anonymization techniques via empirical analysis.
EURASIP J. Wirel. Commun. Netw., 2018
Comput. J., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
2017
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking.
J. Signal Process. Syst., 2017
Soft Comput., 2017
Secur. Commun. Networks, 2017
ISPRS Int. J. Geo Inf., 2017
Int. J. Embed. Syst., 2017
Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems.
Int. J. Commun. Syst., 2017
Control. Intell. Syst., 2017
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017
2016
Secur. Commun. Networks, 2016
J. Inf. Sci. Eng., 2016
J. High Speed Networks, 2016
Future Gener. Comput. Syst., 2016
Clust. Comput., 2016
Clust. Comput., 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the Provable Security, 2016
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications.
Proceedings of the International Conference on Identification, 2016
Proceedings of the 11th International Conference on Computer Science & Education, 2016
Proceedings of the 9th International Congress on Image and Signal Processing, 2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2015
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2015
Int. J. High Perform. Comput. Netw., 2015
Int. J. Commun. Syst., 2015
Comput. Secur., 2015
Control. Intell. Syst., 2015
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015
Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systems.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015
2014
Clust. Comput., 2014
Hierarchical Solution for Access Control and Authentication in Software Defined Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
2013
On the security of an ID-based anonymous proxy signature scheme and its improved scheme.
Int. J. Embed. Syst., 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013
2012
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
J. Inf. Sci. Eng., 2011
Comput. Ind. Eng., 2011
Proceedings of the World Congress on Services, 2011
Research on Yangtze River Dangerous Articles Logistics Port Hierarchical Layout Evaluation of Jiangsu Province Based on Disaster Theory.
Proceedings of the Applied Informatics and Communication - International Conference, 2011
2009
2008
Proceedings of IEEE International Conference on Communications, 2008
2007
Proceedings of the Static Analysis, 14th International Symposium, 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
1995
Sliding-exponential window RLS algorithm and its square-root method's DFE for the TDMA digital mobile radio.
Proceedings of the 6th IEEE International Symposium on Personal, 1995