Jian Mao

According to our database1, Jian Mao authored at least 63 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Phishing page detection via learning classifiers from page layout feature.
EURASIP J. Wireless Comm. and Networking, 2019

Detecting Android Side Channel Probing Attacks Based on System States.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

2018
Sensitivity Enhancement of FBG-Based Strain Sensor.
Sensors, 2018

An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature.
Security and Communication Networks, 2018

A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN.
Security and Communication Networks, 2018

Understanding structure-based social network de-anonymization techniques via empirical analysis.
EURASIP J. Wireless Comm. and Networking, 2018

On the Security of a Pairing-Free Certificateless Signcryption Scheme.
Comput. J., 2018

Detecting Malicious Behaviors in JavaScript Applications.
IEEE Access, 2018

OSCO: An Open Security-Enhanced Compatible OpenFlow Platform.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Robust Detection of Android UI Similarity.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
A position-aware Merkle tree for dynamic cloud data integrity verification.
Soft Comput., 2017

Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment.
Security and Communication Networks, 2017

Management System for Dam-Break Hazard Mapping in a Complex Basin Environment.
ISPRS Int. J. Geo-Information, 2017

Anonymous multi-receiver broadcast encryption scheme with strong security.
IJES, 2017

Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems.
Int. J. Communication Systems, 2017

Method for Detecting electromagnetic Information Leakage from Computer Monitor.
Control and Intelligent Systems, 2017

Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017

Phishing Website Detection Based on Effective CSS Features of Web Pages.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Privilege Leakage and Information Stealing through the Android Task Mechanism.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

Deeply Understanding Structure-based Social Network De-anonymization.
Proceedings of the 2017 International Conference on Identification, 2017

Detecting Phishing Websites via Aggregation Analysis of Page Layouts.
Proceedings of the 2017 International Conference on Identification, 2017

Enabling practical experimentation in cyber-security training.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2016
Attack on Chen et al.'s certificateless aggregate signature scheme.
Security and Communication Networks, 2016

Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model.
J. Inf. Sci. Eng., 2016

Detecting injected behaviors in HTML5-based Android applications.
J. High Speed Networks, 2016

Automatic permission inference for hybrid mobile apps.
J. High Speed Networks, 2016

Provably secure robust optimistic fair exchange of distributed signatures.
Future Generation Comp. Syst., 2016

Efficient public key encryption with revocable keyword search in cloud computing.
Cluster Computing, 2016

IPad: ID-based public auditing for the outsourced data in the standard model.
Cluster Computing, 2016

Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Toward Exposing Timing-Based Probing Attacks in Web Applications.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure.
Proceedings of the Provable Security, 2016

A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications.
Proceedings of the International Conference on Identification, 2016

On the security of a dynamic-hash-table based public auditing protocol.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

NSV-GUARD: Constructing Secure Routing Paths in Software Defined Networking.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2015
A Multi-Scale Fuzzy Spatial Analysis Framework for Large Data Based on IT2 FS.
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2015

Rating cloud storage service by collaborative remote data checking.
IJHPCN, 2015

An improved anonymous multi-receiver identity-based encryption scheme.
Int. J. Communication Systems, 2015

Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning.
Computers & Security, 2015

Information Leakage from Computer Based on electromagnetic radiation.
Control and Intelligent Systems, 2015

An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom 2015, 2015

Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systems.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
Efficient public verification proof of retrievability scheme in cloud.
Cluster Computing, 2014

Hierarchical Solution for Access Control and Authentication in Software Defined Networks.
Proceedings of the Network and System Security - 8th International Conference, 2014

A Website Credibility Assessment Scheme Based on Page Association.
Proceedings of the Information Security Practice and Experience, 2014

Who Is Touching My Cloud.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
On the security of an ID-based anonymous proxy signature scheme and its improved scheme.
IJES, 2013

BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Finding Key Leakage in Hierarchical Distribution of Encrypted Data.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Rating Web Pages Using Page-Transition Evidence.
Proceedings of the Information and Communications Security - 15th International Conference, 2013

A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications.
Proceedings of the 2013 18th International Conference on Engineering of Complex Computer Systems, 2013

2012
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Another Efficient Proxy Signature Scheme in the Standard Model.
J. Inf. Sci. Eng., 2011

Three-axis NC milling simulation based on adaptive triangular mesh.
Computers & Industrial Engineering, 2011

NIST Cloud Computing Reference Architecture.
Proceedings of the World Congress on Services, 2011

Research on Yangtze River Dangerous Articles Logistics Port Hierarchical Layout Evaluation of Jiangsu Province Based on Disaster Theory.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2009
A novel identity-based multi-signcryption scheme.
Computer Communications, 2009

2008
Ergodic Capacity of LTE Downlink Multiuser MIMO Systems.
Proceedings of IEEE International Conference on Communications, 2008

2007
A New Algorithm for Identifying Loops in Decompilation.
Proceedings of the Static Analysis, 14th International Symposium, 2007

A Novel Verifiably Encrypted Signature Scheme Without Random Oracle.
Proceedings of the Information Security Practice and Experience, 2007

Structuring 2-way Branches in Binary Executables.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Linkability Analysis of Some Blind Signature Schemes.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...