Jian Ren

According to our database1, Jian Ren authored at least 84 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks.
Wireless Communications and Mobile Computing, 2018

Privacy Characterization and Quantification in Data Publishing.
IEEE Trans. Knowl. Data Eng., 2018

PassBio: Privacy-Preserving User-Centric Biometric Authentication.
IEEE Trans. Information Forensics and Security, 2018

Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things.
IEEE Internet of Things Journal, 2018

P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing.
CoRR, 2018

End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment.
Proceedings of the 2018 International Conference on Computing, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

HPMAP: A Hash-Based Privacy-Preserving Mutual Authentication Protocol for Passive IoT Devices Using Self-Powered Timers.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks.
IEEE Trans. Information Theory, 2017

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing.
IEEE Trans. Information Forensics and Security, 2017

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive and Mobile Computing, 2017

PassBio: Privacy-Preserving User-Centric Biometric Authentication.
CoRR, 2017

Discrete Dynamic Causal Modeling and Its Relationship with Directed Information.
CoRR, 2017

Performance Optimization of Network Coding Based Communication and Reliable Storage in Internet of Things.
CoRR, 2017

Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2017

Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage.
IEEE Access, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network.
IEEE Trans. Vehicular Technology, 2016

Anonymous communication in overlay networks.
Security and Communication Networks, 2016

STaR: design and quantitative measurement of source-location privacy for wireless sensor networks.
Security and Communication Networks, 2016

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing.
CoRR, 2016

Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

LinSOS: Secure outsourcing of linear computations based on affine mapping.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure outsourcing of scalar multiplication on elliptic curves.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Robust CDMA receiver design under disguised jamming.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

Provable ownership of files in deduplication cloud storage.
Security and Communication Networks, 2015

CASO: Cost-Aware Secure Outsourcing of General Computational Problems.
CoRR, 2015

Optimal Construction of Regenerating Code through Rate-matching in Hostile Networks.
CoRR, 2015

Beyond the MDS Bound in Distributed Cloud Storage.
CoRR, 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc & Sensor Wireless Networks, 2015

A delay-aware and secure data forwarding scheme for urban sensing networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Rate-matched regenerating code in hostile networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Reliable Communications over Multihop Networks under Routing Attacks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Hybrid mobile access coordinated wireless sensor networks - Design and analysis.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
N-Hop networks: a general framework for wireless systems.
IEEE Wireless Commun., 2014

Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks.
IEEE Trans. Parallel Distrib. Syst., 2014

Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard.
IEEE Trans. Information Forensics and Security, 2014

Beyond the MDS bound in distributed cloud storage.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Precoding for OFDM under disguised jamming.
Proceedings of the IEEE Global Communications Conference, 2014

Secure regenerating code.
Proceedings of the IEEE Global Communications Conference, 2014

Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Architecture design of mobile access coordinated wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2013

Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Combating network pollution attacks: A cascaded error-control coding approach.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Secure wireless monitoring and control systems for smart grid and smart home.
IEEE Wireless Commun., 2012

Toward secure cognitive communications in wireless networks.
IEEE Wireless Commun., 2012

Time-Varying Jamming Modeling and Classification.
IEEE Trans. Signal Processing, 2012

Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper).
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Providing hop-by-hop authentication and source privacy in wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Quantitative security and efficiency analysis of SEAR in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

Characterization of linear network coding for pollution detection.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Reliable OFDM system design under hostile multi-tone jamming.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Cooperative sensing in cognitive networks under malicious attack.
Proceedings of the IEEE International Conference on Acoustics, 2011

Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding.
Proceedings of the Global Communications Conference, 2011

2010
SPM: Source Privacy for Mobile Ad Hoc Networks.
EURASIP J. Wireless Comm. and Networking, 2010

Survey on anonymous communications in computer networks.
Computer Communications, 2010

A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping.
Proceedings of the Wireless Algorithms, 2010

Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Resource Allocation with Load Balancing for Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010

Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing.
Proceedings of the Global Communications Conference, 2010

2009
Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks.
EURASIP J. Adv. Sig. Proc., 2009

Providing Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Preserving Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Providing Source Privacy in Mobile Ad Hoc Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping.
Proceedings of IEEE International Conference on Communications, 2009

Routing-Based Source-Location Privacy in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Jamming Mitigation Techniques Based on Message-Driven Frequency Hopping.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems.
Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009

Routing-based source-location privacy protection in wireless sensor networks.
Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009

2008
Message-Driven Frequency Hopping - Design and Analysis.
Proceedings of the Wireless Algorithms, 2008

Anonymous Communication Protocol in Overlay Networks.
Proceedings of IEEE International Conference on Communications, 2008

Spectrally Efficient Spread Spectrum System Design: Message-Driven Frequency Hopping.
Proceedings of IEEE International Conference on Communications, 2008

2007
Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems.
EURASIP J. Wireless Comm. and Networking, 2007

A Spectrally Efficient Frequency Hopping System.
Proceedings of the Global Communications Conference, 2007

2006
Non-uniform Information Transmission for Minimum Distortion in Wireless Networks.
Proceedings of the Wireless Algorithms, 2006

2005
Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Design of pseudo-random spreading sequences for CDMA systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...