Jian Ren

Orcid: 0000-0001-7796-8501

Affiliations:
  • Michigan State University, Department of ECE, East Lansing, MI, USA
  • Xidian University, Xi'an, China (PhD)


According to our database1, Jian Ren authored at least 126 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Novel Automatic Content Generation and Optimization Framework.
IEEE Internet Things J., July, 2023

Security and Energy Efficiency: Breaking the Barriers of High Peak-to-Average Power Ratio and Disguised Jamming in NextG IoT System Design.
IEEE Internet Things J., February, 2023

Black-Box Attacks against Signed Graph Analysis via Balance Poisoning.
CoRR, 2023

Adaptive Auto-Cinematography in Open Worlds.
Proceedings of the 6th IEEE International Conference on Multimedia Information Processing and Retrieval, 2023

Optimal Codes for Distributed Storage.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Can We Have a Better System than OFDM?
Proceedings of the International Conference on Computing, Networking and Communications, 2023

A Mathematical Model for Neuronal Activity and Brain Information Processing Capacity.
Proceedings of the IEEE International Conference on Acoustics, 2023

2022
$d$d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications.
IEEE Trans. Serv. Comput., 2022

RealPRNet: A Real-Time Phoneme-Recognized Network for "Believable" Speech Animation.
IEEE Internet Things J., 2022

Feasible Region of Secure and Distributed Data Storage in Adversarial Networks.
IEEE Internet Things J., 2022

From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection.
CoRR, 2022

Enabling Automatic Cinematography with Reinforcement Learning.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022

Bridging Script and Animation Utilizing a New Automatic Cinematography Model.
Proceedings of the 5th IEEE International Conference on Multimedia Information Processing and Retrieval, 2022

BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

2021
CASO: Cost-Aware Secure Outsourcing of General Computational Problems.
IEEE Trans. Serv. Comput., 2021

d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting.
IEEE Internet Things J., 2021

2020
Beyond the MDS Bound in Distributed Cloud Storage.
IEEE Trans. Inf. Theory, 2020

Secure OFDM System Design and Capacity Analysis Under Disguised Jamming.
IEEE Trans. Inf. Forensics Secur., 2020

P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing.
IEEE Trans. Big Data, 2020

Bitcoin and Blockchain: Security and Privacy.
IEEE Internet Things J., 2020

A Hybrid Temporal Modeling Phoneme Recognized Network for Real-Time Speech Animation.
Proceedings of the 3rd IEEE Conference on Multimedia Information Processing and Retrieval, 2020

Anonymous and Coercion-Resistant Distributed Electronic Voting.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

Secure and Efficient OFDM System Design under Disguised Jamming.
Proceedings of the International Conference on Computing, Networking and Communications, 2020

2019
$d$-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications.
CoRR, 2019

Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Malicious Link Detection in Multi-Hop Wireless Sensor Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks.
Wirel. Commun. Mob. Comput., 2018

Privacy Characterization and Quantification in Data Publishing.
IEEE Trans. Knowl. Data Eng., 2018

PassBio: Privacy-Preserving User-Centric Biometric Authentication.
IEEE Trans. Inf. Forensics Secur., 2018

Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things.
IEEE Internet Things J., 2018

Security and Privacy Enhancement for Outsourced Biometric Identification.
CoRR, 2018

End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment.
Proceedings of the 2018 International Conference on Computing, 2018

Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

HPMAP: A Hash-Based Privacy-Preserving Mutual Authentication Protocol for Passive IoT Devices Using Self-Powered Timers.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Security and Privacy Enhancement for Outsourced Biometric Identification.
Proceedings of the IEEE Global Communications Conference, 2018

An Attribute-Based Distributed Data Sharing Scheme.
Proceedings of the IEEE Global Communications Conference, 2018

Decoding Behavioral Accuracy in an Attention Task Using Brain fMRI Data.
Proceedings of the IEEE Global Communications Conference, 2018

The Worst Jamming Distribution for Securely Precoded OFDM.
Proceedings of the IEEE Global Communications Conference, 2018

UBNB-PPDP: Utility-Boosting Negotiation-Based Privacy Preserving Data Publishing.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks.
IEEE Trans. Inf. Theory, 2017

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2017

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive Mob. Comput., 2017

Discrete Dynamic Causal Modeling and Its Relationship with Directed Information.
CoRR, 2017

Performance Optimization of Network Coding Based Communication and Reliable Storage in Internet of Things.
CoRR, 2017

Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage.
IEEE Access, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network.
IEEE Trans. Veh. Technol., 2016

Anonymous communication in overlay networks.
Secur. Commun. Networks, 2016

STaR: design and quantitative measurement of source-location privacy for wireless sensor networks.
Secur. Commun. Networks, 2016

Recent advances in security and privacy in large-scale networks.
Concurr. Comput. Pract. Exp., 2016

Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

LinSOS: Secure outsourcing of linear computations based on affine mapping.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure outsourcing of scalar multiplication on elliptic curves.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Robust CDMA receiver design under disguised jamming.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Provable ownership of files in deduplication cloud storage.
Secur. Commun. Networks, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc Sens. Wirel. Networks, 2015

A delay-aware and secure data forwarding scheme for urban sensing networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Rate-matched regenerating code in hostile networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Reliable Communications over Multihop Networks under Routing Attacks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Hybrid mobile access coordinated wireless sensor networks - Design and analysis.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
N-Hop networks: a general framework for wireless systems.
IEEE Wirel. Commun., 2014

Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks.
IEEE Trans. Parallel Distributed Syst., 2014

Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard.
IEEE Trans. Inf. Forensics Secur., 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

Precoding for OFDM under disguised jamming.
Proceedings of the IEEE Global Communications Conference, 2014

Secure regenerating code.
Proceedings of the IEEE Global Communications Conference, 2014

Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications.
IEEE Trans. Wirel. Commun., 2013

Architecture design of mobile access coordinated wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2013

Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Combating network pollution attacks: A cascaded error-control coding approach.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Secure wireless monitoring and control systems for smart grid and smart home.
IEEE Wirel. Commun., 2012

Toward secure cognitive communications in wireless networks.
IEEE Wirel. Commun., 2012

Time-Varying Jamming Modeling and Classification.
IEEE Trans. Signal Process., 2012

Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper).
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Providing hop-by-hop authentication and source privacy in wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Quantitative security and efficiency analysis of SEAR in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

Characterization of linear network coding for pollution detection.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Reliable OFDM system design under hostile multi-tone jamming.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications.
IEEE Trans. Wirel. Commun., 2011

Cooperative sensing in cognitive networks under malicious attack.
Proceedings of the IEEE International Conference on Acoustics, 2011

Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding.
Proceedings of the Global Communications Conference, 2011

2010
SPM: Source Privacy for Mobile Ad Hoc Networks.
EURASIP J. Wirel. Commun. Netw., 2010

Survey on anonymous communications in computer networks.
Comput. Commun., 2010

A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping.
Proceedings of the Wireless Algorithms, 2010

Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Resource Allocation with Load Balancing for Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010

Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing.
Proceedings of the Global Communications Conference, 2010

2009
An identity-based single-sign-on scheme for computer networks.
Secur. Commun. Networks, 2009

Design of DL-based certificateless digital signatures.
J. Syst. Softw., 2009

Efficient identity-based GQ multisignatures.
Int. J. Inf. Sec., 2009

Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks.
EURASIP J. Adv. Signal Process., 2009

A cryptographic watermarking technique for multimedia signals.
Adv. Comput. Math., 2009

Providing Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Preserving Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Providing Source Privacy in Mobile Ad Hoc Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping.
Proceedings of IEEE International Conference on Communications, 2009

Routing-Based Source-Location Privacy in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Jamming Mitigation Techniques Based on Message-Driven Frequency Hopping.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems.
Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009

Routing-based source-location privacy protection in wireless sensor networks.
Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009

2008
Generalized Ring Signatures.
IEEE Trans. Dependable Secur. Comput., 2008

Design of Fully Deniable Authentication Service for E-mail Applications.
IEEE Commun. Lett., 2008

Efficient identity-based RSA multisignatures.
Comput. Secur., 2008

Privacy-Preserving Communication Algorithms and Network Protocols.
Proceedings of the Wireless Algorithms, 2008

Message-Driven Frequency Hopping - Design and Analysis.
Proceedings of the Wireless Algorithms, 2008

Anonymous Communication Protocol in Overlay Networks.
Proceedings of IEEE International Conference on Communications, 2008

Spectrally Efficient Spread Spectrum System Design: Message-Driven Frequency Hopping.
Proceedings of IEEE International Conference on Communications, 2008

2007
Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems.
EURASIP J. Wirel. Commun. Netw., 2007

A Spectrally Efficient Frequency Hopping System.
Proceedings of the Global Communications Conference, 2007

2006
Ring Signature Based on ElGamal Signature.
Proceedings of the Wireless Algorithms, 2006

Non-uniform Information Transmission for Minimum Distortion in Wireless Networks.
Proceedings of the Wireless Algorithms, 2006

2005
Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
On the Structure of Hermitian Codes and Decoding for Burst Errors.
IEEE Trans. Inf. Theory, 2004

Design of Long Period Pseudo-Random Sequences from the Addition of m-Sequences over Fp.
EURASIP J. Wirel. Commun. Netw., 2004

Design of pseudo-random spreading sequences for CDMA systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004


  Loading...