Jian Ren

According to our database1, Jian Ren authored at least 47 papers between 2001 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Modelling BioNano optical data and simulation study of genome map assembly.
Bioinformatics, 2018

Dual-Band Circularly Polarized Antenna With Wide Axial Ratio Beamwidths for Upper Hemispherical Coverage.
IEEE Access, 2018

Adversarial Domain Adaptation for Classification of Prostate Histopathology Whole-Slide Images.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2018, 2018

Adaptive Multi-Objective Evolutionary Algorithms for Overtime Planning in Software Projects.
IEEE Trans. Software Eng., 2017

Computer aided analysis of prostate histopathology images to support a refined Gleason grading system.
Proceedings of the Medical Imaging 2017: Image Processing, 2017

Grasping Force Control of Prosthetic Hand Based on PCA and SVM.
Proceedings of the Advanced Computational Methods in Life System Modeling and Simulation, 2017

Microwave Imaging of Reinforced Concrete and Design of a Broadband Antenna.
Proceedings of the International Conference on Video and Image Processing, 2017

Personalized Image Aesthetics.
Proceedings of the IEEE International Conference on Computer Vision, 2017

Comparison of electrical characteristics between AlGaN/GaN and lattice-matched InAlN/GaN heterostructure Schottky barrier diodes.
Microelectronics Reliability, 2016

Hot electrons induced degradation in lattice-matched InAlN/GaN high electron mobility transistors.
Microelectronics Reliability, 2016

Recent advances in security and privacy in large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Security in big data.
Security and Communication Networks, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

R-STaR destination-location privacy schemes in wireless sensor networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Exploring automatic prostate histopathology image gleason grading via local structure modeling.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Computer aided analysis of prostate histopathology images Gleason grading especially for Gleason score 7.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Exact scalable sensitivity analysis for the next release problem.
ACM Trans. Softw. Eng. Methodol., 2014

Mobile Cloud Computing: A Survey, State of Art and Future Directions.
MONET, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

Search based software project management.
PhD thesis, 2013

An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications.
IEEE Trans. Wireless Communications, 2013

Not going to take this anymore: multi-objective overtime planning for software engineering projects.
Proceedings of the 35th International Conference on Software Engineering, 2013

Parameter selection of support vector machines and genetic algorithm based on change area search.
Neural Computing and Applications, 2012

Mean Exit Time and Escape Probability for a Tumor Growth System under Non-Gaussian noise.
I. J. Bifurcation and Chaos, 2012

Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications.
IEEE Trans. Wireless Communications, 2011

Cooperative Co-evolutionary Optimization of Software Project Staff Assignments and Job Scheduling.
Proceedings of the Search Based Software Engineering - Third International Symposium, 2011

3D Pendulum Swinging Control by an Industrial Robot Manipulator.
Proceedings of the ISR/ROBOTIK 2010, Proceedings for the joint conference of ISR 2010 (41st Internationel Symposium on Robotics) und ROBOTIK 2010 (6th German Conference on Robotics), 7-9 June 2010, Munich, Germany, 2010

An identity-based single-sign-on scheme for computer networks.
Security and Communication Networks, 2009

A search based approach to fairness analysis in requirement assignments to aid negotiation, mediation and decision making.
Requir. Eng., 2009

Design of DL-based certificateless digital signatures.
Journal of Systems and Software, 2009

Efficient identity-based GQ multisignatures.
Int. J. Inf. Sec., 2009

A cryptographic watermarking technique for multimedia signals.
Adv. Comput. Math., 2009

Using Mixed and Hybrid TCP Probe Methods in Forward IP Paths Inference.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Search based data sensitivity analysis applied to requirement engineering.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Generalized Ring Signatures.
IEEE Trans. Dependable Sec. Comput., 2008

Design of Fully Deniable Authentication Service for E-mail Applications.
IEEE Communications Letters, 2008

Efficient identity-based RSA multisignatures.
Computers & Security, 2008

Privacy-Preserving Communication Algorithms and Network Protocols.
Proceedings of the Wireless Algorithms, 2008

"Fairness Analysis" in Requirements Assignments.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Ring Signature Based on ElGamal Signature.
Proceedings of the Wireless Algorithms, 2006

Towards Autonomous and Automatic Evaluation and Negotiation in Agent-Mediated Internet Marketplaces.
Electronic Commerce Research, 2005

Design of Long Period Pseudo-Random Sequences from the Addition of m-Sequences over Fp.
EURASIP J. Wireless Comm. and Networking, 2004

PumaMart: a parallel and autonomous agents based internet marketplace.
Electronic Commerce Research and Applications, 2004

A Study of Building Internet Marketplaces on the Basis of Mobile Agents for Parallel Processing.
World Wide Web, 2002

Building Internet Marketplaces on the Basis of Mobile Agents for Parallel Processing.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002

A Secure Agent-Mediated Payment Protocol.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

A 2-Phase Evaluation Model for Agent-Mediated Internet Marketplaces.
WISE (1), 2001