Jian Ren

According to our database1, Jian Ren
  • authored at least 133 papers between 2001 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
m6AVar: a database of functional variants involved in m6A modification.
Nucleic Acids Research, 2018

P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing.
CoRR, 2018

2017
Adaptive Multi-Objective Evolutionary Algorithms for Overtime Planning in Software Projects.
IEEE Trans. Software Eng., 2017

Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks.
IEEE Trans. Information Theory, 2017

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing.
IEEE Trans. Information Forensics and Security, 2017

Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities.
Pervasive and Mobile Computing, 2017

PassBio: Privacy-Preserving User-Centric Biometric Authentication.
CoRR, 2017

Discrete Dynamic Causal Modeling and Its Relationship with Directed Information.
CoRR, 2017

Performance Optimization of Network Coding Based Communication and Reliable Storage in Internet of Things.
CoRR, 2017

Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2017

Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage.
IEEE Access, 2017

Computer aided analysis of prostate histopathology images to support a refined Gleason grading system.
Proceedings of the Medical Imaging 2017: Image Processing, 2017

Grasping Force Control of Prosthetic Hand Based on PCA and SVM.
Proceedings of the Advanced Computational Methods in Life System Modeling and Simulation, 2017

Personalized Image Aesthetics.
Proceedings of the IEEE International Conference on Computer Vision, 2017

A client-based secure deduplication of multimedia data.
Proceedings of the IEEE International Conference on Communications, 2017

2016
A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network.
IEEE Trans. Vehicular Technology, 2016

Anonymous communication in overlay networks.
Security and Communication Networks, 2016

STaR: design and quantitative measurement of source-location privacy for wireless sensor networks.
Security and Communication Networks, 2016

RPFdb: a database for genome wide information of translated mRNA generated from ribosome profiling.
Nucleic Acids Research, 2016

Comparison of electrical characteristics between AlGaN/GaN and lattice-matched InAlN/GaN heterostructure Schottky barrier diodes.
Microelectronics Reliability, 2016

Hot electrons induced degradation in lattice-matched InAlN/GaN high electron mobility transistors.
Microelectronics Reliability, 2016

ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing.
CoRR, 2016

Recent advances in security and privacy in large-scale networks.
Concurrency and Computation: Practice and Experience, 2016

Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

LinSOS: Secure outsourcing of linear computations based on affine mapping.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Secure outsourcing of scalar multiplication on elliptic curves.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Robust CDMA receiver design under disguised jamming.
Proceedings of the 2016 IEEE International Conference on Acoustics, 2016

2015
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2015

Provable ownership of files in deduplication cloud storage.
Security and Communication Networks, 2015

Security in big data.
Security and Communication Networks, 2015

MiCroKiTS 4.0: a database of midbody, centrosome, kinetochore, telomere and spindle.
Nucleic Acids Research, 2015

Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage.
Int. J. Inf. Sec., 2015

CASO: Cost-Aware Secure Outsourcing of General Computational Problems.
CoRR, 2015

Exploring the Self-enhanced Mechanism of Interactive Advertising Phenomenon - Based on the Research of Three Cases.
CoRR, 2015

Optimal Construction of Regenerating Code through Rate-matching in Hostile Networks.
CoRR, 2015

Beyond the MDS Bound in Distributed Cloud Storage.
CoRR, 2015

IBS: an illustrator for the presentation and visualization of biological sequences.
Bioinformatics, 2015

dbPSP: a curated database for protein phosphorylation sites in prokaryotes.
Database, 2015

Provable Ownership of Encrypted Files in De-duplication Cloud Storage.
Ad Hoc & Sensor Wireless Networks, 2015

A delay-aware and secure data forwarding scheme for urban sensing networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

R-STaR destination-location privacy schemes in wireless sensor networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Rate-matched regenerating code in hostile networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Reliable Communications over Multihop Networks under Routing Attacks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Exploring automatic prostate histopathology image gleason grading via local structure modeling.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Computer aided analysis of prostate histopathology images Gleason grading especially for Gleason score 7.
Proceedings of the 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2015

Hybrid mobile access coordinated wireless sensor networks - Design and analysis.
Proceedings of the IEEE China Summit and International Conference on Signal and Information Processing, 2015

2014
N-Hop networks: a general framework for wireless systems.
IEEE Wireless Commun., 2014

Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks.
IEEE Trans. Parallel Distrib. Syst., 2014

Exact scalable sensitivity analysis for the next release problem.
ACM Trans. Softw. Eng. Methodol., 2014

Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard.
IEEE Trans. Information Forensics and Security, 2014

GPS-SUMO: a tool for the prediction of sumoylation sites and SUMO-interaction motifs.
Nucleic Acids Research, 2014

CPLM: a database of protein lysine modifications.
Nucleic Acids Research, 2014

Mobile Cloud Computing: A Survey, State of Art and Future Directions.
MONET, 2014

dbPPT: a comprehensive database of protein phosphorylation in plants.
Database, 2014

Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures.
Proceedings of the Information Security Practice and Experience, 2014

Beyond the MDS bound in distributed cloud storage.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Precoding for OFDM under disguised jamming.
Proceedings of the IEEE Global Communications Conference, 2014

Secure regenerating code.
Proceedings of the IEEE Global Communications Conference, 2014

Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Search based software project management.
PhD thesis, 2013

An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications.
IEEE Trans. Wireless Communications, 2013

UUCD: a family-based database of ubiquitin and ubiquitin-like conjugation.
Nucleic Acids Research, 2013

Systematic analysis of the Plk-mediated phosphoregulation in eukaryotes.
Briefings in Bioinformatics, 2013

Not going to take this anymore: multi-objective overtime planning for software engineering projects.
Proceedings of the 35th International Conference on Software Engineering, 2013

Architecture design of mobile access coordinated wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2013

Provable ownership of file in de-duplication cloud storage.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Combating network pollution attacks: A cascaded error-control coding approach.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Secure wireless monitoring and control systems for smart grid and smart home.
IEEE Wireless Commun., 2012

Toward secure cognitive communications in wireless networks.
IEEE Wireless Commun., 2012

Time-Varying Jamming Modeling and Classification.
IEEE Trans. Signal Processing, 2012

Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

Parameter selection of support vector machines and genetic algorithm based on change area search.
Neural Computing and Applications, 2012

Mean Exit Time and Escape Probability for a Tumor Growth System under Non-Gaussian noise.
I. J. Bifurcation and Chaos, 2012

Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper).
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

Providing hop-by-hop authentication and source privacy in wireless sensor networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Quantitative security and efficiency analysis of SEAR in wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

Characterization of linear network coding for pollution detection.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Reliable OFDM system design under hostile multi-tone jamming.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications.
IEEE Trans. Wireless Communications, 2011

CPLA 1.0: an integrated database of protein lysine acetylation.
Nucleic Acids Research, 2011

Cooperative Co-evolutionary Optimization of Software Project Staff Assignments and Job Scheduling.
Proceedings of the Search Based Software Engineering - Third International Symposium, 2011

Cooperative sensing in cognitive networks under malicious attack.
Proceedings of the IEEE International Conference on Acoustics, 2011

Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2011

An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding.
Proceedings of the Global Communications Conference, 2011

2010
MiCroKit 3.0: an integrated database of midbody, centrosome and kinetochore.
Nucleic Acids Research, 2010

SPM: Source Privacy for Mobile Ad Hoc Networks.
EURASIP J. Wireless Comm. and Networking, 2010

Survey on anonymous communications in computer networks.
Computer Communications, 2010

A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping.
Proceedings of the Wireless Algorithms, 2010

3D Pendulum Swinging Control by an Industrial Robot Manipulator.
Proceedings of the ISR/ROBOTIK 2010, Proceedings for the joint conference of ISR 2010 (41st Internationel Symposium on Robotics) und ROBOTIK 2010 (6th German Conference on Robotics), 7-9 June 2010, Munich, Germany, 2010

Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Resource Allocation with Load Balancing for Cognitive Radio Networks.
Proceedings of the Global Communications Conference, 2010

Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010

Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing.
Proceedings of the Global Communications Conference, 2010

2009
An identity-based single-sign-on scheme for computer networks.
Security and Communication Networks, 2009

A search based approach to fairness analysis in requirement assignments to aid negotiation, mediation and decision making.
Requir. Eng., 2009

Design of DL-based certificateless digital signatures.
Journal of Systems and Software, 2009

Efficient identity-based GQ multisignatures.
Int. J. Inf. Sec., 2009

Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks.
EURASIP J. Adv. Sig. Proc., 2009

A cryptographic watermarking technique for multimedia signals.
Adv. Comput. Math., 2009

Providing Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2009

Preserving Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

Using Mixed and Hybrid TCP Probe Methods in Forward IP Paths Inference.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

Providing Source Privacy in Mobile Ad Hoc Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping.
Proceedings of IEEE International Conference on Communications, 2009

Routing-Based Source-Location Privacy in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2009

Jamming Mitigation Techniques Based on Message-Driven Frequency Hopping.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Search based data sensitivity analysis applied to requirement engineering.
Proceedings of the Genetic and Evolutionary Computation Conference, 2009

Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems.
Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009

Routing-based source-location privacy protection in wireless sensor networks.
Proceedings of the 2009 IEEE International Conference on Electro/Information Technology, 2009

2008
Generalized Ring Signatures.
IEEE Trans. Dependable Sec. Comput., 2008

Design of Fully Deniable Authentication Service for E-mail Applications.
IEEE Communications Letters, 2008

Efficient identity-based RSA multisignatures.
Computers & Security, 2008

Privacy-Preserving Communication Algorithms and Network Protocols.
Proceedings of the Wireless Algorithms, 2008

Message-Driven Frequency Hopping - Design and Analysis.
Proceedings of the Wireless Algorithms, 2008

"Fairness Analysis" in Requirements Assignments.
Proceedings of the 16th IEEE International Requirements Engineering Conference, 2008

Anonymous Communication Protocol in Overlay Networks.
Proceedings of IEEE International Conference on Communications, 2008

Spectrally Efficient Spread Spectrum System Design: Message-Driven Frequency Hopping.
Proceedings of IEEE International Conference on Communications, 2008

2007
Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems.
EURASIP J. Wireless Comm. and Networking, 2007

A Spectrally Efficient Frequency Hopping System.
Proceedings of the Global Communications Conference, 2007

2006
Ring Signature Based on ElGamal Signature.
Proceedings of the Wireless Algorithms, 2006

Non-uniform Information Transmission for Minimum Distortion in Wireless Networks.
Proceedings of the Wireless Algorithms, 2006

2005
Towards Autonomous and Automatic Evaluation and Negotiation in Agent-Mediated Internet Marketplaces.
Electronic Commerce Research, 2005

Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Design of Long Period Pseudo-Random Sequences from the Addition of m-Sequences over Fp.
EURASIP J. Wireless Comm. and Networking, 2004

PumaMart: a parallel and autonomous agents based internet marketplace.
Electronic Commerce Research and Applications, 2004

Design of pseudo-random spreading sequences for CDMA systems.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2002
A Study of Building Internet Marketplaces on the Basis of Mobile Agents for Parallel Processing.
World Wide Web, 2002

Building Internet Marketplaces on the Basis of Mobile Agents for Parallel Processing.
Proceedings of the Third International Conference on Mobile Data Management (MDM 2002), 2002

A Secure Agent-Mediated Payment Protocol.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
A 2-Phase Evaluation Model for Agent-Mediated Internet Marketplaces.
WISE (1), 2001


  Loading...