Jian Shen

According to our database1, Jian Shen authored at least 169 papers between 1995 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.



In proceedings 
PhD thesis 


On csauthors.net:


Trip mode recognition using smartphone sensor data under different sampling frequencies.
Web Intelligence, 2019

Intelligent agent-based region division scheme for mobile sensor networks.
Soft Comput., 2019

The study of interference effect in a globally coupled quantum network.
Quantum Information Processing, 2019

Synchronization problem of 2-D coupled dynamical networks with communication delays and missing measurements.
Multidim. Syst. Sign. Process., 2019

Publicly verifiable privacy-preserving aggregation and its application in IoT.
J. Network and Computer Applications, 2019

Three-dimensional stable matching with hybrid preferences.
J. Comb. Optim., 2019

Designated-server identity-based authenticated encryption with keyword search for encrypted emails.
Inf. Sci., 2019

Stability and constrained control for positive two-dimensional systems with delays in the second FM model.
IMA J. Math. Control & Information, 2019

Filter design for discrete-time two-dimensional T-S fuzzy systems with finite frequency specification.
Int. J. Systems Science, 2019

Recognition and localization of actinidia arguta based on image recognition.
EURASIP J. Image and Video Processing, 2019

Towards Efficient and Unbiased Implementation of Lipschitz Continuity in GANs.
CoRR, 2019

The role of ultrasound in the diagnosis of the coexistence of primary hyperparathyroidism and non-medullary thyroid carcinoma.
BMC Medical Imaging, 2019

A Cooperative Placement Method for Machine Learning Workflows and Meteorological Big Data Security Protection in Cloud Computing.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Cloud-assisted Two-Factor Protection Mechanism for Public Data in Smart Campus.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Cloud Management Systems - Load Balancing Algorithms and VDI Implementation Techniques.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Rethinking Authentication on Smart Mobile Devices.
Wireless Communications and Mobile Computing, 2018

An effective data fusion-based routing algorithm with time synchronization support for vehicular wireless sensor networks.
The Journal of Supercomputing, 2018

Linear complexity of a class of pseudorandom sequences over a general finite field.
Soft Comput., 2018

Finger vein secure biometric template generation based on deep learning.
Soft Comput., 2018

Expressive attribute-based keyword search with constant-size ciphertext.
Soft Comput., 2018

Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems.
J. Ambient Intelligence and Humanized Computing, 2018

Privacy preserving multi-party computation delegation for deep learning in cloud computing.
Inf. Sci., 2018

Propagation of firing rate by synchronization in a feed-forward multilayer Hindmarsh-Rose neural network.
Neurocomputing, 2018

An over-the-air key establishment protocol using keyless cryptography.
Future Generation Comp. Syst., 2018

Secure intelligent traffic light control using fog computing.
Future Generation Comp. Syst., 2018

Bitcoin-based fair payments for outsourcing computations of fog devices.
Future Generation Comp. Syst., 2018

Verifiable keyword search for secure big data-based mobile healthcare networks with fine-grained authorization control.
Future Generation Comp. Syst., 2018

Label-aware Double Transfer Learning for Cross-Specialty Medical Named Entity Recognition.
CoRR, 2018

Dynamic Behaviors in Coupled Neuron System with the Excitatory and Inhibitory Autapse under Electromagnetic Induction.
Complexity, 2018

Fingerprint-based access to personally controlled health records in emergency situations.
SCIENCE CHINA Information Sciences, 2018

New Upper Bounds For The Bondage Number Of A Graph In Terms Of Its Maximum Degree And Euler Characteristic.
Ars Comb., 2018

A Four-Stage Hybrid Feature Subset Selection Approach for Network Traffic Classification Based on Full Coverage.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Label-Aware Double Transfer Learning for Cross-Specialty Medical Named Entity Recognition.
Proceedings of the 2018 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2018

Emotion Recognition Based on Electroencephalogram Using a Multiple Instance Learning Framework.
Proceedings of the Intelligent Computing Theories and Application, 2018

Wasserstein Distance Guided Representation Learning for Domain Adaptation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Adaptive task scheduling strategy in cloud: when energy consumption meets performance guarantee.
World Wide Web, 2017

A query refinement framework for xml keyword search.
World Wide Web, 2017

An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices.
Wireless Personal Communications, 2017

A Fairness-Enhanced Micropayment Scheme.
Wireless Personal Communications, 2017

EIAS-CP: new efficient identity-based authentication scheme with conditional privacy-preserving for VANETs.
Telecommunication Systems, 2017

Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

Fine-grained searchable encryption in multi-user setting.
Soft Comput., 2017

Extremal Bases for Finite Cyclic Groups.
SIAM J. Discrete Math., 2017

Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length.
Security and Communication Networks, 2017

A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Personal and Ubiquitous Computing, 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive and Mobile Computing, 2017

Distributed Energy Management for Vehicle-to-Grid Networks.
IEEE Network, 2017

Erratum to: A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multimedia Tools Appl., 2017

A new lightweight RFID grouping authentication protocol for multiple tags in mobile environment.
Multimedia Tools Appl., 2017

Power Controlled and Stability-based Routing Protocol for Wireless Ad hoc Networks.
J. Inf. Sci. Eng., 2017

Finite frequency filter design for nonlinear 2-D continuous systems in T-S form.
J. Franklin Institute, 2017

New Construction of Short Certificate-Based Signature against Existential Forgery Attacks.
TIIS, 2017

An Efficient Certificate-Based Authenticated Key Agreement Protocol without Bilinear Pairing.
ITC, 2017

A Content-Based Image Retrieval Scheme Using an Encrypted Difference Histogram in Cloud Computing.
Information, 2017

Stability and positive observer design for positive 2D discrete-time system with multiple delays.
Int. J. Systems Science, 2017

Autocorrelation of the Modified Binary Two-Prime Sidelnikov Sequence.
Int. J. Found. Comput. Sci., 2017

Classification model for imbalanced traffic data based on secondary feature extraction.
IET Communications, 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Generation Comp. Syst., 2017

Provable data transfer from provable data possession and deletion in cloud storage.
Computer Standards & Interfaces, 2017

Adversarial Representation Learning for Domain Adaptation.
CoRR, 2017

Weakness and Improvement of a Certificate-Based Key-Insulated Signature in the Standard Model.
Comput. J., 2017

Efficient end-to-end authentication protocol for wearable health monitoring systems.
Computers & Electrical Engineering, 2017

Efficient designated server identity-based encryption with conjunctive keyword search.
Annales des Télécommunications, 2017

Sliding Block-Based Hybrid Feature Subset Selection in Network Traffic.
IEEE Access, 2017

Energy Efficient MAC Protocol for Wireless Sensor Networks: A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Cloud Management Systems and Virtual Desktop Infrastructure Load Balancing Algorithms - A Survey.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

An Expressive Hidden Access Policy CP-ABE.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Wearable EEG-Based Real-Time System for Depression Monitoring.
Proceedings of the Brain Informatics - International Conference, 2017

Normalized mutual information feature selection for electroencephalogram data based on grassberger entropy estimator.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

A novel depression detection method based on pervasive EEG and EEG splitting criterion.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

An Integrated LSTM Prediction Method Based on Multi-scale Trajectory Space.
Proceedings of the 4th IAPR Asian Conference on Pattern Recognition, 2017

Game-Theory-Based Active Defense for Intrusion Detection in Cyber-Physical Embedded Systems.
ACM Trans. Embedded Comput. Syst., 2016

Hierarchical attribute-based encryption with continuous auxiliary inputs leakage.
Security and Communication Networks, 2016

Quality of Protection in Cloud-Assisted Cognitive Machine-to-Machine Communications for Industrial Systems.
MONET, 2016

An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.
J. Network and Computer Applications, 2016

E2GSM: Energy Effective Gear-Shifting Mechanism in Cloud Storage System.
TIIS, 2016

A Privacy-Preserving Health Data Aggregation Scheme.
TIIS, 2016

Cryptanalysis and Improvement of an Enhanced Two-Factor User Authentication Scheme in Wireless Sensor Networks.
ITC, 2016

Comment on a certificateless one-pass and two-party authenticated key agreement protocol.
Inf. Sci., 2016

Consensus-based sparse signal reconstruction algorithm for wireless sensor networks.
IJDSN, 2016

Remote Data Integrity Checking and Sharing in Cloud-Based Health Internet of Things.
IEICE Transactions, 2016

Secure Access Control of E-Health System with Attribute-Based Encryption.
Intelligent Automation & Soft Computing, 2016

Innovia Vehicle Radiated Emission Investigation and CENELEC Compliance Solution.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

A Route Planning Method for Underwater Terrain Aided Positioning Based on Gray Wolf Optimization Algorithm.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016

A semantic tree-based approach for sketch-based 3D model retrieval.
Proceedings of the 23rd International Conference on Pattern Recognition, 2016

A cloud based framework of prognostics and health management for manufacturing industry.
Proceedings of the IEEE International Conference on Prognostics and Health Management, 2016

A Provably Secure Two-Factor Authenticated Key Exchange Protocol for Wireless Sensor Networks Based on Authenticated Encryption.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

KDVEM : a k-degree anonymity with vertex and edge modification algorithm.
Computing, 2015

PiPDR: A Placement-Independent Pedestrian Dead Reckoning System in Mobile Phones.
Ad Hoc & Sensor Wireless Networks, 2015

Buffer scheme optimization of epidemic routing in delay tolerant networks.
Journal of Communications and Networks, 2014

Lower bounds for r2(K1+G) and r3(K1+G) from Paley graph and generalization.
Eur. J. Comb., 2014

On the relative distances of eleven points in the boundary of a plane convex body.
Discrete Mathematics, 2014

Practical Routing Protocol for Impromptu Mobile Social Networks.
Proceedings of the 12th IEEE International Conference on Embedded and Ubiquitous Computing, 2014

Online Shopping Preference Analysis of Campus Network Users Based on MapReduce.
Proceedings of the International Conference on Cloud Computing and Big Data, 2014

Three Layer Q 2-Free Families in the Boolean Lattice.
Order, 2013

A Novel Hybrid Node localization Algorithm for Wireless Sensor Networks.
JCS, 2013

On fractional Metric Dimension of graphs.
Discrete Math., Alg. and Appl., 2013

Bounds on the Number of Huffman and Binary-Ternary Trees
CoRR, 2013

A new lower bound on error probability for nonuniform signals over AWGN channels.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

An enhanced routing algorithm for congestion control in a home energy management system.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

Identity-based key agreement protocol employing a symmetric balanced incomplete block design.
Journal of Communications and Networks, 2012

On the relative distances of nine or ten points in the boundary of a plane convex body.
Discrete Applied Mathematics, 2012

Bounds on the spectral radii of digraphs in terms of walks.
Applied Mathematics and Computation, 2012

A novel spectrum sensing method in cognitive radio based on suprathreshold stochastic resonance.
Proceedings of IEEE International Conference on Communications, 2012

Enhanced delegation forwarding in delay tolerant networks.
IJPEDS, 2011

Analysis of Injection Molding of Thin-Walled Parts Based on Moldflow.
Proceedings of the Second International Conference on Digital Manufacturing and Automation, 2011

Development of Remote Monitoring and Control Device for 50KW PV System Based on the Wireless Network.
Proceedings of the Grid and Distributed Computing, 2011

On the Power Dominating Sets of Hypercubes.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

Comment: "Eenhanced novel access control protocol over wireless sensor networks".
IEEE Trans. Consumer Electronics, 2010

Improving routing protocol performance in delay tolerant networks using extended information.
Journal of Systems and Software, 2010

A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks.
IEICE Transactions, 2010

Some Inequalities in Functional Analysis, Combinatorics, and Probability Theory.
Electr. J. Comb., 2010

Accelerating Mutual-Information-Based Registration on multi-core systems.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

The kth upper bases of primitive non-powerful signed digraphs.
Discrete Mathematics, 2009

Keyword Detection in Natural Language Based on Statistical Mechanics of Words in Written Texts
CoRR, 2009

A novel information model for efficient routing protocols in delay tolerant networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Written Texts as Statistical Mechanical Problem.
Proceedings of the Advances in Information Retrieval Theory, 2009

Probability Delegation Forwarding in Delay Tolerant Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Approximating the Spanning Star Forest Problem and Its Application to Genomic Sequence Alignment.
SIAM J. Comput., 2008

Bounds for Ramsey numbers of complete graphs dropping an edge.
Eur. J. Comb., 2008

Extension of Strongly Regular Graphs.
Electr. J. Comb., 2008

On the largest eigenvalue of non-regular graphs.
J. Comb. Theory, Ser. B, 2007

Approximating the spanning star forest problem and its applications to genomic sequence alignment.
Proceedings of the Eighteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2007

On two Turán Numbers.
Journal of Graph Theory, 2006

Improved schemes for power-efficient broadcast in ad hoc networks.
IJHPCN, 2006

Characterization of [1, k]-Bar Visibility Trees.
Electr. J. Comb., 2006

Density Conditions For Triangles In Multipartite Graphs.
Combinatorica, 2006

Time-variant doppler frequency estimation and compensation for mobile OFDM systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Semi-blind Joint Data Equalization and Channel Estimation for Meteor Burst Communication.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

A new approach for a Windows-based watershed modeling system based on a database-supporting architecture.
Environmental Modelling and Software, 2005

A tabu search algorithm for the routing and capacity assignment problem in computer networks.
Computers & OR, 2005

LilyTask Parallel Language 3.5 - Approach towards Task Parallel Programming in Heterogeneous SMP-Clusters.
Proceedings of the 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 2005

Energy Reducing Broadcasting Algorithms in Ad Hoc Networks.
Proceedings of the 20th International Conference on Computers and Their Applications, 2005

Maximum Necessary Hop Count for Packet Routing in MANETs.
Proceedings of the Handbook on Theoretical and Algorithmic Aspects of Sensor, 2005

On the Frame--Stewart Conjecture about the Towers of Hanoi.
SIAM J. Comput., 2004

A collaborative-shared control system with safe obstacle avoidance capability.
Proceedings of the 2004 IEEE Conference on Robotics, Automation and Mechatronics, 2004

Reducing Connected Dominating Set Size with Multipoint Relays in Ad Hoc Wireless Networks.
Proceedings of the 7th International Symposium on Parallel Architectures, 2004

Vehicle Following with Obstacle Avoidance Capabilities in Natural Environments.
Proceedings of the 2004 IEEE International Conference on Robotics and Automation, 2004

Target-tracking and path planning for vehicle following in jungle environment.
Proceedings of the 8th International Conference on Control, 2004

Discrete Branch Length Representations for Genetic Algorithms in Phylogenetic Search.
Proceedings of the Applications of Evolutionary Computing, 2004

Searching for Sorted Sequences of Kings in Tournaments.
SIAM J. Comput., 2003

HAD: An Automated Database Tool for Analyzing Screening Hits in Drug Discovery.
Journal of Chemical Information and Computer Sciences, 2003

Short Cycles in Digraphs with Local Average Outdegree at Least Two.
Electr. J. Comb., 2003

Disjoint Cycles in Eulerian Digraphs and the Diameter of Interchange Graphs.
J. Comb. Theory, Ser. B, 2002

On the Caccetta-Häggkvist Conjecture.
Graphs and Combinatorics, 2002

A Note on the Number of Edges Guaranteeing a C4 in Eulerian Bipartite Digraphs.
Electr. J. Comb., 2002

Landau's inequalities for tournament scores and a short proof of a theorem on transitive sub-tournaments.
Journal of Graph Theory, 2001

Diameter of the NEPS of bipartite graphs.
Discrete Mathematics, 2001

On the Girth of Digraphs with High Connectivity.
Ars Comb., 2001

An RTL Abstraction Technique for Processor Microarchitecture Validation and Test Generation.
J. Electronic Testing, 2000

Exponents of vertex-transitive digraphs.
Discrete Mathematics, 2000

On the girth of digraphs.
Discrete Mathematics, 2000

Exponents of 2-regular digraphs.
Discrete Mathematics, 2000

Generalized Index of Boolean Matrices.
Ars Comb., 2000

Discrepancy of Matrices of Zeros and Ones.
Electr. J. Comb., 1999

Verification of Processor Microarchitectures.
Proceedings of the 17th IEEE VLSI Test Symposium (VTS '99), 1999

Functional Verification of the Equator MAP1000 Microprocessor.
Proceedings of the 36th Conference on Design Automation, 1999

Filter-Based Coded-Excitation System for High Speed Ultrasonic Imaging.
IEEE Trans. Med. Imaging, 1998

Some results on generalized exponents.
Journal of Graph Theory, 1998

Directed Triangles in Digraphs.
J. Comb. Theory, Ser. B, 1998

Synthesis of Native Mode Self-Test Programs.
J. Electronic Testing, 1998

Native mode functional test generation for processors with applications to self test and design validation.
Proceedings of the Proceedings IEEE International Test Conference 1998, 1998

On Combining Formal and Informal Verification.
Proceedings of the Computer Aided Verification, 9th International Conference, 1997

Electrostatic binding energy calculation using the finite difference solution to the linearized Poisson-Boltzmann equation: Assessment of its accuracy.
Journal of Computational Chemistry, 1996

An improvement of the Dulmage-Mendelsohn theorem.
Discrete Mathematics, 1996

The analysis of multigrid algorithms for cell centered finite difference methods.
Adv. Comput. Math., 1996

Real-time 3D pulse-echo ultrasonic imaging with coded-excitation systems.
Proceedings of the Proceedings 1996 International Conference on Image Processing, 1996

On the design of a transversal filter bank for parallel processing multiple image lines in real-time acoustic imaging.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

Calculation of Binding Energy Differences for Receptor-Ligand Systems Using the Poisson-Boltzmann Method.
Journal of Computational Chemistry, 1995