Jian Xu

Orcid: 0000-0001-5590-8540

Affiliations:
  • Northeastern University, Software College, Shenyang, China (PhD 2013)


According to our database1, Jian Xu authored at least 45 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT.
Comput. Networks, December, 2023

2022
Privacy-Preserving Publicly Verifiable Databases.
IEEE Trans. Dependable Secur. Comput., 2022

Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets.
IEEE Trans. Cloud Comput., 2022

Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT.
J. Inf. Secur. Appl., 2022

2021
Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems.
IEEE Trans. Ind. Informatics, 2021

A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks.
Secur. Commun. Networks, 2021

Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem.
Mob. Networks Appl., 2021

Efficient verifiable databases with additional insertion and deletion operations in cloud computing.
Future Gener. Comput. Syst., 2021

2020
Privacy-Preserving Graph Operations for Mobile Authentication.
Wirel. Commun. Mob. Comput., 2020

SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing.
IEEE Trans. Comput. Soc. Syst., 2020

Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.
Sensors, 2020

Chameleon accumulator and its applications.
J. Inf. Secur. Appl., 2020

Outsourced privacy-preserving decision tree classification service over encrypted data.
J. Inf. Secur. Appl., 2020

Generating universal adversarial perturbation with ResNet.
Inf. Sci., 2020

Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system.
Future Gener. Comput. Syst., 2020

A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications.
Comput. J., 2020

Privacy-Preserving Graph Operations for Social Network Analysis.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

2019
Secure data stream outsourcing with publicly verifiable integrity in cloud storage.
J. Inf. Secur. Appl., 2019

Privacy-Preserving Subgraph Matching Protocol for Two Parties.
Int. J. Found. Comput. Sci., 2019

Publicly verifiable function secret sharing.
Int. J. Comput. Sci. Eng., 2019

SGX-Based Secure Indexing System.
IEEE Access, 2019

Lightweight Privacy-Preserving Equality Query in Edge Computing.
IEEE Access, 2019

User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data.
IEEE Access, 2019

Research on K-Means Clustering Algorithm Over Encrypted Data.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Netw. Comput. Appl., 2018

A Review of Privacy-Preserving Machine Learning Classification.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services.
J. Inf. Sci. Eng., 2017

Identity-Based Batch Provable Data Possession with Detailed Analyses.
Int. J. Found. Comput. Sci., 2017

Dynamic Chameleon Authentication Tree for Verifiable Data Streaming in 5G Networks.
IEEE Access, 2017

Identity-Based Public Multi-Replica Provable Data Possession.
IEEE Access, 2017

Private Subgraph Matching Protocol.
Proceedings of the Provable Security, 2017

DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Private Graph Intersection Protocol.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2016

基于用户鼠标行为的身份认证方法 (Identity Authentication Method Based on User's Mouse Behavior).
计算机科学, 2016

Dynamic proofs of retrievability with square-root oblivious RAM.
J. Ambient Intell. Humaniz. Comput., 2016

Anomaly detection model of user behavior based on principal component analysis.
J. Ambient Intell. Humaniz. Comput., 2016

The electronic cash system based on non-interactive zero-knowledge proofs.
Int. J. Comput. Math., 2016

Identity-Based Batch Provable Data Possession.
Proceedings of the Provable Security, 2016

2014
An Improved Authenticated Skip List for Relational Query Authentication.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
The Electronic Cash Protocol Based on Dynamic Group Signature.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

2008
Research on anonymous signatures and group signatures.
Comput. Commun., 2008

Hierarchical Data Processing Model and Complete Tree Key Management Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Multicast Key Management Scheme Based on TOFT.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008


  Loading...