Jianan Hong
Orcid: 0009-0000-1452-5252
  According to our database1,
  Jianan Hong
  authored at least 37 papers
  between 2016 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    IEEE Trans. Netw. Serv. Manag., June, 2025
    
  
Receiver-Agnostic Radio Frequency Fingerprint Identification for Zero-Trust Wireless Networks.
    
  
    IEEE J. Sel. Areas Commun., June, 2025
    
  
Communication Efficient Ciphertext-Field Aggregation in Wireless Networks via Over-the-Air Computation.
    
  
    IEEE Trans. Inf. Forensics Secur., 2025
    
  
Solving Data Contamination in DDoS Detection: A Method Based on Hierarchical Federated Learning.
    
  
    IEEE Trans. Inf. Forensics Secur., 2025
    
  
EtherCloak: Enabling Multi-Level and Customized Privacy on Account-Model Blockchains.
    
  
    IEEE Trans. Dependable Secur. Comput., 2025
    
  
    IEEE Trans. Dependable Secur. Comput., 2025
    
  
    Proceedings of the Blockchain - ICBC 2025, 2025
    
  
  2024
Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT.
    
  
    IEEE Internet Things J., September, 2024
    
  
Optimal Power Control and CSI Acquisition for Over-the-Air Computation in OFDM System.
    
  
    IEEE Trans. Wirel. Commun., June, 2024
    
  
    IEEE Trans. Mob. Comput., May, 2024
    
  
HFL-AD: A Hierarchical Federated Learning Framework for Solving Data Contamination in DDoS Detection.
    
  
    Proceedings of the 23rd IEEE International Conference on Trust, 2024
    
  
UE-detectable Authentication and Key Agreement Method Resisting Serving Network Forging.
    
  
    Proceedings of the International Conference on Networking and Network Applications, 2024
    
  
Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning.
    
  
    Proceedings of the IEEE INFOCOM 2024, 2024
    
  
AcBF: A Revocable Blockchain-Based Identity Management Enabling Low-Latency Authentication.
    
  
    Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
    
  
Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency Authentication.
    
  
    Proceedings of the International Conference on Computing, Networking and Communications, 2024
    
  
    Proceedings of the IEEE International Conference on Communications, 2024
    
  
  2023
    Proceedings of the IEEE Global Communications Conference, 2023
    
  
Receiver-Agnostic Radio Frequency Fingerprinting Based on Two-stage Unsupervised Domain Adaptation and Fine-tuning.
    
  
    Proceedings of the IEEE Global Communications Conference, 2023
    
  
  2022
A Blockchain Based User Subscription Data Management and Access Control Scheme in Mobile Communication Networks.
    
  
    IEEE Trans. Veh. Technol., 2022
    
  
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage.
    
  
    IEEE Trans. Dependable Secur. Comput., 2022
    
  
Forward Private Multi-Client Searchable Encryption with Efficient Access Control in Cloud Storage.
    
  
    Proceedings of the IEEE Global Communications Conference, 2022
    
  
    Proceedings of the IEEE Global Communications Conference, 2022
    
  
  2020
An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks.
    
  
    IEEE Trans. Veh. Technol., 2020
    
  
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud.
    
  
    IEEE Trans. Serv. Comput., 2020
    
  
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number.
    
  
    IEEE Trans. Dependable Secur. Comput., 2020
    
  
  2019
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage.
    
  
    IEEE Trans. Inf. Forensics Secur., 2019
    
  
Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data.
    
  
    IEEE Internet Things J., 2019
    
  
  2018
    IEEE Trans. Inf. Forensics Secur., 2018
    
  
Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing.
    
  
    IEEE Netw., 2018
    
  
Low-Latency Authentication Against Satellite Compromising for Space Information Network.
    
  
    Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018
    
  
LASA: Lightweight, Auditable and Secure Access Control in ICN with Limitation of Access Times.
    
  
    Proceedings of the 2018 IEEE International Conference on Communications, 2018
    
  
  2017
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage.
    
  
    IEEE Trans. Inf. Forensics Secur., 2017
    
  
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving.
    
  
    IEEE Trans. Inf. Forensics Secur., 2017
    
  
CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding.
    
  
    IEEE Trans. Computers, 2017
    
  
    Proceedings of the IEEE International Conference on Communications, 2017
    
  
  2016
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage.
    
  
    IEEE Trans. Parallel Distributed Syst., 2016
    
  
    Proceedings of the 2016 IEEE Global Communications Conference, 2016