Jianfeng Wang

According to our database1, Jianfeng Wang
  • authored at least 112 papers between 2000 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Facial Age Estimation With Age Difference.
IEEE Trans. Image Processing, 2017

Efficient and secure encrypted image search in mobile cloud computing.
Soft Comput., 2017

Fine-grained searchable encryption in multi-user setting.
Soft Comput., 2017

Secure similarity-based cloud data deduplication in Ubiquitous city.
Pervasive and Mobile Computing, 2017

Publicly verifiable databases with efficient insertion/deletion operations.
J. Comput. Syst. Sci., 2017

TrDup: enhancing secure data deduplication with user traceability in cloud computing.
IJWGS, 2017

Security Analysis of "PSLP: Privacy-Preserving Single-Layer Perceptron Learning for e-Healthcare".
IACR Cryptology ePrint Archive, 2017

Towards achieving flexible and verifiable search for outsourced database in cloud computing.
Future Generation Comp. Syst., 2017

Bounds on the PI index of unicyclic and bicyclic graphs with given girth.
Discrete Applied Mathematics, 2017

Face Attention Network: An Effective Face Detector for the Occluded Faces.
CoRR, 2017

Oriented Bicyclic Graphs with the First Five Large Skew Energies.
Ars Comb., 2017

Towards Multi-user Searchable Encryption Supporting Boolean Query and Fast Decryption.
Proceedings of the Provable Security, 2017

Gated Recurrent Convolution Neural Network for OCR.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

An Indoor Precise Positioning Algorithm Using 60GHz Millimeter-Wave Based on the Optimal Path Search.
Proceedings of the 2017 IEEE Globecom Workshops, Singapore, December 4-8, 2017, 2017

2016
A Distance-Computation-Free Search Scheme for Binary Code Databases.
IEEE Trans. Multimedia, 2016

Enabling efficient approximate nearest neighbor search for outsourced database in cloud computing.
Soft Comput., 2016

Height Profile Estimation of Power Lines Based on Two-Dimensional CSAR Imagery.
IEEE Geosci. Remote Sensing Lett., 2016

Secure searchable encryption: a survey.
J. Comm. Inform. Networks, 2016

Efficient and Secure Storage for Outsourced Data: A Survey.
Data Science and Engineering, 2016

Model-based target decomposition with the π/4 mode compact polarimetry data.
SCIENCE CHINA Information Sciences, 2016

Multi-device Anonymous Authentication.
Proceedings of the Network and System Security - 10th International Conference, 2016

Protecting Electronic Signatures in Case of Key Leakage.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Study on fine feature description of multi-aspect SAR observations.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Gridless sparse recovery methods for DLSLA 3-D SAR crosstrack reconstruction.
Proceedings of the 2016 IEEE International Geoscience and Remote Sensing Symposium, 2016

Analyzing intercontinental circuitousness to improve the interconnection and routing for ISPs.
Proceedings of the 2016 International Conference on Information Networking, 2016

Location-Sensitive Data Sharing in Mobile Cloud Computing.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Optimized Cartesian K-Means.
IEEE Trans. Knowl. Data Eng., 2015

Verifiable Auditing for Outsourced Database in Cloud Computing.
IEEE Trans. Computers, 2015

Secure multi-server-aided data deduplication in cloud computing.
Pervasive and Mobile Computing, 2015

Group $K$-Means.
CoRR, 2015

Secure Outsourcing of Modular Exponentiation with Single Untrusted Server.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

New Publicly Verifiable Databases Supporting Insertion Operation.
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

Online optimal power control of offshore oil-platform power systems based on interior point and fast branch-bound methods.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

Secure Encrypted Image Search in Mobile Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

Verifiable Search for Dynamic Outsourced Database in Cloud Computing.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

A New Secure Data Deduplication Approach Supporting User Traceability.
Proceedings of the 10th International Conference on Broadband and Wireless Computing, 2015

2014
A New Method for Multiple Finite-Element Models in Cosimulation With Electrical Circuit Using Machine Multiloop Modeling Scheme.
IEEE Trans. Industrial Electronics, 2014

An efficient PHR service system supporting fuzzy keyword search and fine-grained access control.
Soft Comput., 2014

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme.
J. Internet Serv. Inf. Secur., 2014

Optimized Cartesian $K$-Means.
CoRR, 2014

Optimized Distances for Binary Code Ranking.
Proceedings of the ACM International Conference on Multimedia, MM '14, Orlando, FL, USA, November 03, 2014

An Effective Cloud-Based Active Defense System against Malicious Codes.
Proceedings of the Information and Communication Technology, 2014

Online/Offline Attribute Based Signature.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Verifiable Algorithm for Secure Outsourcing of Systems of Linear Equations in the Case of No Solution.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Efficient Verifiable Public Key Encryption with Keyword Search Based on KP-ABE.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

Secure Approximate Nearest Neighbor Search over Encrypted Data.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
Zigbee light link and its applicationss.
IEEE Wireless Commun., 2013

Oroxylin A Inhibits Hemolysis via Hindering the Self-Assembly of α-Hemolysin Heptameric Transmembrane Pore.
PLoS Computational Biology, 2013

Security Analysis on a Timestamp-based Remote User Authentication Scheme.
JCP, 2013

Signless Laplacian eigenvalues and circumference of graphs.
Discrete Applied Mathematics, 2013

Efficient verifiable fuzzy keyword search over encrypted data in cloud computing.
Comput. Sci. Inf. Syst., 2013

The impact of faculty perceived reconfigurability of learning management systems on effective teaching practices.
Computers & Education, 2013

Order preserving hashing for approximate nearest neighbor search.
Proceedings of the ACM Multimedia Conference, 2013

An efficiency-enhanced wireless power transfer system with segmented transmitting coils for endoscopic capsule.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

2012
A Capacitor-Isolated LED Driver With Inherent Current Balance Capability.
IEEE Trans. Industrial Electronics, 2012

A New Efficient Verifiable Fuzzy Keyword Search Scheme.
JoWUA, 2012

A Verifiable Fuzzy Keyword Search Scheme Over Encrypted Data.
J. Internet Serv. Inf. Secur., 2012

3D scene reconstruction by multiple structured-light based commodity depth cameras.
Proceedings of the 2012 IEEE International Conference on Acoustics, 2012

2011
Analysis of QoS Provisioning in Cognitive Radio Networks: A Case Study.
Wireless Personal Communications, 2011

Multimedia Cloud Computing.
IEEE Signal Process. Mag., 2011

The Influence of Information Control upon On-line Shopping Behavior.
IJTHI, 2011

An Exploratory Study of How Technology Supports Communication in Multilingual Groups.
IJeC, 2011

Emerging cognitive radio applications: A survey.
IEEE Communications Magazine, 2011

How to solve the polynomial ordinary differential equations.
Applied Mathematics and Computation, 2011

Text Clustering Based on LSA-HGSOM.
Proceedings of the Web Information Systems and Mining - International Conference, 2011

2010
Applications, challenges, and prospective in emerging body area networking technologies.
IEEE Wireless Commun., 2010

A Model of System Re-Configurability and Pedagogical Usability in an E-Learning Context: A Faculty Perspective.
JOEUC, 2010

A Study of the Impact of Individual Differences on Online Shopping.
IJEBR, 2010

On the Index of Necklaces.
Graphs and Combinatorics, 2010

On the spectral characterizations of INFINITY -graphs.
Discrete Mathematics, 2010

On the two largest Q-eigenvalues of graphs.
Discrete Mathematics, 2010

Spectral Characterizations of Dumbbell Graphs.
Electr. J. Comb., 2010

Distance learning success - a perspective from socio-technical systems theory.
Behaviour & IT, 2010

Some results on the signless Laplacians of graphs.
Appl. Math. Lett., 2010

A new approach for image retrieval with integrated Euclidean distance and rotational correlation.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Research and Design of General Report Form System.
Proceedings of the 2010 International Conference on Machine Vision and Human-machine Interface, 2010

2009
Directional medium access control for ad hoc networks.
Wireless Networks, 2009

Performance of a burst-frame-based CSMA/CA protocol: Analysis and enhancement.
Wireless Networks, 2009

The cospectral equivalence classes of graphs having an isolated vertex.
Computers & Mathematics with Applications, 2009

A new expression for the adjoint polynomial of a path.
Australasian J. Combinatorics, 2009

Feasibility Study of Sensing TV Whitespace with Local Quiet Zone.
Proceedings of the IEEE International Conference on Systems, 2009

Finite-Time Boundedness Analysis of a Class of Neutral Type Neural Networks with Time Delays.
Proceedings of the Advances in Neural Networks, 2009

Globally Exponentially Attractive Set and Synchronization of a Class of Chaotic Finance System.
Proceedings of the Advances in Neural Networks, 2009

A Case Study of QoS Provisioning in TV-Band Cognitive Radio Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

2008
The chromatic equivalence class of graph ‾{Bn-6, 12}.
Discussiones Mathematicae Graph Theory, 2008

A complete solution to the chromatic equivalence class of graph I.
Discrete Mathematics, 2008

Trees with m-matchings and the fourth and fifth minimal Hosoya index.
Computers & Mathematics with Applications, 2008

Covert Communication Based on Subliminal Channel in Broadcast Multi Signature.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Cognitive Radio Based Wireless Sensor Networks.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Fan Fault Diagnosis System Based on Virtual Prototyping Technology.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
Enhancing the performance of medium access control for WLANs with multi-beam access point.
IEEE Trans. Wireless Communications, 2007

Maximum flow problem in wireless ad hoc networks with directional antennas.
Optimization Letters, 2007

System Architecture and Cross-Layer Optimization of Video Broadcast over WiMAX.
IEEE Journal on Selected Areas in Communications, 2007

Topic Effects on Process Gains and Losses in Electronic Meetings.
IRMJ, 2007

Achieving maximum flow in interference-aware wireless sensor networks with smart antennas.
Ad Hoc Networks, 2007

2006
Medium access control in mobile ad hoc networks: challenges and solutions.
Wireless Communications and Mobile Computing, 2006

Providing statistical QoS guarantee for voice over IP in the IEEE 802.11 wireless LANs.
IEEE Wireless Commun., 2006

DUCHA: A New Dual-Channel MAC Protocol for Multihop Ad Hoc Networks.
IEEE Trans. Wireless Communications, 2006

OMAR: Utilizing Multiuser Diversity in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

The estimation of sample size in multi-stage sampling and its application in medical survey.
Applied Mathematics and Computation, 2006

Performance of a burst-frame-based CSMA/CA protocol for high data rate ultra-wideband networks: analysis and enhancement.
Proceedings of the 3rd International ICST Conference on Quality of Service in Heterogeneous Wired/Wireless Networks, 2006

Open Wireless Software Radio on Common PC.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Performance and Analysis of CDM-FH-OFDMA for Broadband Wireless Systems.
Proceedings of the NETWORKING 2006, 2006

Hybrid ARQ Scheme with Antenna Permutation for MIMO Systems in Slow Fading Channels.
Proceedings of the NETWORKING 2006, 2006

A Power-Saving Multi-Radio Multi-Channel MAC Protocol for Wireless Local Area Networks.
Proceedings of the INFOCOM 2006. 25th IEEE International Conference on Computer Communications, 2006

2005
Receiver design for OFDM-CDMA systems with multiplexed STBC.
Proceedings of the IEEE 16th International Symposium on Personal, 2005

Uplink medium access control for WLANs with multi-beam access point.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
Distributed packet scheduling for multihop flows in ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Opportunistic packet Scheduling and Media Access control for wireless LANs and multi-hop ad hoc networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Opportunistic media access control and rate adaptation for wireless ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2004

2001
Adaptive mobile multimedia QoS control and resource management.
Proceedings of the Proceedings 9th IEEE International Conference on Networks, 2001

2000
Integrating information systems in electric utilities.
Proceedings of the IEEE International Conference on Systems, 2000


  Loading...