Jianjing Shen

According to our database1, Jianjing Shen authored at least 14 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
A Survey on Side-Channel Attacks of Strong PUF.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Staged Method of Code Similarity Analysis for Firmware Vulnerability Detection.
IEEE Access, 2019

2016
云数据在数据挖掘中的隐私保护 (Privacy Protection under Cloud Computing against Data Mining).
计算机科学, 2016

云计算环境下隐私数据的隐式攻击保护 (Privacy Protection from Implicit Attacks in Cloud Computing Environment).
计算机科学, 2016

A Privacy Filtering and Processing Model in Cloud Computing.
Proceedings of the 9th International Symposium on Computational Intelligence and Design, 2016

2014
Scenario-driven composition of context-aware simulation components.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

2012
RFID technology in victory judgement of military exercises.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

An ArcObjects-based approach to rapid application development of GIS.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

The construction of concept system in TCM syndrome ontology.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

SO-RTI: A new RTI based on web services.
Proceedings of the 2012 IEEE International Conference on Automation and Logistics, 2012

Application of Mobile Cloud Computing in Operational Command Training Simulation System.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2010
A new access control method for semantic web services based on security control center.
Proceedings of the Sixth International Conference on Natural Computation, 2010

2007
Standard Model Establishment of TCM Syndrome Differentiation of Type 2 Diabetes Based on Data-Mining.
Proceedings of the Seventh International Conference on Intelligent Systems Design and Applications, 2007

A Danger Theory Inspired Multi-agent Fusion Model for Network Security Assessment.
Proceedings of the Third International Conference on Natural Computation, 2007


  Loading...