Jianming Zhu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
MSA-Net: multiple self-attention mechanism for 3D lung nodule classification in CT images.
BMC Medical Imaging, December, 2025

Robust Inference for Censored Quantile Regression.
J. Syst. Sci. Complex., August, 2025

AccessChain: A scalable and privacy-preserving access control scheme for blockchain-based IoT.
Peer Peer Netw. Appl., April, 2025

The Impact of Sustained Digital Innovation on Economic Development from the Perspective of Complex Networks: A Case Study of the Nine Inland Cities in the Guangdong-Hong Kong-Macao Greater Bay Area.
Proceedings of the E-Business. Generative Artificial Intelligence and Management Transformation, 2025

Identification and Configurational Analysis of Factors Influencing Innovation Performance in Artificial Intelligence Enterprises.
Proceedings of the E-Business. Generative Artificial Intelligence and Management Transformation, 2025

2024
Influence maximization under equilibrious groups in social networks.
J. Supercomput., October, 2024

TimeLink: enabling dynamic runtime prediction for Flink iterative jobs.
J. Supercomput., July, 2024

Comments on "Lightweight Privacy and Security Computing for Blockchained Federated Learning in IoT".
IEEE Internet Things J., April, 2024

Data-sharing strategies in medical consortium based on master-slave multichain and federated learning.
IET Blockchain, 2024

OdCFU-Net for Brain Tumor Segmentation Based on MRI.
Proceedings of the IEEE International Conference on Computational Intelligence and Virtual Environments for Measurement Systems and Applications, 2024

2023
Design of Intelligent Controller for Aero-engine Based on TD3 Algorithm.
Inf. Technol. Control., December, 2023

Locally Differential Private Federated Learning with Controllable Perturbation Domains.
Proceedings of the International Conference on Networking and Network Applications, 2023

A Novel Federated Learning with Bidirectional Adaptive Differential Privacy.
Proceedings of the Data Science, 2023

A Virtual Reinforcement Learning Method for Aero-engine Intelligent Control.
Proceedings of the 8th International Conference on Automation, 2023

2022
Opinion influence maximization problem in online social networks based on group polarization effect.
Inf. Sci., 2022

Improved AdaBoost algorithm using misclassified samples oriented feature selection and weighted non-negative matrix factorization.
Neurocomputing, 2022

BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum.
Proceedings of the Data Science, 2022

Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption.
Proceedings of the Data Science, 2022

KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment.
Proceedings of the Data Science, 2022

Application Research of Safety Helmet Detection Based on Low Computing Power Platform Using YOLO v5.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Decentralized Blockchain Transaction Scheme Based on Digital Commitment.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Optimization for Variable Height Wind Farm Layout Model.
Intell. Autom. Soft Comput., 2021

Comprehensive study of schedulability tests and optimal design for rate-monotonic scheduling.
Comput. Commun., 2021

Blockchain Empowered Reliable Federated Learning by Worker Selection: A Trustworthy Reputation Evaluation Method.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2021

Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARK.
Proceedings of the Data Science, 2021

IoT Security Situational Awareness Based on Q-Learning and Bayesian Game.
Proceedings of the Data Science, 2021

Trustworthy Blockchain Data Sharing Model Based on Multi-authority ABE and zk-SNARK.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Code Will Speak: Early detection of Ponzi Smart Contracts on Ethereum.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
Improving Topic-Based Data Exchanges among IoT Devices.
Secur. Commun. Networks, 2020

融合语义特征的关键词提取方法 (Keywords Extraction Method Based on Semantic Feature Fusion).
计算机科学, 2020

The correlation and volatility between bitcoin and the blockchain index.
Int. J. Crowd Sci., 2020

Unicyclic signed graphs with the first ⌊n+12⌋ largest energies.
Discret. Appl. Math., 2020

A New Attack Method for Malicious Nodes in Tangle Network.
Proceedings of the IEEE International Conference on Smart Cloud, 2020

A Review on the Study on MQTT Security Challenge.
Proceedings of the IEEE International Conference on Smart Cloud, 2020

A Study on MQTT Node Selection.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Measurement and Analysis of Network Data Based on MQTT Protocol.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Trustworthy Dynamic Target Detection and Automatic Monitor Scheme for Mortgage Loan with Blockchain-Based Smart Contract.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Probabilistic maximal frequent itemset mining methods over uncertain databases.
Intell. Data Anal., 2019

On the minimal matching energies of unicyclic graphs.
Discret. Appl. Math., 2019

Operation Mechanisms for Intelligent Logistics System: A Blockchain Perspective.
IEEE Access, 2019

Big Production Enterprise Supply Chain Endogenous Risk Management Based on Blockchain.
IEEE Access, 2019

Empirical Study on the Correlation and Volatility between Bitcoin and the Blockchain Index: Based on Granger causality test and GARCH-class model.
Proceedings of the ICCSE'19: The 4th International Conference on Crowd Science and Engineering, Jinan, China, October 18, 2019

2018
TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification.
Mob. Inf. Syst., 2018

基于区块链的信息物理融合系统的信息安全保护框架 (Information Security Framework Based on Blockchain for Cyber-physics System).
计算机科学, 2018

Probabilistic frequent itemset mining over uncertain data streams.
Expert Syst. Appl., 2018

The credit game on network supplier and customer based on big data.
Electron. Commer. Res., 2018

Novel artificial bee colony based feature selection method for filtering redundant information.
Appl. Intell., 2018

Research on the Security Criteria of Hash Functions in the Blockchain.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

2017
On Carrier Sensing Accuracy and Range Scaling Laws in Nakagami Fading Channels.
Wirel. Commun. Mob. Comput., 2017

CPS Information Security Risk Evaluation System Based on Petri Net.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
基于维度分区的果蝇优化新算法 (Novel Fruit Fly Optimization Algorithm Based on Dimension Partition).
计算机科学, 2016

Privacy-Preserving Access Control Scheme for Outsourced Data in Cloud.
Proceedings of the Internetworked World, 2016

2015
大数据环境下用户口令认证风险分析及对策 (Risk Analysis and Countermeasure for User Password Authentication in Big Data Environment).
计算机科学, 2015

2014
Efficient frequent itemset mining methods over time-sensitive streams.
Knowl. Based Syst., 2014

An Improved Privacy-Preserving Collaborative Filtering Recommendation Algorithm.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

A Research of E-Government Website Performance and its Relations with Economic Development.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Study Two-Stages Relief Supplies Distribution Problem Based on Characteristics of Disaster Situation Information.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

2012
Adapting the Right Measures for Pattern Discovery: A Unified View.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Two new edge grafting operations on the energy of unicyclic graphs and their applications.
Discret. Math., 2012

Monoecism Watermarking Algorithm.
Proceedings of the Fifth International Symposium on Parallel Architectures, 2012

Connected distribution center location problem under traffic network in emergency management.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2010
Intelligent Digital Photo Management System Using Ontology and SWRL.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Data Gathering Schedule for Minimal Aggregation Time in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2009

Collusion-Resistant Protocol for Privacy-Preserving Distributed Association Rules Mining.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

A New Scheme to Privacy-Preserving Collaborative Data Mining.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Improved Algorithm for Minimum Data Aggregation Time Problem in Wireless Sensor Networks.
J. Syst. Sci. Complex., 2008

A Hybrid Vulnerability Analysis Method against Non-Security Protocols.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
New Algorithm for Minimum Multicast Time Problem in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2006
Minimum Multicast Time Problem in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Effects of Phase Noise at Both Transmitter and Receiver on the Performance of OFDM Systems.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Minimum Data Aggregation Time Problem in Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

2002
Power allocation algorithm in MC-CDMA.
Proceedings of the IEEE International Conference on Communications, 2002


  Loading...