Jianming Zhu

Orcid: 0000-0002-8147-8254

According to our database1, Jianming Zhu authored at least 94 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Comments on "Lightweight Privacy and Security Computing for Blockchained Federated Learning in IoT".
IEEE Internet Things J., April, 2024

Economic Systems in the Metaverse: Basics, State of the Art, and Challenges.
ACM Comput. Surv., April, 2024

Minimizing the misinformation concern over social networks.
Inf. Process. Manag., January, 2024

2023
Design of Intelligent Controller for Aero-engine Based on TD3 Algorithm.
Inf. Technol. Control., December, 2023

Equilibrium of individual concern-critical influence maximization in virtual and real blending network.
Inf. Sci., November, 2023

Misinformation Blocking Problem in Virtual and Real Interconversion Social Networks.
ACM Trans. Knowl. Discov. Data, July, 2023

Misinformation influence minimization by entity protection on multi-social networks.
Appl. Intell., March, 2023

VCD-FL: Verifiable, Collusion-Resistant, and Dynamic Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

BPMS: Blockchain-Based Privacy-Preserving Multi-Keyword Search in Multi-Owner Setting.
IEEE Trans. Cloud Comput., 2023

Locally Differential Private Federated Learning with Controllable Perturbation Domains.
Proceedings of the International Conference on Networking and Network Applications, 2023

Ownership Tokenization and Incentive Design for Learning-based User-Generated Content.
Proceedings of the IEEE International Conference on Metaverse Computing, 2023

A Novel Federated Learning with Bidirectional Adaptive Differential Privacy.
Proceedings of the Data Science, 2023

Stochastic Model for Rumor Blocking Problem in Social Networks Under Rumor Source Uncertainty.
Proceedings of the Computing and Combinatorics - 29th International Conference, 2023

A Virtual Reinforcement Learning Method for Aero-engine Intelligent Control.
Proceedings of the 8th International Conference on Automation, 2023

2022
TrustWorker: A Trustworthy and Privacy-Preserving Worker Selection Scheme for Blockchain-Based Crowdsensing.
IEEE Trans. Serv. Comput., 2022

Competitive Influence Minimization in Multi-Group Social Networks: An Opinion-Based Solution.
IEEE Trans. Netw. Sci. Eng., 2022

CGTF: Convolution-Guided Transformer for Infrared and Visible Image Fusion.
IEEE Trans. Instrum. Meas., 2022

Opinion influence maximization problem in online social networks based on group polarization effect.
Inf. Sci., 2022

Improved AdaBoost algorithm using misclassified samples oriented feature selection and weighted non-negative matrix factorization.
Neurocomputing, 2022

BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum.
Proceedings of the Data Science, 2022

Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption.
Proceedings of the Data Science, 2022

KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment.
Proceedings of the Data Science, 2022

Application Research of Safety Helmet Detection Based on Low Computing Power Platform Using YOLO v5.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Decentralized Blockchain Transaction Scheme Based on Digital Commitment.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
Robust rumor blocking problem with uncertain rumor sources in social networks.
World Wide Web, 2021

Influence Maximization Problem With Echo Chamber Effect in Social Network.
IEEE Trans. Comput. Soc. Syst., 2021

Noninvasive Blood Glucose Concentration Measurement Based on Conservation of Energy Metabolism and Machine Learning.
Sensors, 2021

A Privacy-Preserving Identity Authentication Scheme Based on the Blockchain.
Secur. Commun. Networks, 2021

Misinformation influence minimization problem based on group disbanded in social networks.
Inf. Sci., 2021

Comprehensive study of schedulability tests and optimal design for rate-monotonic scheduling.
Comput. Commun., 2021

Blockchain Empowered Reliable Federated Learning by Worker Selection: A Trustworthy Reputation Evaluation Method.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2021

Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARK.
Proceedings of the Data Science, 2021

IoT Security Situational Awareness Based on Q-Learning and Bayesian Game.
Proceedings of the Data Science, 2021

On Forecasting Dynamics In Online Discussion Forums.
Proceedings of the 2021 IEEE International Conference on Multimedia and Expo, 2021

Trustworthy Blockchain Data Sharing Model Based on Multi-authority ABE and zk-SNARK.
Proceedings of the Blockchain and Trustworthy Systems - Third International Conference, 2021

Code Will Speak: Early detection of Ponzi Smart Contracts on Ethereum.
Proceedings of the IEEE International Conference on Services Computing, 2021

2020
TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain.
IEEE Trans. Veh. Technol., 2020

Activity Minimization of Misinformation Influence in Online Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

Improving Topic-Based Data Exchanges among IoT Devices.
Secur. Commun. Networks, 2020

融合语义特征的关键词提取方法 (Keywords Extraction Method Based on Semantic Feature Fusion).
计算机科学, 2020

Unicyclic signed graphs with the first ⌊n+12⌋ largest energies.
Discret. Appl. Math., 2020

Permissioned Blockchain-Based Double-Layer Framework for Product Traceability System.
IEEE Access, 2020

Atrial Fibrillation Identification With PPG Signals Using a Combination of Time-Frequency Analysis and Deep Learning.
IEEE Access, 2020

A New Attack Method for Malicious Nodes in Tangle Network.
Proceedings of the IEEE International Conference on Smart Cloud, 2020

A Review on the Study on MQTT Security Challenge.
Proceedings of the IEEE International Conference on Smart Cloud, 2020

A Study on MQTT Node Selection.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

Measurement and Analysis of Network Data Based on MQTT Protocol.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

Trustworthy Dynamic Target Detection and Automatic Monitor Scheme for Mortgage Loan with Blockchain-Based Smart Contract.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Social Influence Maximization in Hypergraph in Social Networks.
IEEE Trans. Netw. Sci. Eng., 2019

Group Influence Maximization Problem in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2019

Model and algorithm of routes planning for emergency relief distribution in disaster management with disaster information update.
J. Comb. Optim., 2019

Probabilistic maximal frequent itemset mining methods over uncertain databases.
Intell. Data Anal., 2019

On the minimal matching energies of unicyclic graphs.
Discret. Appl. Math., 2019

Near-Optimal Convergent Approach for Composed Influence Maximization Problem in Social Networks.
IEEE Access, 2019

Operation Mechanisms for Intelligent Logistics System: A Blockchain Perspective.
IEEE Access, 2019

Big Production Enterprise Supply Chain Endogenous Risk Management Based on Blockchain.
IEEE Access, 2019

Empirical Study on the Correlation and Volatility between Bitcoin and the Blockchain Index: Based on Granger causality test and GARCH-class model.
Proceedings of the ICCSE'19: The 4th International Conference on Crowd Science and Engineering, Jinan, China, October 18, 2019

Profit Maximization Under Group Influence Model in Social Networks.
Proceedings of the Computational Data and Social Networks - 8th International Conference, 2019

2018
TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification.
Mob. Inf. Syst., 2018

基于区块链的信息物理融合系统的信息安全保护框架 (Information Security Framework Based on Blockchain for Cyber-physics System).
计算机科学, 2018

Probabilistic frequent itemset mining over uncertain data streams.
Expert Syst. Appl., 2018

The credit game on network supplier and customer based on big data.
Electron. Commer. Res., 2018

Novel artificial bee colony based feature selection method for filtering redundant information.
Appl. Intell., 2018

Research on the Security Criteria of Hash Functions in the Blockchain.
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, 2018

2017
On Carrier Sensing Accuracy and Range Scaling Laws in Nakagami Fading Channels.
Wirel. Commun. Mob. Comput., 2017

APRS: a privacy-preserving location-aware recommender system based on differentially private histogram.
Sci. China Inf. Sci., 2017

Model and Algorithm for Rescue Resource Assignment Problem in Disaster Response Based on Demand-Ability-Equipment Matching.
Proceedings of the Queueing Theory and Network Applications, 2017

CPS Information Security Risk Evaluation System Based on Petri Net.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

2016
基于维度分区的果蝇优化新算法 (Novel Fruit Fly Optimization Algorithm Based on Dimension Partition).
计算机科学, 2016

Privacy-Preserving Access Control Scheme for Outsourced Data in Cloud.
Proceedings of the Internetworked World, 2016

2015
大数据环境下用户口令认证风险分析及对策 (Risk Analysis and Countermeasure for User Password Authentication in Big Data Environment).
计算机科学, 2015

Research on emergency resources storage region division based on two-stage stochastic programming.
Int. J. Inf. Technol. Manag., 2015

2014
Efficient frequent itemset mining methods over time-sensitive streams.
Knowl. Based Syst., 2014

An Improved Privacy-Preserving Collaborative Filtering Recommendation Algorithm.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

A Research of E-Government Website Performance and its Relations with Economic Development.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Study Two-Stages Relief Supplies Distribution Problem Based on Characteristics of Disaster Situation Information.
Proceedings of the Seventh International Joint Conference on Computational Sciences and Optimization, 2014

2012
Adapting the Right Measures for Pattern Discovery: A Unified View.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Reliable facility location problem considering facility failure scenarios.
Kybernetes, 2012

Two new edge grafting operations on the energy of unicyclic graphs and their applications.
Discret. Math., 2012

Monoecism Watermarking Algorithm.
Proceedings of the Fifth International Symposium on Parallel Architectures, 2012

Connected distribution center location problem under traffic network in emergency management.
Proceedings of the Fifth International Joint Conference on Computational Sciences and Optimization, 2012

2011
Secret Sharing Scheme with Fairness.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Intelligent Digital Photo Management System Using Ontology and SWRL.
Proceedings of the 2010 International Conference on Computational Intelligence and Security, 2010

2009
Data Gathering Schedule for Minimal Aggregation Time in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2009

A New Scheme to Privacy-Preserving Collaborative Data Mining.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Improved Algorithm for Minimum Data Aggregation Time Problem in Wireless Sensor Networks.
J. Syst. Sci. Complex., 2008

A Hybrid Vulnerability Analysis Method against Non-Security Protocols.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
New Algorithm for Minimum Multicast Time Problem in Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

2006
Minimum Multicast Time Problem in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, 2006

Effects of Phase Noise at Both Transmitter and Receiver on the Performance of OFDM Systems.
Proceedings of the 40th Annual Conference on Information Sciences and Systems, 2006

2005
Minimum Data Aggregation Time Problem in Wireless Sensor Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Design and Implementation of Survivable Network Systems.
Proceedings of the Advances in Intelligent Computing, 2005

2004
A new authentication scheme with anonymity for wireless environments.
IEEE Trans. Consumer Electron., 2004

2002
Power allocation algorithm in MC-CDMA.
Proceedings of the IEEE International Conference on Communications, 2002


  Loading...