Jianyong Chen

According to our database1, Jianyong Chen authored at least 76 papers between 2008 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
A secure hash function based on feedback iterative structure.
Enterprise IS, 2019

On Stability of Multi-Valued Nonlinear Feedback Shift Registers.
Complexity, 2019

Evolutionary Search with Multiple Utopian Reference Points in Decomposition-Based Multiobjective Optimization.
Complexity, 2019

A hybridized angle-encouragement-based decomposition approach for many-objective optimization problems.
Appl. Soft Comput., 2019

A novel Intrusion Detection System for Vehicular Ad Hoc Networks (VANETs) based on differences of traffic flow and position.
Appl. Soft Comput., 2019

2018
Secure Hashing-Based Verifiable Pattern Matching.
IEEE Trans. Information Forensics and Security, 2018

Particle Swarm Optimization With a Balanceable Fitness Estimation for Many-Objective Optimization Problems.
IEEE Trans. Evolutionary Computation, 2018

A Diversity-Enhanced Resource Allocation Strategy for Decomposition-Based Multiobjective Evolutionary Algorithm.
IEEE Trans. Cybernetics, 2018

High-dimensional cryptographic quantum parameter estimation.
Quantum Information Processing, 2018

A gene-level hybrid search framework for multiobjective evolutionary optimization.
Neural Computing and Applications, 2018

An adaptive immune-inspired multi-objective algorithm with multiple differential evolution strategies.
Inf. Sci., 2018

Adaptive multiple-elites-guided composite differential evolution algorithm with a shift mechanism.
Inf. Sci., 2018

A novel artificial bee colony algorithm with local and global information interaction.
Appl. Soft Comput., 2018

A novel multi-objective co-evolutionary algorithm based on decomposition approach.
Appl. Soft Comput., 2018

A Novel Many-Objective Optimization Algorithm Based on the Hybrid Angle-Encouragement Decomposition.
Proceedings of the Intelligent Computing Methodologies - 14th International Conference, 2018

2017
An External Archive-Guided Multiobjective Particle Swarm Optimization Algorithm.
IEEE Trans. Cybernetics, 2017

An improved NSGA-III algorithm for feature selection used in intrusion detection.
Knowl.-Based Syst., 2017

A novel artificial bee colony algorithm with an adaptive population size for numerical function optimization.
Inf. Sci., 2017

A ranking-based adaptive artificial bee colony algorithm for global numerical optimization.
Inf. Sci., 2017

Quantum estimation of detection efficiency with no-knowledge quantum feedback.
CoRR, 2017

A novel adaptive control strategy for decomposition-based multiobjective algorithm.
Computers & OR, 2017

Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation.
Comput. J., 2017

A local search enhanced differential evolutionary algorithm for sparse recovery.
Appl. Soft Comput., 2017

An Elite Archive-Based MOEA/D Algorithm.
Proceedings of the Simulated Evolution and Learning - 11th International Conference, 2017

A Novel Multi-objective Evolutionary Algorithm Based on a Further Decomposition Strategy.
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017

2016
An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing.
IEEE Trans. Information Forensics and Security, 2016

A Hybrid Evolutionary Immune Algorithm for Multiobjective Optimization Problems.
IEEE Trans. Evolutionary Computation, 2016

A novel adaptive hybrid crossover operator for multiobjective evolutionary algorithm.
Inf. Sci., 2016

Adaptive composite operator selection and parameter control for multiobjective evolutionary algorithm.
Inf. Sci., 2016

A novel artificial bee colony algorithm with depth-first search framework and elite-guided search equation.
Inf. Sci., 2016

Optimizing security and quality of service in a Real-time database system using Multi-objective genetic algorithm.
Expert Syst. Appl., 2016

Adaptive differential evolution algorithm with novel mutation strategies in multiple sub-populations.
Computers & OR, 2016

Optimizing the Memory Management of a Virtual Machine Monitor on a NUMA System.
IEEE Computer, 2016

A novel multiple rule sets data classification algorithm based on ant colony algorithm.
Appl. Soft Comput., 2016

A novel hybrid differential evolution algorithm with modified CoDE and JADE.
Appl. Soft Comput., 2016

A Novel PSO-DE Co-evolutionary Algorithm Based on Decomposition Framework.
Proceedings of the Smart Computing and Communication, 2016

Making Cloud Storage Integrity Checking Protocols Economically Smarter.
Proceedings of the Smart Computing and Communication, 2016

Artificial Bee Colony Algorithm Based on Neighboring Information Learning.
Proceedings of the Neural Information Processing - 23rd International Conference, 2016

Cloud Storage Integrity Checking: Going from Theory to Practice.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
A framework for protecting personal information and privacy.
Security and Communication Networks, 2015

A novel multi-objective particle swarm optimization with multiple search strategies.
European Journal of Operational Research, 2015

A novel hybrid multi-objective immune algorithm with adaptive differential evolution.
Computers & OR, 2015

A double-module immune algorithm for multi-objective optimization problems.
Appl. Soft Comput., 2015

Enhance Differential Evolution Algorithm Based on Novel Mutation Strategy and Parameter Control Method.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

A Semantic Hash Tree Based Verifiable Data Access Protocol on the Cloud.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
Highly Efficient Linear Regression Outsourcing to a Cloud.
IEEE Trans. Cloud Computing, 2014

Secret sharing scheme with dynamic size of shares for distributed storage system.
Security and Communication Networks, 2014

A Completeness Optimized Algorithm for Closed Model Clone Detection.
JSW, 2014

A Novel Optimized Path-Based Algorithm for Model Clone Detection.
JSW, 2014

The Influence of Tone Inventory on ERP without Focal Attention: A Cross-Language Study.
Comp. Math. Methods in Medicine, 2014

2013
An enhanced variable-length arithmetic coding and encryption scheme using chaotic maps.
Journal of Systems and Software, 2013

A novel micro-population immune multiobjective optimization algorithm.
Computers & OR, 2013

An Ant Colony Optimization Approach for Nurse Rostering Problem.
Proceedings of the IEEE International Conference on Systems, 2013

2012
Generalized Arithmetic Coding using discrete Chaotic Maps.
I. J. Bifurcation and Chaos, 2012

On-Demand Security Architecture for Cloud Computing.
IEEE Computer, 2012

Chaos-based joint compression and encryption algorithm for generating variable length ciphertext.
Appl. Soft Comput., 2012

Identity Manage Interoperation Based on OpenID.
Proceedings of the Advances in Swarm Intelligence - Third International Conference, 2012

2011
A Modified Chaos-Based Joint Compression and Encryption Scheme.
IEEE Trans. on Circuits and Systems, 2011

Chaos-based multi-objective immune algorithm with a fine-grained selection mechanism.
Soft Comput., 2011

Optimization between security and delay of quality-of-service.
J. Network and Computer Applications, 2011

An Immune-Inspired Evolution Strategy for Constrained Optimization Problems.
International Journal on Artificial Intelligence Tools, 2011

Differentiated security levels for personal identifiable information in identity management system.
Expert Syst. Appl., 2011

Secure interoperation of identity managements among different circles of trust.
Computer Standards & Interfaces, 2011

Error detection in arithmetic coding with artificial markers.
Computers & Mathematics with Applications, 2011

Development and evaluation of a computerized Mandarin speech test system in China.
Comp. in Bio. and Med., 2011

Improvement of Security and Feasibility for Chaos-Based Multimedia Cryptosystem.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

Virtualization security for cloud computing service.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps.
IEEE Trans. on Circuits and Systems, 2010

A Novel Model for Evaluating Optimal Parameters of Security and Quality of Service.
JCP, 2010

Application of Novel Clonal Algorithm in Multiobjective Optimization.
International Journal of Information Technology and Decision Making, 2010

A hybrid immune multiobjective optimization algorithm.
European Journal of Operational Research, 2010

2009
An Improved Clonal Algorithm in Multiobjective Optimization.
JSW, 2009

Research on the Semantics Based Cross-Media Information Retrieval.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
An Architecture for Differentiated Security Service.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

Distributed Hot Spots Caching Mechanism for Queries with Popular Distribution.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...