Jingchao Sun

Orcid: 0000-0002-9234-4622

According to our database1, Jingchao Sun authored at least 33 papers between 2011 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Spot-on: A Checkpointing Framework for Fault-Tolerant Long-running Workloads on Cloud Spot Instances.
CoRR, 2022

Persistent memory as an effective alternative to random access memory in metagenome assembly.
BMC Bioinform., 2022

2021
Semantic segmentation of brain tumor with nested residual attention networks.
Multim. Tools Appl., 2021

2020
Comparison of Different Machine Learning Approaches to Predict Small for Gestational Age Infants.
IEEE Trans. Big Data, 2020

Diagnosis and Knowledge Discovery of Turner Syndrome Based on Facial Images Using Machine Learning Methods.
IEEE Access, 2020

Automatic Classification of Turner Syndrome Using Unsupervised Feature Learning.
Proceedings of the 2020 IEEE International Conference on Systems, Man, and Cybernetics, 2020

2019
Improved Maximum Margin Clustering via the Bundle Method.
IEEE Access, 2019

2018
SpecGuard: Spectrum Misuse Detection in Dynamic Spectrum Access Systems.
IEEE Trans. Mob. Comput., 2018

Privacy-Preserving Social Media Data Outsourcing.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Security and Privacy in Mobile Computing: Challenges and Solutions.
PhD thesis, 2017

Mining Hidden Interests from Twitter Based on Word Similarity and Social Relationship for OLAP.
Int. J. Softw. Eng. Knowl. Eng., 2017

Discovering Hidden Interests from Twitter for Multidimensional Analysis.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Your face your heart: Secure mobile face authentication with photoplethysmograms.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

POWERFUL: Mobile app fingerprinting via power analysis.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2016
SecureFind: Secure and Privacy-Preserving Object Finding via Mobile Crowdsourcing.
IEEE Trans. Wirel. Commun., 2016

TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter.
IEEE/ACM Trans. Netw., 2016

Privacy-Preserving Spatiotemporal Matching for Secure Device-to-Device Communications.
IEEE Internet Things J., 2016

VISIBLE: Video-Assisted Keystroke Inference from Tablet Backside Motion.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

PriStream: Privacy-preserving distributed stream monitoring of thresholded PERCENTILE statistics.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A data-driven approach to predict Small-for-Gestational-Age infants.
Proceedings of the 13th IEEE International Conference on Networking, Sensing, and Control, 2016

iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2015

Secure Spatial Top-k Query Processing via Untrusted Location-Based Service Providers.
IEEE Trans. Dependable Secur. Comput., 2015

A Privacy Enhanced Search Approach for Cloud-Based Medical Data Sharing.
Proceedings of the 2015 IEEE International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, 2015

Your song your way: Rhythm-based two-factor authentication for multi-touch mobile devices.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Your actions tell where you are: Uncovering Twitter users in a metropolitan area.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

SafeDSA: Safeguard Dynamic Spectrum Access against Fake Secondary Users.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks.
IEEE Trans. Wirel. Commun., 2014

Generalized Likelihood Ratio Test For Cyclostationary Multi-Antenna Spectrum Sensing.
KSII Trans. Internet Inf. Syst., 2014

SYNERGY: A game-theoretical approach for cooperative key generation in wireless networks.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

TouchIn: Sightless two-factor authentication on multi-touch mobile devices.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Privacy-preserving spatiotemporal matching.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

2011
Low Overhead Cyclostationary Signatures Based on Hopping Subcarrier in OFDM-Based Dynamic Spectrum Access Networks.
Proceedings of the 74th IEEE Vehicular Technology Conference, 2011


  Loading...