Jun Tao

Orcid: 0000-0002-3052-3828

Affiliations:
  • Southeast University, School of Cyber Science and Engineering, Key Lab of CNII, Nanjing, China
  • Purple Mountain Laboratories for Network and Communication Security, Nanjing, China
  • Southeast University, Department of Computer Science and Engineering, Nanjing, China (PhD 2005)


According to our database1, Jun Tao authored at least 63 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
TELEX: Two-Level Learned Index for Rich Queries on Enclave-Based Blockchain Systems.
IEEE Trans. Knowl. Data Eng., July, 2025

CloudRGK: Towards Private Similarity Measurement Between Graphs on the Cloud.
IEEE Trans. Knowl. Data Eng., April, 2025

A Trusted Data Privacy Computing Method for Vehicular Ad Hoc Networks Based on Homomorphic Encryption and DAG Blockchain.
IEEE Internet Things J., March, 2025

Analytical Scheduling for Selfishness Detection in OppNets Based on Differential Game.
IEEE Trans. Netw. Serv. Manag., February, 2025

Tradeoff Between Capacity and Cost: Maximizing User Recruitment Through Collaboration in Mobile Crowdsensing.
IEEE Trans. Comput. Soc. Syst., February, 2025

Improving User QoE via Joint Trajectory and Resource Optimization in Multi-UAV Assisted MEC.
IEEE Trans. Serv. Comput., 2025

Efficient Privacy-Preserving Routing in OppNets With Probability Model and Discrete Optimization.
IEEE Trans. Dependable Secur. Comput., 2025

Toward Energy Variations for IoT Lightweight Authentication in Backscatter Communication.
IEEE Internet Things J., 2025

Semantics-aware location privacy preserving: A differential privacy approach.
Comput. Secur., 2025

2024
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy.
Cybersecur., December, 2024

DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural Network.
IEEE Trans. Netw. Serv. Manag., April, 2024

AUV-assisted information collection scheme with energy balance and low delay of underwater things.
Wirel. Networks, January, 2024

A secure authentication framework for IoV based on blockchain and ensemble learning.
Veh. Commun., 2024

IMRSG: Incentive Mechanism Based on Rubinstein-Starr Game for Mobile CrowdSensing.
IEEE Trans. Veh. Technol., 2024

A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing.
IEEE Trans. Inf. Forensics Secur., 2024

RASE: Efficient Privacy-preserving Data Aggregation against Disclosure Attacks for IoTs.
CoRR, 2024

TLS fingerprint for encrypted malicious traffic detection with attributed graph kernel.
Comput. Networks, 2024

An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices.
Proceedings of the International Joint Conference on Neural Networks, 2024

PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Toward the Minimal Wait-for Delay for Rechargeable WSNs with Multiple Mobile Chargers.
ACM Trans. Sens. Networks, November, 2023

Benefit-oriented task offloading in UAV-aided mobile edge computing: An approximate solution.
Peer Peer Netw. Appl., September, 2023

Joint Server Deployment and Task Scheduling for the Maximal Profit in Mobile-Edge Computing.
IEEE Internet Things J., 2023

Privacy-Preserving Data Aggregation in IoTs: A Randomize-then-Shuffle Paradigm.
Proceedings of the 97th IEEE Vehicular Technology Conference, 2023

An LP-Based Online Dispatching Method with Privacy-Preserving in Online Ride-Hailing.
Proceedings of the IEEE Global Communications Conference, 2023

2022
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.
Secur. Commun. Networks, 2022

Joint flight scheduling and task allocation for secure data collection in UAV-aided IoTs.
Comput. Networks, 2022

2021
CEBD: Contact-Evidence-Driven Blackhole Detection Based on Machine Learning in OppNets.
IEEE Trans. Comput. Soc. Syst., 2021

A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs.
Peer-to-Peer Netw. Appl., 2021

Analytical Optimal Solution of Selfish Node Detection with 2-hop Constraints in OppNets.
Proceedings of the IEEE 18th International Conference on Mobile Ad Hoc and Smart Systems, 2021

PCRAM-based data management method for storage and computation integration.
Proceedings of the 9th IEEE International Conference on Smart City and Informatization, 2021

MobiTrack: Mobile Crowdsensing-Based Object Tracking with Min-Region and Max-Utility.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Network Latency Estimation: A Tensor-based Weighted Singular Value Thresholding Method.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

scList: A PCRAM-based Hybrid Memory Management Scheme.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

EPDC: An Enhanced Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

A Unified Model for the Two-stage Offline-then-Online Resource Allocation.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
POF: Probability-Driven Opportunistic Forwarding for Bike-Sharing System.
IEEE Access, 2019

Reducing the Overhead of Multicast Using Social Features in Mobile Opportunistic Networks.
IEEE Access, 2019

Efficient Task Assignment for Crowd-Powered Rebalancing in Bike Sharing Systems.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

User Profiling with Campus Wi-Fi Access Trace and Network Traffic.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2019

Self-Adaptive Probabilistic Sampling for Elephant Flows Detection.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Similarity-Guided Multimedia Recommendation in Heterogeneous Information Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
On-Demand Mobile Data Collection in Cyber-Physical Systems.
Wirel. Commun. Mob. Comput., 2018

Contacts-aware opportunistic forwarding in mobile social networks: A community perspective.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Collaborative Route Plan for Parking Sites Selection in Bike-Sharing Systems.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Shape Retrieval with Adjustable Precision for Hole Detection in 3D Wireless Sensor Networks.
Proceedings of the 24th Asia-Pacific Conference on Communications, 2018

2017
LAOF: location-aware opportunistic forwarding scheme in mobile Ad hoc networks.
Trans. Emerg. Telecommun. Technol., 2017

A resource allocation game with restriction mechanism in VANET cloud.
Concurr. Comput. Pract. Exp., 2017

A quality-enhancing coverage scheme for camera sensor networks.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

Location-Aware Worker Selection for Mobile Opportunistic Crowdsensing in VANETs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
PITM: Passive indoor object tracking with Markov probability estimation in wireless sensor networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

2015
Joint anti-attack scheme for channel assignment in multi-radio multi-channel wireless mesh networks.
Secur. Commun. Networks, 2015

Location-aware opportunistic forwarding in mobile opportunistic networks.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Opportunistic Forwarding based on the weighted social characteristics in MSNs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Data sweeping in deterministic trajectories-covered Wireless Sensor Networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Non-cooperative Resource Allocation Scheme for Data Access in VANET Cloud Environment.
Proceedings of the Third International Conference on Advanced Cloud and Big Data, 2015

2014
RSU deployment scheme with power control for highway message propagation in VANETs.
Proceedings of the IEEE Global Communications Conference, 2014

2013
Social profile-based multicast routing scheme for delay-tolerant networks.
Proceedings of IEEE International Conference on Communications, 2013

Hexagonal clustering with mobile energy replenishment in wireless sensor networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Sweeping and active skipping in wireless sensor networks with mobile elements.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Adaptive mobility-assisted data collection in wireless sensor networks.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

2005
A Selfish Non-atomic Routing Algorithm Based on Game Theory.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...