Zhongtian Jia

According to our database1, Zhongtian Jia authored at least 14 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A mobile malware detection method using behavior features in network traffic.
J. Netw. Comput. Appl., 2019

2018
An Efficient Certificateless Generalized Signcryption Scheme.
Secur. Commun. Networks, 2018

Secure Comparison Under Ideal/Real Simulation Paradigm.
IEEE Access, 2018

A Pricing Model for Self-Help Investigation Offline Based on Multivariate Linear Regression Analysis.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2016
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

2012
Modelling security message propagation in delay tolerant networks.
Secur. Commun. Networks, 2012

Public key distribution scheme for delay tolerant networks based on two-channel cryptography.
J. Netw. Comput. Appl., 2012

A Secure Message Transaction Protocol for Delay Tolerant Networks.
J. Commun., 2012

Localization Using Joint Distance and Angle Information for 3D Wireless Sensor Networks.
IEEE Commun. Lett., 2012

Theoretic analysis of unique localization for wireless sensor networks.
Ad Hoc Networks, 2012

A secure message delivery scheme with path tracking for delay tolerant networks.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

2008
A Study on Achievable Rates for Source-Destination Pair in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2006
A Remote User Authentication Scheme Using Bilinear Pairings and ECC.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature.
Proceedings of the Computational Intelligence and Security, International Conference, 2006


  Loading...