Search Results - "Chen, JinJun"
-
1
Hybrid many-objective particle swarm optimization algorithm for green coal production problem
Published in Information sciences (01-05-2020)“…The key aspect in coal production is realizing safe and efficient mining to maximize the utilization of the resources. A requirement for sustainable economic…”
Get full text
Journal Article -
2
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
Published in IEEE transactions on vehicular technology (01-06-2021)“…With accelerated ensemble of the Internet of Things technology and automotive industry, vehicular network has been established as powerful tools. However, it…”
Get full text
Journal Article -
3
In situ surface-enhanced Raman spectroscopy for detecting microplastics and nanoplastics in aquatic environments
Published in The Science of the total environment (01-08-2020)“…The detection of microplastics and nanoplastics in the environment, especially plastic particles in aquatic environments in situ, still faces challenges due to…”
Get full text
Journal Article -
4
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud
Published in IEEE transactions on parallel and distributed systems (01-02-2014)“…A large number of cloud services require users to share private data like electronic health records for data analysis or mining, bringing privacy concerns…”
Get full text
Journal Article -
5
External integrity verification for outsourced big data in cloud and IoT: A big picture
Published in Future generation computer systems (01-08-2015)“…As cloud computing is being widely adopted for big data processing, data security is becoming one of the major concerns of data owners. Data integrity is an…”
Get full text
Journal Article -
6
KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications
Published in IEEE transactions on parallel and distributed systems (01-12-2014)“…Service recommender systems have been shown as valuable tools for providing appropriate recommendations to users. In the last decade, the amount of customers,…”
Get full text
Journal Article -
7
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud
Published in IEEE transactions on computers (01-09-2015)“…Cloud computing that provides elastic computing and storage resource on demand has become increasingly important due to the emergence of "big data". Cloud…”
Get full text
Journal Article -
8
HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications
Published in IEEE transactions on parallel and distributed systems (01-02-2015)“…Cloud computing promises a scalable infrastructure for processing big data applications such as medical data analysis. Cross-cloud service composition provides…”
Get full text
Journal Article -
9
P2DCA: A Privacy-Preserving-Based Data Collection and Analysis Framework for IoMT Applications
Published in IEEE journal on selected areas in communications (01-06-2019)“…The concept of Internet of Multimedia Things (IoMT) is becoming popular nowadays and can be used in various smart city applications, e.g., traffic management,…”
Get full text
Journal Article -
10
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates
Published in IEEE transactions on parallel and distributed systems (01-09-2014)“…Cloud computing opens a new era in IT as it can provide various elastic and scalable IT services in a pay-as-you-go fashion, where its users can reduce the…”
Get full text
Journal Article -
11
EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment
Published in IEEE transactions on cloud computing (01-04-2016)“…Scientific workflows are often deployed across multiple cloud computing platforms due to their large-scale characteristic. This can be technically achieved by…”
Get full text
Journal Article -
12
Privacy Preserving High-Order Bi-Lanczos in Cloud-Fog Computing for Industrial Applications
Published in IEEE transactions on industrial informatics (01-10-2022)“…Industrial cyber-physical-social systems (CPSSs), a prominent data-driven paradigm, tightly couple and coordinate social space into cyber-physical systems…”
Get full text
Journal Article -
13
TGF-β-induced α-SMA expression is mediated by C/EBPβ acetylation in human alveolar epithelial cells
Published in Molecular medicine (Cambridge, Mass.) (04-03-2021)“…Although the morbidity and mortality rates associated with idiopathic pulmonary fibrosis (IPF) are high, there is still lack of powerful and precise…”
Get full text
Journal Article -
14
Challenge for the detection of microplastics in the environment
Published in Water environment research (01-01-2021)“…As an emerging contaminant in the environment, microplastics have attracted worldwide attention. Although research methods on microplastics in the environment…”
Get full text
Journal Article -
15
A Scalable Data Chunk Similarity Based Compression Approach for Efficient Big Sensing Data Processing on Cloud
Published in IEEE transactions on knowledge and data engineering (01-06-2017)“…Big sensing data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity. Cloud computing…”
Get full text
Journal Article -
16
The α2δ-1-NMDA Receptor Complex Is Critically Involved in Neuropathic Pain Development and Gabapentin Therapeutic Actions
Published in Cell reports (Cambridge) (27-02-2018)“…α2δ-1, commonly known as a voltage-activated Ca2+ channel subunit, is a binding site of gabapentinoids used to treat neuropathic pain and epilepsy. However, it…”
Get full text
Journal Article -
17
Weighted principal component analysis-based service selection method for multimedia services in cloud
Published in Computing (01-01-2016)“…Cloud computing has rendered its ever-increasing advantages in flexible service provisions, which attracts the attentions from large-scale enterprise…”
Get full text
Journal Article -
18
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud
Published in IEEE transactions on parallel and distributed systems (01-06-2013)“…Cloud computing provides massive computation power and storage capacity which enable users to deploy computation and data-intensive applications without…”
Get full text
Journal Article -
19
A Time Efficient Approach for Detecting Errors in Big Sensor Data on Cloud
Published in IEEE transactions on parallel and distributed systems (01-02-2015)“…Big sensor data is prevalent in both industry and scientific research applications where the data is generated with high volume and velocity it is difficult to…”
Get full text
Journal Article -
20
A Multi-Objective DV-Hop Localization Algorithm Based on NSGA-II in Internet of Things
Published in Mathematics (Basel) (15-02-2019)“…Locating node technology, as the most fundamental component of wireless sensor networks (WSNs) and internet of things (IoT), is a pivotal problem. Distance…”
Get full text
Journal Article