Search Results - "Ma, Jianfeng"
-
1
Device-to-Device Communication in LTE-Advanced Networks: A Survey
Published in IEEE Communications surveys and tutorials (01-01-2015)“…Among the LTE-A communication techniques, Device-to-Device (D2D) communication which is defined to directly route data traffic between spatially closely…”
Get full text
Journal Article -
2
Verifiable Computation over Large Database with Incremental Updates
Published in IEEE transactions on computers (01-10-2016)“…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
Get full text
Journal Article -
3
Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks
Published in IEEE access (2017)“…Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally…”
Get full text
Journal Article -
4
New Algorithms for Secure Outsourcing of Modular Exponentiations
Published in IEEE transactions on parallel and distributed systems (01-09-2014)“…With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting…”
Get full text
Journal Article -
5
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation
Published in IEEE transactions on computers (01-08-2016)“…The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in…”
Get full text
Journal Article -
6
Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification
Published in IEEE journal of biomedical and health informatics (01-03-2016)“…Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention…”
Get full text
Journal Article -
7
A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms
Published in IEEE access (2019)“…Android malware severely threaten system and user security in terms of privilege escalation, remote control, tariff theft, and privacy leakage. Therefore, it…”
Get full text
Journal Article -
8
Mg doped CuO–Fe2O3 composites activated by persulfate as highly active heterogeneous catalysts for the degradation of organic pollutants
Published in Journal of alloys and compounds (05-06-2020)“…Mg doped CuO–Fe2O3 composites were hydrothermally synthesized and characterized by powder X-ray diffraction (XRD), scanning electron microscopy (SEM) and Raman…”
Get full text
Journal Article -
9
Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network
Published in IEEE transactions on vehicular technology (01-11-2019)“…A dynamic group key is required for secure communication in the Unmanned Aerial Vehicles Ad-Hoc Network (UAANET). However, due to the unreliable wireless…”
Get full text
Journal Article -
10
A Novel Dynamic Android Malware Detection System With Ensemble Learning
Published in IEEE access (2018)“…With the popularity of Android smartphones, malicious applications targeted Android platform have explosively increased. Proposing effective Android malware…”
Get full text
Journal Article -
11
Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks
Published in IEEE transactions on vehicular technology (01-08-2017)“…Device-to-device (D2D) communication, which enables two closely located users to communicate with each other without traversing the base station (BS), has…”
Get full text
Journal Article -
12
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations
Published in IEEE transactions on information forensics and security (01-01-2015)“…With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted…”
Get full text
Journal Article -
13
New Publicly Verifiable Databases with Efficient Updates
Published in IEEE transactions on dependable and secure computing (01-09-2015)“…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
Get full text
Journal Article -
14
Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band
Published in IEEE internet of things journal (01-04-2020)“…Covert communication can prevent an adversary from knowing that a transmission has occurred between two users. In this article, we consider covert wireless…”
Get full text
Journal Article -
15
Ruthenium-Catalyzed Oxidative C–H Bond Olefination of N-Methoxybenzamides Using an Oxidizing Directing Group
Published in Organic letters (03-02-2012)“…Ruthenium-catalyzed oxidative C–H bond olefination of N-methoxybenzamides using an oxidizing directing group with a broad substrate scope is reported. The…”
Get full text
Journal Article -
16
A privacy preserving three-factor authentication protocol for e-Health clouds
Published in The Journal of supercomputing (01-10-2016)“…E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of big data in healthcare. However, such an adoption also brings…”
Get full text
Journal Article -
17
Local Differential Privacy Based Membership-Privacy-Preserving Federated Learning for Deep-Learning-Driven Remote Sensing
Published in Remote sensing (Basel, Switzerland) (01-10-2023)“…With the development of deep learning, image recognition based on deep learning is now widely used in remote sensing. As we know, the effectiveness of deep…”
Get full text
Journal Article -
18
Nanocomposite of exfoliated bentonite/g-C3N4/Ag3PO4 for enhanced visible-light photocatalytic decomposition of Rhodamine B
Published in Chemosphere (Oxford) (01-11-2016)“…Novel visible-light-driven heterojunction photocatalyst comprising exfoliated bentonite, g-C3N4 and Ag3PO4 (EB/g-C3N4/Ag3PO4) was synthesized by a facile and…”
Get full text
Journal Article -
19
An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation
Published in IEEE transactions on smart grid (01-03-2013)“…The smart grid features ubiquitous interconnections of power equipments to enable two-way flows of electricity and information for various intelligent power…”
Get full text
Journal Article -
20
TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing
Published in IEEE transactions on information forensics and security (01-06-2013)“…The ubiquity of the various cheap embedded sensors on mobile devices, for example cameras, microphones, accelerometers, and so on, is enabling the emergence of…”
Get full text
Journal Article