Search Results - "Ma, Jianfeng"

Refine Results
  1. 1

    Device-to-Device Communication in LTE-Advanced Networks: A Survey by Jiajia Liu, Kato, Nei, Jianfeng Ma, Kadowaki, Naoto

    Published in IEEE Communications surveys and tutorials (01-01-2015)
    “…Among the LTE-A communication techniques, Device-to-Device (D2D) communication which is defined to directly route data traffic between spatially closely…”
    Get full text
    Journal Article
  2. 2

    Verifiable Computation over Large Database with Incremental Updates by Chen, Xiaofeng, Li, Jin, Weng, Jian, Ma, Jianfeng, Lou, Wenjing

    Published in IEEE transactions on computers (01-10-2016)
    “…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
    Get full text
    Journal Article
  3. 3

    Lightweight three-factor authentication and key agreement protocol for internet-integrated wireless sensor networks by Qi Jiang, Zeadally, Sherali, Jianfeng Ma, Debiao He

    Published in IEEE access (2017)
    “…Wireless sensor networks (WSNs) will be integrated into the future Internet as one of the components of the Internet of Things, and will become globally…”
    Get full text
    Journal Article
  4. 4

    New Algorithms for Secure Outsourcing of Modular Exponentiations by Chen, Xiaofeng, Li, Jin, Ma, Jianfeng, Tang, Qiang, Lou, Wenjing

    “…With the rapid development of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted servers are getting…”
    Get full text
    Journal Article
  5. 5

    Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation by Jiang, Tao, Chen, Xiaofeng, Ma, Jianfeng

    Published in IEEE transactions on computers (01-08-2016)
    “…The advent of the cloud computing makes storage outsourcing become a rising trend, which promotes the secure remote data auditing a hot topic that appeared in…”
    Get full text
    Journal Article
  6. 6

    Privacy-Preserving Patient-Centric Clinical Decision Support System on Naïve Bayesian Classification by Liu, Ximeng, Lu, Rongxing, Ma, Jianfeng, Chen, Le, Qin, Baodong

    “…Clinical decision support system, which uses advanced data mining techniques to help clinician make proper decisions, has received considerable attention…”
    Get full text
    Journal Article
  7. 7

    A Combination Method for Android Malware Detection Based on Control Flow Graphs and Machine Learning Algorithms by Ma, Zhuo, Ge, Haoran, Liu, Yang, Zhao, Meng, Ma, Jianfeng

    Published in IEEE access (2019)
    “…Android malware severely threaten system and user security in terms of privilege escalation, remote control, tariff theft, and privacy leakage. Therefore, it…”
    Get full text
    Journal Article
  8. 8

    Mg doped CuO–Fe2O3 composites activated by persulfate as highly active heterogeneous catalysts for the degradation of organic pollutants by Sun, Mengying, Lei, Yu, Cheng, Hao, Ma, Jianfeng, Qin, Yong, Kong, Yong, Komarneni, Sridhar

    Published in Journal of alloys and compounds (05-06-2020)
    “…Mg doped CuO–Fe2O3 composites were hydrothermally synthesized and characterized by powder X-ray diffraction (XRD), scanning electron microscopy (SEM) and Raman…”
    Get full text
    Journal Article
  9. 9

    Blockchain-Based Mutual-Healing Group Key Distribution Scheme in Unmanned Aerial Vehicles Ad-Hoc Network by Li, Xinghua, Wang, Yunwei, Vijayakumar, Pandi, He, Debiao, Kumar, Neeraj, Ma, Jianfeng

    Published in IEEE transactions on vehicular technology (01-11-2019)
    “…A dynamic group key is required for secure communication in the Unmanned Aerial Vehicles Ad-Hoc Network (UAANET). However, due to the unreliable wireless…”
    Get full text
    Journal Article
  10. 10

    A Novel Dynamic Android Malware Detection System With Ensemble Learning by Feng, Pengbin, Ma, Jianfeng, Sun, Cong, Xu, Xinpeng, Ma, Yuwan

    Published in IEEE access (2018)
    “…With the popularity of Android smartphones, malicious applications targeted Android platform have explosively increased. Proposing effective Android malware…”
    Get full text
    Journal Article
  11. 11

    Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks by Dai, Jiahao, Liu, Jiajia, Shi, Yongpeng, Zhang, Shubin, Ma, Jianfeng

    Published in IEEE transactions on vehicular technology (01-08-2017)
    “…Device-to-device (D2D) communication, which enables two closely located users to communicate with each other without traversing the base station (BS), has…”
    Get full text
    Journal Article
  12. 12

    New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations by Xiaofeng Chen, Xinyi Huang, Jin Li, Jianfeng Ma, Wenjing Lou, Wong, Duncan S.

    “…With the rapid development in availability of cloud services, the techniques for securely outsourcing the prohibitively expensive computations to untrusted…”
    Get full text
    Journal Article
  13. 13

    New Publicly Verifiable Databases with Efficient Updates by Chen, Xiaofeng, Li, Jin, Huang, Xinyi, Ma, Jianfeng, Lou, Wenjing

    “…The notion of verifiable database (VDB) enables a resource-constrained client to securely outsource a very large database to an untrusted server so that it…”
    Get full text
    Journal Article
  14. 14

    Covert Wireless Communication in IoT Network: From AWGN Channel to THz Band by Liu, Zhihong, Liu, Jiajia, Zeng, Yong, Ma, Jianfeng

    Published in IEEE internet of things journal (01-04-2020)
    “…Covert communication can prevent an adversary from knowing that a transmission has occurred between two users. In this article, we consider covert wireless…”
    Get full text
    Journal Article
  15. 15

    Ruthenium-Catalyzed Oxidative C–H Bond Olefination of N-Methoxybenzamides Using an Oxidizing Directing Group by Li, Bin, Ma, Jianfeng, Wang, Nuancheng, Feng, Huiliang, Xu, Shansheng, Wang, Baiquan

    Published in Organic letters (03-02-2012)
    “…Ruthenium-catalyzed oxidative C–H bond olefination of N-methoxybenzamides using an oxidizing directing group with a broad substrate scope is reported. The…”
    Get full text
    Journal Article
  16. 16

    A privacy preserving three-factor authentication protocol for e-Health clouds by Jiang, Qi, Khan, Muhammad Khurram, Lu, Xiang, Ma, Jianfeng, He, Debiao

    Published in The Journal of supercomputing (01-10-2016)
    “…E-Health clouds are gaining increasing popularity by facilitating the storage and sharing of big data in healthcare. However, such an adoption also brings…”
    Get full text
    Journal Article
  17. 17

    Local Differential Privacy Based Membership-Privacy-Preserving Federated Learning for Deep-Learning-Driven Remote Sensing by Zhang, Zheng, Ma, Xindi, Ma, Jianfeng

    Published in Remote sensing (Basel, Switzerland) (01-10-2023)
    “…With the development of deep learning, image recognition based on deep learning is now widely used in remote sensing. As we know, the effectiveness of deep…”
    Get full text
    Journal Article
  18. 18

    Nanocomposite of exfoliated bentonite/g-C3N4/Ag3PO4 for enhanced visible-light photocatalytic decomposition of Rhodamine B by Ma, Jianfeng, Huang, Daiqin, Zhang, Wenyi, Zou, Jing, Kong, Yong, Zhu, Jianxi, Komarneni, Sridhar

    Published in Chemosphere (Oxford) (01-11-2016)
    “…Novel visible-light-driven heterojunction photocatalyst comprising exfoliated bentonite, g-C3N4 and Ag3PO4 (EB/g-C3N4/Ag3PO4) was synthesized by a facile and…”
    Get full text
    Journal Article
  19. 19

    An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation by Lu, Xiang, Wang, Wenye, Ma, Jianfeng

    Published in IEEE transactions on smart grid (01-03-2013)
    “…The smart grid features ubiquitous interconnections of power equipments to enable two-way flows of electricity and information for various intelligent power…”
    Get full text
    Journal Article
  20. 20

    TrPF: A Trajectory Privacy-Preserving Framework for Participatory Sensing by Gao, Sheng, Ma, Jianfeng, Shi, Weisong, Zhan, Guoxing, Sun, Cong

    “…The ubiquity of the various cheap embedded sensors on mobile devices, for example cameras, microphones, accelerometers, and so on, is enabling the emergence of…”
    Get full text
    Journal Article