Jian Xu

Orcid: 0000-0001-5590-8540

Affiliations:
  • Northeastern University, Software College, Shenyang, China (PhD 2013)


According to our database1, Jian Xu authored at least 61 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR.
Comput. Stand. Interfaces, 2025

2024
Secure decision tree classification with decentralized authorization and access control.
Comput. Stand. Interfaces, 2024

Privacy-preserving and verifiable data aggregation for Internet of Vehicles.
Comput. Commun., 2024

Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems.
Comput. Commun., 2024

2023
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT.
Comput. Networks, December, 2023

Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system.
J. Syst. Archit., October, 2023

2022
Privacy-Preserving Publicly Verifiable Databases.
IEEE Trans. Dependable Secur. Comput., 2022

Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets.
IEEE Trans. Cloud Comput., 2022

Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT.
J. Inf. Secur. Appl., 2022

A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022

2021
Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems.
IEEE Trans. Ind. Informatics, 2021

A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks.
Secur. Commun. Networks, 2021

A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications.
Mob. Networks Appl., 2021

Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem.
Mob. Networks Appl., 2021

Efficient verifiable databases with additional insertion and deletion operations in cloud computing.
Future Gener. Comput. Syst., 2021

A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS.
Proceedings of the 20th IEEE International Conference on Trust, 2021

An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation.
Proceedings of the 20th IEEE International Conference on Trust, 2021

A Secure Cloud-Edge Collaborative Logistic Regression Model.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

2020
Privacy-Preserving Graph Operations for Mobile Authentication.
Wirel. Commun. Mob. Comput., 2020

SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing.
IEEE Trans. Comput. Soc. Syst., 2020

Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.
Sensors, 2020

Chameleon accumulator and its applications.
J. Inf. Secur. Appl., 2020

Outsourced privacy-preserving decision tree classification service over encrypted data.
J. Inf. Secur. Appl., 2020

Generating universal adversarial perturbation with ResNet.
Inf. Sci., 2020

Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system.
Future Gener. Comput. Syst., 2020

A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications.
Comput. J., 2020

Privacy-Preserving Graph Operations for Social Network Analysis.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Weights Optimization Method of Differential Evolution Based on Artificial Bee Colony Algorithm.
Proceedings of the Simulation Tools and Techniques - 12th EAI International Conference, 2020

A Multi-objective Ant Colony Optimization Algorithm with Local Optimum Avoidance Strategy.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Secure data stream outsourcing with publicly verifiable integrity in cloud storage.
J. Inf. Secur. Appl., 2019

Privacy-Preserving Subgraph Matching Protocol for Two Parties.
Int. J. Found. Comput. Sci., 2019

Publicly verifiable function secret sharing.
Int. J. Comput. Sci. Eng., 2019

SGX-Based Secure Indexing System.
IEEE Access, 2019

Lightweight Privacy-Preserving Equality Query in Edge Computing.
IEEE Access, 2019

User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data.
IEEE Access, 2019

A Heuristic Scout Search Mechanism for Artificial Bee Colony Algorithm.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

Research on K-Means Clustering Algorithm Over Encrypted Data.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

2018
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Netw. Comput. Appl., 2018

A Review of Privacy-Preserving Machine Learning Classification.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services.
J. Inf. Sci. Eng., 2017

Identity-Based Batch Provable Data Possession with Detailed Analyses.
Int. J. Found. Comput. Sci., 2017

Dynamic Chameleon Authentication Tree for Verifiable Data Streaming in 5G Networks.
IEEE Access, 2017

Identity-Based Public Multi-Replica Provable Data Possession.
IEEE Access, 2017

Private Subgraph Matching Protocol.
Proceedings of the Provable Security, 2017

Analysis Model for Fire Accidents of Electric Bicycles Based on Principal Component Analysis.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Anti-Reverse-Engineering Tool of Executable Files on the Windows Platform.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Private Graph Intersection Protocol.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2016

基于用户鼠标行为的身份认证方法 (Identity Authentication Method Based on User's Mouse Behavior).
计算机科学, 2016

Dynamic proofs of retrievability with square-root oblivious RAM.
J. Ambient Intell. Humaniz. Comput., 2016

Anomaly detection model of user behavior based on principal component analysis.
J. Ambient Intell. Humaniz. Comput., 2016

The electronic cash system based on non-interactive zero-knowledge proofs.
Int. J. Comput. Math., 2016

Identity-Based Batch Provable Data Possession.
Proceedings of the Provable Security, 2016

2014
An Improved Authenticated Skip List for Relational Query Authentication.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014

2013
The Electronic Cash Protocol Based on Dynamic Group Signature.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

2011
Research on Embedding Compressed Watermarking Based on Chaotic and Wavelet Algorithm.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2008
Research on anonymous signatures and group signatures.
Comput. Commun., 2008

Hierarchical Data Processing Model and Complete Tree Key Management Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Multicast Key Management Scheme Based on TOFT.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008


  Loading...