Jian Xu
Orcid: 0000-0001-5590-8540Affiliations:
- Northeastern University, Software College, Shenyang, China (PhD 2013)
According to our database1,
Jian Xu
authored at least 61 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Stand. Interfaces, 2025
2024
Secure decision tree classification with decentralized authorization and access control.
Comput. Stand. Interfaces, 2024
Comput. Commun., 2024
Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems.
Comput. Commun., 2024
2023
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT.
Comput. Networks, December, 2023
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system.
J. Syst. Archit., October, 2023
2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Cloud Comput., 2022
Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT.
J. Inf. Secur. Appl., 2022
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System.
Proceedings of the Frontiers in Cyber Security - 5th International Conference, 2022
2021
Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems.
IEEE Trans. Ind. Informatics, 2021
Secur. Commun. Networks, 2021
Mob. Networks Appl., 2021
Mob. Networks Appl., 2021
Efficient verifiable databases with additional insertion and deletion operations in cloud computing.
Future Gener. Comput. Syst., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021
2020
Wirel. Commun. Mob. Comput., 2020
IEEE Trans. Comput. Soc. Syst., 2020
Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis.
Sensors, 2020
Outsourced privacy-preserving decision tree classification service over encrypted data.
J. Inf. Secur. Appl., 2020
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system.
Future Gener. Comput. Syst., 2020
Comput. J., 2020
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020
Weights Optimization Method of Differential Evolution Based on Artificial Bee Colony Algorithm.
Proceedings of the Simulation Tools and Techniques - 12th EAI International Conference, 2020
A Multi-objective Ant Colony Optimization Algorithm with Local Optimum Avoidance Strategy.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
J. Inf. Secur. Appl., 2019
Int. J. Found. Comput. Sci., 2019
IEEE Access, 2019
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
2018
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures.
J. Netw. Comput. Appl., 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services.
J. Inf. Sci. Eng., 2017
Int. J. Found. Comput. Sci., 2017
IEEE Access, 2017
Analysis Model for Fire Accidents of Electric Bicycles Based on Principal Component Analysis.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage".
IEEE Trans. Serv. Comput., 2016
计算机科学, 2016
J. Ambient Intell. Humaniz. Comput., 2016
J. Ambient Intell. Humaniz. Comput., 2016
Int. J. Comput. Math., 2016
Proceedings of the Provable Security, 2016
2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014
2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
2011
Research on Embedding Compressed Watermarking Based on Chaotic and Wavelet Algorithm.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008