Jianfei Sun

Orcid: 0000-0003-2204-0479

According to our database1, Jianfei Sun authored at least 48 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
It's All in the Touch: Authenticating Users With HOST Gestures on Multi-Touch Screen Devices.
IEEE Trans. Mob. Comput., October, 2024

Secure Source Identification Scheme for Revocable Instruction Sharing in Vehicle Platoon.
IEEE Trans. Intell. Transp. Syst., May, 2024

A Tamper-Resistant Broadcasting Scheme for Secure Communication in Internet of Autonomous Vehicles.
IEEE Trans. Intell. Transp. Syst., March, 2024

PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2024

OpenVFL: A Vertical Federated Learning Framework With Stronger Privacy-Preserving.
IEEE Trans. Inf. Forensics Secur., 2024

An Efficient Privacy-aware Split Learning Framework for Satellite Communications.
CoRR, 2024

A Joint Framework for Predicting Disease-Gene Interactions Based on Pre-trained Models and Graph Attention Networks.
Proceedings of the 2024 4th International Conference on Bioinformatics and Intelligent Computing, 2024

2023
Fine-Grained Data Sharing With Enhanced Privacy Protection and Dynamic Users Group Service for the IoV.
IEEE Trans. Intell. Transp. Syst., November, 2023

0-1 mathematical programming models for flexible process planning.
Eur. J. Oper. Res., August, 2023

Network-based integer programming models for flexible process planning.
Int. J. Prod. Res., May, 2023

Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems.
IEEE Trans. Intell. Transp. Syst., 2023

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption.
IEEE Trans. Inf. Forensics Secur., 2023

Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds.
IEEE Trans. Inf. Forensics Secur., 2023

Share Your Data Carefree: An Efficient, Scalable and Privacy-Preserving Data Sharing Service in Cloud Computing.
IEEE Trans. Cloud Comput., 2023

Intelligent Magnetic Resonance Imaging analysis and processing technology for magnetic nanoparticles medical applications.
Proceedings of the 15th International Conference on Bioinformatics and Biomedical Technology, 2023

Hypothesis Generation from Literature for Advancing Biological Mechanism Research: A Perspective.
Proceedings of the 15th International Conference on Bioinformatics and Biomedical Technology, 2023

2022
Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare.
IEEE Trans. Ind. Informatics, 2022

A Practical Fog-Based Privacy-Preserving Online Car-Hailing Service System.
IEEE Trans. Inf. Forensics Secur., 2022

Verifiable and privacy preserving federated learning without fully trusted centers.
J. Ambient Intell. Humaniz. Comput., 2022

2021
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting.
IEEE Trans. Dependable Secur. Comput., 2021

A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT.
IEEE Internet Things J., 2021

Attribute-based Encryption for Cloud Computing Access Control: A Survey.
ACM Comput. Surv., 2021

2020
A Secure Flexible and Tampering-Resistant Data Sharing System for Vehicular Social Networks.
IEEE Trans. Veh. Technol., 2020

Entry-Prohibited Effect of kHz Pulsed Magnetic Field Upon Interaction Between SPIO Nanoparticles and Mesenchymal Stem Cells.
IEEE Trans. Biomed. Eng., 2020

Specific, Non-Invasive, and Magnetically Directed Targeting of Magnetic Erythrocytes in Blood Vessels of Mice.
IEEE Trans. Biomed. Eng., 2020

Efficient Ranked Multi-Keyword Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing.
IEEE Syst. J., 2020

Mobile access and flexible search over encrypted cloud data in heterogeneous systems.
Inf. Sci., 2020

Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health.
IEEE Internet Things J., 2020

Catch You If You Deceive Me: Verifiable and Privacy-Aware Truth Discovery in Crowdsensing Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Secure and Verifiable Inference in Deep Neural Networks.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Real-Time Temperature Measurements of HMEC-1 Cells During Inflammation Production and Repair Detected by Wireless Thermometry.
IEEE Trans. Biomed. Eng., 2019

Wireless Thermometry for Real-Time Temperature Recording on Thousand-Cell Level.
IEEE Trans. Biomed. Eng., 2019

Attribute-Based Privacy-Preserving Data Sharing for Dynamic Groups in Cloud Computing.
IEEE Syst. J., 2019

A methodology for the optimal design of gathering pipeline system in old oilfield during its phased development process.
Comput. Ind. Eng., 2019

Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System.
IEEE Access, 2019

Lightweight Attribute-Based Keyword Search with Policy Protection for Cloud-Assisted IoT.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Comments on "A secure anti-collusion data sharing scheme for dynamic groups in the cloud".
Inf. Process. Lett., 2018

An investigation on measurement and evaluation of tool wear based on 3D topography.
Int. J. Manuf. Res., 2018

Ciphertext-Policy Attribute-Based Encryption With Delegated Equality Test in Cloud Computing.
IEEE Access, 2018

Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing.
IEEE Access, 2018

2017
Comments on "Verifiable and Exculpable Outsourced Attribute-Based Encryption for Access Control in Cloud Computing".
IEEE Trans. Dependable Secur. Comput., 2017

Flexible and Lightweight Access Control for Online Healthcare Social Networks in the Context of the Internet of Things.
Mob. Inf. Syst., 2017

Comments on "Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation".
Inf. Process. Lett., 2017

Revocable ABE with Bounded Ciphertext in Cloud Computing.
Int. J. Netw. Secur., 2017

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing.
Comput. Stand. Interfaces, 2017

2015
Fall Detection Using Plantar Inclinometer Sensor.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2012
A computational fluid dynamics (CFD) investigation of the flow field and the primary atomization of the close coupled atomizer.
Comput. Chem. Eng., 2012

2011
Improvement of Virtual View Rendering Based on Depth Image.
Proceedings of the Sixth International Conference on Image and Graphics, 2011


  Loading...