Jianfeng Lu

Orcid: 0000-0001-6834-1539

Affiliations:
  • Zhejiang Normal University, Department of Computer Science and Engineering, Jinhua, China


According to our database1, Jianfeng Lu authored at least 61 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Incentivizing Proportional Fairness for Multi-Task Allocation in Crowdsensing.
IEEE Trans. Serv. Comput., 2024

Game-Theoretic Design of Quality-Aware Incentive Mechanisms for Hierarchical Federated Learning.
IEEE Internet Things J., 2024

Contribution Matching-Based Hierarchical Incentive Mechanism Design for Crowd Federated Learning.
IEEE Access, 2024

FedBoost: Bayesian Estimation Based Client Selection for Federated Learning.
IEEE Access, 2024

2023
Truthful Incentive Mechanism Design via Internalizing Externalities and LP Relaxation for Vertical Federated Learning.
IEEE Trans. Comput. Soc. Syst., December, 2023

Energy Cost Minimization in Wireless Rechargeable Sensor Networks.
IEEE/ACM Trans. Netw., October, 2023

Toward Personalized Federated Learning Via Group Collaboration in IIoT.
IEEE Trans. Ind. Informatics, August, 2023

Towards energy-efficient and time-sensitive task assignment in cross-silo federated learning.
J. King Saud Univ. Comput. Inf. Sci., 2023

Intelligent Trajectory Design for Mobile Energy Harvesting and Data Transmission.
IEEE Internet Things J., 2023

Fine-Grained Preference-Aware Personalized Federated POI Recommendation with Data Sparsity.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

2022
DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism.
ISPRS Int. J. Geo Inf., December, 2022

A Green Stackelberg-game Incentive Mechanism for Multi-service Exchange in Mobile Crowdsensing.
ACM Trans. Internet Techn., 2022

Locating Sources in Multiplex Networks for Linear Diffusion Systems.
IEEE Trans. Netw. Sci. Eng., 2022

Toward Fairness-Aware Time-Sensitive Asynchronous Federated Learning for Critical Energy Infrastructure.
IEEE Trans. Ind. Informatics, 2022

Blockchain-Enabled Task Offloading With Energy Harvesting in Multi-UAV-Assisted IoT Networks: A Multi-Agent DRL Approach.
IEEE J. Sel. Areas Commun., 2022

FC-ACGAN-based data augmentation for terahertz time-domain spectral concealed hazardous materials identification.
Int. J. Intell. Syst., 2022

BERTBooster: A knowledge enhancement method jointing incremental training and gradient optimization.
Int. J. Intell. Syst., 2022

A Transformer decoder-based Generative Adversarial Model with TrajLoss Function for Privacy-Preserving Trajectory Publishing.
Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing, 2022

Energy Saving in Heterogeneous Wireless Rechargeable Sensor Networks.
Proceedings of the IEEE INFOCOM 2022, 2022

2021
Extortion and Cooperation in Rating Protocol Design for Competitive Crowdsourcing.
IEEE Trans. Comput. Soc. Syst., 2021

Long-Term Energy Collection in Self-Sustainable Sensor Networks: A Deep Q-Learning Approach.
IEEE Internet Things J., 2021

Geometric Analysis of Energy Saving for Directional Charging in WRSNs.
IEEE Internet Things J., 2021

An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems.
IEEE Access, 2021

Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Online Rating Protocol Using Endogenous and Incremental Learning Design for Mobile Crowdsensing.
IEEE Trans. Veh. Technol., 2020

Incentivizing fairness-aware task allocation in mobile crowdsensing with sweep coverage and stability control.
Appl. Soft Comput., 2020

Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Max-Min Fairness Multi-task Allocation in Mobile Crowdsensing.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Multi-term Multi-task Allocation for Mobile Crowdsensing with Weighted Max-Min Fairness.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Online Task Allocation in Mobile Crowdsensing with Sweep Coverage and Stability Control.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Differentially Private Location Preservation with Staircase Mechanism Under Temporal Correlations.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
An Energy-Efficient Cross-Layer-Sensing Clustering Method Based on Intelligent Fog Computing in WSNs.
IEEE Access, 2019

Multi-Level Two-Sided Rating Protocol Design for Service Exchange Contest Dilemma in Crowdsensing.
IEEE Access, 2019

2018
Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing.
IEEE Trans. Inf. Forensics Secur., 2018

Detecting Regularities of Traffic Signal Timing Using GPS Trajectories.
IEICE Trans. Inf. Syst., 2018

Supporting user authorization queries in RBAC systems by role-permission reassignment.
Future Gener. Comput. Syst., 2018

Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Two-Step Choice Privacy-Preservation Method for Check-in Data Publishing.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

2017
Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma.
IEEE Trans. Inf. Forensics Secur., 2017

Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem.
IEICE Trans. Inf. Syst., 2017

Rating Protocol Design for Extortion and Cooperation in the Crowdsourcing Contest Dilemma.
CoRR, 2017

Zero-Determinant Strategy for Cooperation Enforcement in Crowdsourcing.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Towards understanding the gamification upon users' scores in a location-based social network.
Multim. Tools Appl., 2016

An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
Int. J. High Perform. Comput. Netw., 2016

2015
Towards complexity analysis of User Authorization Query problem in RBAC.
Comput. Secur., 2015

(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
MAGE: A semantics retaining K-anonymization method for mixed data.
Knowl. Based Syst., 2014

On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

2013
SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
J. Softw., 2013

2012
Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012

Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models.
IEICE Trans. Commun., 2012

2011
RAR: A role-and-risk based flexible framework for secure collaboration.
Future Gener. Comput. Syst., 2011

Inconsistency resolving of safety and utility in access control.
EURASIP J. Wirel. Commun. Netw., 2011

Specifying and enforcing the principle of least privilege in role-based access control.
Concurr. Comput. Pract. Exp., 2011

Leveraging Wikipedia concept and category information to enhance contextual advertising.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Consistency Checking of Safety and Availability in Access Control.
IEICE Trans. Inf. Syst., 2010

SecTag: a multi-policy supported secure web tag framework.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Secure Interoperation in Multidomain Environments Employing UCON Policies.
Proceedings of the Information Security, 12th International Conference, 2009

Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control.
Proceedings of the Information Security, 12th International Conference, 2009


  Loading...