Jing Chen

Orcid: 0000-0002-7212-5297

Affiliations:
  • Wuhan University, State Key Laboratory of Software Engineering, China
  • Huazhong University of Science and Technology, Wuhan, China (PhD 2008)


According to our database1, Jing Chen authored at least 95 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024

UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials.
IEEE/ACM Trans. Netw., April, 2024

Fregata: Fast Private Inference With Unified Secure Two-Party Protocols.
IEEE Trans. Inf. Forensics Secur., 2024

Rethinking Membership Inference Attacks Against Transfer Learning.
IEEE Trans. Inf. Forensics Secur., 2024

MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality.
IEEE Trans. Inf. Forensics Secur., 2024

Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024

Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024

Privacy-preserving Universal Adversarial Defense for Black-box Models.
CoRR, 2024

Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024

Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR, 2024

Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR, 2024

CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR, 2024

EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024

A Distributed Scalable Cross-chain State Channel Scheme Based on Recursive State Synchronization.
CoRR, 2024

MagLive: Near-Field Magnetic Sensing-Based Voice Liveness Detection on Smartphones.
CoRR, 2024

Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791].
Comput. Secur., 2024

Model-agnostic adversarial example detection via high-frequency amplification.
Comput. Secur., 2024

CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain.
Comput. J., 2024

Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023

Dynamic Personalized POI Sequence Recommendation with Fine-Grained Contexts.
ACM Trans. Internet Techn., 2023

Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023

Formal Analysis and Patching of BLE-SC Pairing.
Proceedings of the 32nd USENIX Security Symposium, 2023

Efficient Adversarial Training with Membership Inference Resistance.
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022

Redactable Blockchain From Decentralized Chameleon Hash Functions.
IEEE Trans. Inf. Forensics Secur., 2022

Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022

XAuth: Efficient Privacy-Preserving Cross-Domain Authentication.
IEEE Trans. Dependable Secur. Comput., 2022

DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput., 2022

Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification.
KSII Trans. Internet Inf. Syst., 2022

Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information.
IEEE Internet Things J., 2022

PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios.
ACM Trans. Web, 2021

Optimal Location Privacy Preserving and Service Quality Guaranteed Task Allocation in Vehicle-Based Crowdsensing Networks.
IEEE Trans. Intell. Transp. Syst., 2021

Secure Dynamic Searchable Symmetric Encryption With Constant Client Storage Cost.
IEEE Trans. Inf. Forensics Secur., 2021

Dynamic Group-Oriented Provable Data Possession in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021

SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures.
Future Gener. Comput. Syst., 2021

Consistency-Constancy Bi-Knowledge Learning for Pedestrian Detection in Night Surveillance.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

PROCESS: Privacy-Preserving On-Chain Certificate Status Service.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

HIAWare: Speculate Handwriting on Mobile Devices with Built-In Sensors.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Biometrics-Authenticated Key Exchange for Secure Messaging.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2020

Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing.
IEEE Trans. Cloud Comput., 2020

PowerPrint: Identifying Smartphones through Power Consumption of the Battery.
Secur. Commun. Networks, 2020

CaIAuth: Context-Aware Implicit Authentication When the Screen Is Awake.
IEEE Internet Things J., 2020

Secure and Lightweight Authentication With Key Agreement for Smart Wearable Systems.
IEEE Internet Things J., 2020

Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

De-Health: All Your Online Health Information Are Belong to Us.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Photo Crowdsourcing Based Privacy-Protected Healthcare.
IEEE Trans. Sustain. Comput., 2019

Privacy-aware service placement for mobile edge computing via federated learning.
Inf. Sci., 2019

An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
Electron. Commer. Res., 2019

PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019

ICAuth: Implicit and Continuous Authentication When the Screen Is Awake.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput., 2018

Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection.
IEEE Trans. Inf. Forensics Secur., 2018

Secure Enforcement in Cognitive Internet of Vehicles.
IEEE Internet Things J., 2018

SmartSeed: Smart Seed Generation for Efficient Fuzzing.
CoRR, 2018

Towards decentralized IoT security enhancement: A blockchain approach.
Comput. Electr. Eng., 2018

CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

2017
Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks.
IEEE Trans. Mob. Comput., 2017

Towards human-like and transhuman perception in AI 2.0: a review.
Frontiers Inf. Technol. Electron. Eng., 2017

Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017

A general framework to design secure cloud storage protocol using homomorphic encryption scheme.
Comput. Networks, 2017

Checks and balances: A tripartite public key infrastructure for secure web-based connections.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Charge-Depleting of the Batteries Makes Smartphones Recognizable.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

2016
DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments.
IEEE Trans. Computers, 2016

ESDR: an efficient and secure data repairing paradigm in cloud storage.
Secur. Commun. Networks, 2016

Message-locked proof of ownership and retrievability with remote repairing in cloud.
Secur. Commun. Networks, 2016

A <i>γ</i>-Strawman privacy-preserving scheme in weighted social networks.
Secur. Commun. Networks, 2016

A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016

Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks, 2016

2015
Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

MuCAR: A greedy multi-flow-based coding-aware routing in wireless networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Game-theory-based batch identification of invalid signatures in wireless mobile networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Multi-Copy Routing with Trajectory Prediction in Social Delay-Tolerant Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Survey of Security Network Coding toward Various Attacks.
Proceedings of the 13th IEEE International Conference on Trust, 2014

Proofs of Ownership and Retrievability in Cloud Storage.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Secure Routing Based on Network Coding in Wireless Sensor Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs.
Proceedings of the Network and System Security - 7th International Conference, 2013

2012
A key distribution scheme using network coding for mobile ad hoc network.
Secur. Commun. Networks, 2012

2010
A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks.
J. Commun., 2010

A hybrid game model based on reputation for spectrum allocation in wireless networks.
Comput. Commun., 2010


  Loading...