Jing Chen
Orcid: 0000-0002-7212-5297Affiliations:
- Wuhan University, State Key Laboratory of Software Engineering, China
- Huazhong University of Science and Technology, Wuhan, China (PhD 2008)
According to our database1,
Jing Chen
authored at least 95 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
WiFiLeaks: Exposing Stationary Human Presence Through a Wall With Commodity Mobile Devices.
IEEE Trans. Mob. Comput., June, 2024
UFinAKA: Fingerprint-Based Authentication and Key Agreement With Updatable Blind Credentials.
IEEE/ACM Trans. Netw., April, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
MaskAuct: Seller-Autonomous Auction With Bidder Anonymity and Bidding Confidentiality.
IEEE Trans. Inf. Forensics Secur., 2024
Generic Construction of Threshold Credential Management With User-Autonomy Aggregation.
IEEE Trans. Inf. Forensics Secur., 2024
Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain.
IEEE Trans. Dependable Secur. Comput., 2024
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR, 2024
Sok: Comprehensive Security Overview, Challenges, and Future Directions of Voice-Controlled Systems.
CoRR, 2024
CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning.
CoRR, 2024
EarPass: Secure and Implicit Call Receiver Authentication Using Ear Acoustic Sensing.
CoRR, 2024
A Distributed Scalable Cross-chain State Channel Scheme Based on Recursive State Synchronization.
CoRR, 2024
CoRR, 2024
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791].
Comput. Secur., 2024
Comput. Secur., 2024
Comput. J., 2024
Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
LocCams: An Efficient and Robust Approach for Detecting and Localizing Hidden Wireless Cameras via Commodity Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., December, 2023
ACM Trans. Internet Techn., 2023
Efficient Privacy-Preserving Inference Outsourcing for Convolutional Neural Networks.
IEEE Trans. Inf. Forensics Secur., 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Pattern Recognition and Computer Vision - 6th Chinese Conference, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
An Efficient Identity-Based Provable Data Possession Protocol With Compressed Cloud Storage.
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Inf. Forensics Secur., 2022
Toward Robust Detection of Puppet Attacks via Characterizing Fingertip-Touch Behaviors.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel.
IEEE Trans. Dependable Secur. Comput., 2022
Surveillant: a supervision mechanism between blockchains for efficient cross-chain verification.
KSII Trans. Internet Inf. Syst., 2022
Identity-Based Cloud Storage Auditing for Data Sharing With Access Control of Sensitive Information.
IEEE Internet Things J., 2022
PANDA: Lightweight non-interactive privacy-preserving data aggregation for constrained devices.
Future Gener. Comput. Syst., 2022
CoRR, 2022
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Review Summary Generation in Online Systems: Frameworks for Supervised and Unsupervised Scenarios.
ACM Trans. Web, 2021
Optimal Location Privacy Preserving and Service Quality Guaranteed Task Allocation in Vehicle-Based Crowdsensing Networks.
IEEE Trans. Intell. Transp. Syst., 2021
IEEE Trans. Inf. Forensics Secur., 2021
IEEE Trans. Dependable Secur. Comput., 2021
Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps.
IEEE Trans. Dependable Secur. Comput., 2021
Future Gener. Comput. Syst., 2021
Consistency-Constancy Bi-Knowledge Learning for Pedestrian Detection in Night Surveillance.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
EliMFS: Achieving Efficient, Leakage-Resilient, and Multi-Keyword Fuzzy Search on Encrypted Cloud Data.
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Cloud Comput., 2020
Secur. Commun. Networks, 2020
IEEE Internet Things J., 2020
IEEE Internet Things J., 2020
Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
2019
IEEE Trans. Sustain. Comput., 2019
Inf. Sci., 2019
An efficient anonymous remote attestation scheme for trusted computing based on improved CPK.
Electron. Commer. Res., 2019
PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services.
IEEE Trans. Mob. Comput., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Comput. Electr. Eng., 2018
CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
2017
IEEE Trans. Mob. Comput., 2017
Frontiers Inf. Technol. Electron. Eng., 2017
Secure independent-update concise-expression access control for video on demand in cloud.
Inf. Sci., 2017
A general framework to design secure cloud storage protocol using homomorphic encryption scheme.
Comput. Networks, 2017
Checks and balances: A tripartite public key infrastructure for secure web-based connections.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
2016
IEEE Trans. Computers, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
A multi-objective optimization model based on immune algorithm in wireless mesh networks.
Int. J. Commun. Syst., 2016
Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks.
Comput. Networks, 2016
2015
IEEE Trans. Parallel Distributed Syst., 2015
Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud Storage.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Game-theory-based batch identification of invalid signatures in wireless mobile networks.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
2012
Secur. Commun. Networks, 2012
2010
A Novel Clustering Topology Control for Reliable Multi-hop Routing in Wireless Sensor Networks.
J. Commun., 2010
A hybrid game model based on reputation for spectrum allocation in wireless networks.
Comput. Commun., 2010