Jinquan Zhang

Orcid: 0000-0001-6889-2568

According to our database1, Jinquan Zhang authored at least 49 papers between 2005 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ServlessSimPro: A comprehensive serverless simulation platform.
Future Gener. Comput. Syst., 2025

2024
Fraud Feature Boosting Mechanism and Spiral Oversampling Balancing Technique for Credit Card Fraud Detection.
IEEE Trans. Comput. Soc. Syst., April, 2024

rFedFW: Secure and trustable aggregation scheme for Byzantine-robust federated learning in Internet of Things.
Inf. Sci., January, 2024

Small-Object Detection Model for Optical Remote Sensing Images Based on Tri-Decoupling++Head.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2024

Reliable federated learning based on dual-reputation reverse auction mechanism in Internet of Things.
Future Gener. Comput. Syst., 2024

MSDANet: A multi-scale dilation attention network for medical image segmentation.
Biomed. Signal Process. Control., 2024

Bridge substructure damage morphology identification based on the underwater sonar point cloud data.
Adv. Eng. Informatics, 2024

Reinforcement Learning Based Memory Configuration for Linear Dynamic Function Chains.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Task Scheduling in Multi-Cloud Environments for Spark Workflow under Performance Uncertainty.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Scheduling Workflow Instances to Servers and Serverless Functions in Cloud/Edge Data Centers.
Proceedings of the Service Science - CCF 16th International Conference, 2023

LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023

2022
BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain Cross-Chain Research Based on Verifiable Ring Signatures.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

Blockchain-Based Efficient Incentive Mechanism in Crowdsensing.
Proceedings of the Artificial Intelligence and Security - 8th International Conference, 2022

2021
Multi-Queue Request Scheduling for Profit Maximization in IaaS Clouds.
IEEE Trans. Parallel Distributed Syst., 2021

Dissolved Gas Analysis for Transformer Fault Based on Learning Spiking Neural P System with Belief AdaBoost.
Int. J. Unconv. Comput., 2021

Clustering Collision Power Attack on RSA-CRT.
Comput. Syst. Sci. Eng., 2021

A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain.
Comput. Syst. Sci. Eng., 2021

GCWOAS2: Multiobjective Task Scheduling Strategy Based on Gaussian Cloud-Whale Optimization in Cloud Computing.
Comput. Intell. Neurosci., 2021

Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Estimation of Stresses in Concrete by Using Coda Wave Interferometry to Establish an Acoustoelastic Modulus Database.
Sensors, 2020

Condition Evaluation of an Existing T-Beam Bridge Based on Neutral Axis Variation Monitored with Ultrasonic Coda Waves in a Network of Sensors.
Sensors, 2020

A Secure Energy-Saving Communication and Encrypted Storage Model Based on RC4 for EHR.
IEEE Access, 2020

Unexpected Data Dependency Creation and Chaining: A New Attack to SDN.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

A Fragile Watermarking Algorithm Based on Audio Content and Its Moving Average.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
A Synchronization Scheme Based on Moving Average for Robust Audio Watermarking.
J. Inf. Process. Syst., 2019

An anonymous entropy-based location privacy protection scheme in mobile social networks.
EURASIP J. Wirel. Commun. Netw., 2019

RcDT: Privacy Preservation Based on R-Constrained Dummy Trajectory in Mobile Social Networks.
IEEE Access, 2019

Robust Audio Watermarking Algorithm Based on Moving Average and DCT.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Bridge Apparent Damage Detection System Based on Deep Learning.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

Bridge Moving Load Recognition Based on Deep Learning.
Proceedings of the Fuzzy Systems and Data Mining V, 2019

2018
RPAR: Location Privacy Preserving via Repartitioning Anonymous Region in Mobile Social Network.
Secur. Commun. Networks, 2018

Maximum delay anonymous clustering feature tree based privacy-preserving data publishing in social networks.
Proceedings of the 2018 International Conference on Identification, 2018

Forecasting of Forex Time Series Data Based on Deep Learning.
Proceedings of the 2018 International Conference on Identification, 2018

2017
Low Duty-Cycling MAC Protocol for Low Data-Rate Medical Wireless Body Area Networks.
Sensors, 2017

Resource Allocation Strategy in Fog Computing Based on Priced Timed Petri Nets.
IEEE Internet Things J., 2017

Robust Audio Watermarking Algorithm Based on Moving Average and DCT.
CoRR, 2017

A Synchronization Algorithm Based on Moving Average for Robust Audio Watermarking Scheme.
CoRR, 2017

A Location Privacy Preserving Scheme Based on Repartitioning Anonymous Region in Mobile Social Network.
Proceedings of the 2017 International Conference on Identification, 2017

A Privacy Preserving Algorithm Based on R-constrained Dummy Trajectory in Mobile Social Network.
Proceedings of the 2017 International Conference on Identification, 2017

Hybrid Filtrations Recommendation System based on Privacy Preserving in Edge Computing.
Proceedings of the 2017 International Conference on Identification, 2017

2016
Priced Timed Petri Nets Based Resource Allocation Strategy for Fog Computing.
Proceedings of the International Conference on Identification, 2016

2015
Audio dual watermarking scheme for copyright protection and content authentication.
Int. J. Speech Technol., 2015

2011
Fingerprint minutia extraction algorithm based on DSP.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2007
AS2M4SoC: An Autonomic Service Scheduling Model and Strategy for SoC Based on Evidence Theory.
Proceedings of the Grid and Cooperative Computing, 2007

A Multi-agent Negotiation Protocol Based on Extended Case Based Reasoning.
Proceedings of the Fourth International Conference on Fuzzy Systems and Knowledge Discovery, 2007

2006
A Heuristic Algorithm for Task Scheduling Based on Mean Load on Grid.
J. Comput. Sci. Technol., 2006

2005
A Heuristic Algorithm for Task Scheduling Based on Mean Load.
Proceedings of the 2005 International Conference on Semantics, 2005


  Loading...