Jun Zheng

Orcid: 0000-0002-1947-0921

Affiliations:
  • Beijing Institute of Technology, School of Cyberspace Science and Technology, China


According to our database1, Jun Zheng authored at least 43 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET.
Peer Peer Netw. Appl., March, 2024

TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things.
Computing, 2024

Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture.
Comput. Commun., 2024

ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks.
Comput. Networks, 2024

2023
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration.
J. Ambient Intell. Humaniz. Comput., October, 2023

Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering.
Inf. Sci., July, 2023

Clean-label poisoning attacks on federated learning for IoT.
Expert Syst. J. Knowl. Eng., June, 2023

Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning.
Sensors, February, 2023

B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme.
IEEE Internet Things J., 2023

TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system.
Future Gener. Comput. Syst., 2023

A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

Adversarial Attacks Against Object Detection in Remote Sensing Images.
Proceedings of the Artificial Intelligence Security and Privacy, 2023

2022
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture.
Int. J. Intell. Syst., December, 2022

Group key agreement protocol among terminals of the intelligent information system for mobile edge computing.
Int. J. Intell. Syst., December, 2022

Reward optimization of spatial crowdsourcing for coalition-based maintenance task.
Int. J. Intell. Syst., December, 2022

A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT.
Inf. Sci., 2022

A group key agreement protocol for intelligent internet of things system.
Int. J. Intell. Syst., 2022

Security of federated learning for cloud-edge intelligence collaborative computing.
Int. J. Intell. Syst., 2022

A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2020
An Android Inline Hooking Framework for the Securing Transmitted Data.
Sensors, 2020

Butterfly-Based Higher-Order Clustering on Bipartite Networks.
Proceedings of the Knowledge Science, Engineering and Management, 2020

2019
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication.
IEEE Access, 2019

A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks.
IEEE Access, 2019

2018
An optimized data hiding scheme for Deflate codes.
Soft Comput., 2018

A code protection scheme by process memory relocation for android devices.
Multim. Tools Appl., 2018

A root privilege management scheme with revocable authorization for Android devices.
J. Netw. Comput. Appl., 2018

Building packet length covert channel over mobile VoIP traffics.
J. Netw. Comput. Appl., 2018

Building covert timing channels by packet rearrangement over mobile networks.
Inf. Sci., 2018

RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.
Inf. Sci., 2018

Research on Data Recovery Technology Based on Flash Memory Device.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
A round-optimal lattice-based blind signature scheme for cloud services.
Future Gener. Comput. Syst., 2017

Cryptographic key protection against FROST for mobile devices.
Clust. Comput., 2017

An Anti-Forensics Method against Memory Acquiring for Android Devices.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

From the perspective of teaching scheme: cultivating and training undergraduates driven by engineering education accreditation.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Determining Image Base of Firmware Files for ARM Devices.
IEICE Trans. Inf. Syst., 2016

Determining image base of firmware for ARM devices by matching literal pools.
Digit. Investig., 2016

2015
Descrambling data on solid-state disks by reverse-engineering the firmware.
Digit. Investig., 2015

Virtual experiments for introduction of computing: Using virtual reality technology.
Proceedings of the 2015 IEEE Frontiers in Education Conference, 2015

2013
A novel detective and self-organized certificateless key management scheme in mobile ad hoc networks.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2011
Dynamic Role-Based Access Control Model.
J. Softw., 2011

Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups.
J. Comput., 2011

An Improved Cross-Domain Role-Based Authorization Management Model.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

A RBAC Model Based on Multi-granularities of Time Constraints.
Proceedings of the Applied Informatics and Communication - International Conference, 2011


  Loading...