Rong Jiang
Orcid: 0000-0003-4160-8349Affiliations:
- National University of Defense Technology, College of Computer Science and Technology, China (PhD 2014)
- University of Waterloo, Department of Electrical and Computer Engineering, Canada (2013)
According to our database1,
Rong Jiang
authored at least 32 papers
between 2013 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Comput. Secur., January, 2024
2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Striking a Balance in Unsupervised Fine-Grained Domain Adaptation Using Adversarial Learning.
Proceedings of the Knowledge Science, Engineering and Management, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
2019
Proceedings of the 19th IEEE International Conference on Communication Technology, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
2018
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data.
Future Gener. Comput. Syst., 2018
Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid.
Secur. Commun. Networks, 2015
EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks.
Peer-to-Peer Netw. Appl., 2015
2014
Proceedings of the IEEE International Conference on Communications, 2014
SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2014
2013
HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2013
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications.
Int. J. Distributed Sens. Networks, 2013
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Robust group key management with revocation and collusion resistance for SCADA in smart grid.
Proceedings of the 2013 IEEE Global Communications Conference, 2013