Tao Jiang
Orcid: 0000-0001-6900-7305Affiliations:
- Xidian University, School of Cyber Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Xidian University, School of Telecommunications Engineering, Xi'an, China (PHD 2016)
- Jiangsu University, Department of Computer Science, Zhenjiang, China (until 2012)
According to our database1,
Tao Jiang
authored at least 26 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
Collaborative and Incremental Learning for Modulation Classification With Heterogeneous Local Dataset in Cognitive IoT.
IEEE Trans. Green Commun. Netw., June, 2023
Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
2022
IEEE Trans. Serv. Comput., 2022
Detection Tolerant Black-Box Adversarial Attack Against Automatic Modulation Classification With Deep Learning.
IEEE Trans. Reliab., 2022
Privacy-Preserving Scheme With Account-Mapping and Noise-Adding for Energy Trading Based on Consortium Blockchain.
IEEE Trans. Netw. Serv. Manag., 2022
2021
IEEE Trans. Parallel Distributed Syst., 2021
2020
IEEE Trans. Serv. Comput., 2020
2019
J. Inf. Secur. Appl., 2019
Int. J. Found. Comput. Sci., 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
2018
Inf. Sci., 2018
Secure and efficient <i>k</i>-nearest neighbor query for location-based services in outsourced environments.
Sci. China Inf. Sci., 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017
2016
IEEE Trans. Computers, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Int. J. Inf. Manag., 2015
Future Gener. Comput. Syst., 2015
2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the Information and Communication Technology, 2014
2011
Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network.
Proceedings of the Global Communications Conference, 2011