Tao Jiang

Orcid: 0000-0001-6900-7305

Affiliations:
  • Xidian University, School of Cyber Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
  • Xidian University, School of Telecommunications Engineering, Xi'an, China (PHD 2016)
  • Jiangsu University, Department of Computer Science, Zhenjiang, China (until 2012)


According to our database1, Tao Jiang authored at least 26 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FairECom: Towards Proof of E-Commerce Fairness Against Price Discrimination.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Collaborative and Incremental Learning for Modulation Classification With Heterogeneous Local Dataset in Cognitive IoT.
IEEE Trans. Green Commun. Netw., June, 2023

Puncturable Key-Policy Attribute-Based Encryption Scheme for Efficient User Revocation.
IEEE Trans. Serv. Comput., 2023

FuzzyDedup: Secure Fuzzy Deduplication for Cloud Storage.
IEEE Trans. Dependable Secur. Comput., 2023

2022
Secure Cloud Data Deduplication with Efficient Re-Encryption.
IEEE Trans. Serv. Comput., 2022

Detection Tolerant Black-Box Adversarial Attack Against Automatic Modulation Classification With Deep Learning.
IEEE Trans. Reliab., 2022

Privacy-Preserving Scheme With Account-Mapping and Noise-Adding for Energy Trading Based on Consortium Blockchain.
IEEE Trans. Netw. Serv. Manag., 2022

2021
ReliableBox: Secure and Verifiable Cloud Storage With Location-Aware Backup.
IEEE Trans. Parallel Distributed Syst., 2021

2020
Secure and Efficient Cloud Data Deduplication with Ownership Management.
IEEE Trans. Serv. Comput., 2020

Secure data deletion in cloud storage: a survey.
Int. J. Embed. Syst., 2020

2019
Secure distributed data geolocation scheme against location forgery attack.
J. Inf. Secur. Appl., 2019

New publicly verifiable computation for batch matrix multiplication.
Inf. Sci., 2019

Secure Data Deduplication with Reliable Data Deletion in Cloud.
Int. J. Found. Comput. Sci., 2019

Traceable Private Set Intersection in Cloud Computing.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
DedupDUM: Secure and scalable data deduplication with dynamic user management.
Inf. Sci., 2018

Secure and efficient <i>k</i>-nearest neighbor query for location-based services in outsourced environments.
Sci. China Inf. Sci., 2018

Dynamic Swarm Attestation With Malicious Devices Identification.
IEEE Access, 2018

2017
Secure and Efficient Cloud Data Deduplication With Randomized Tag.
IEEE Trans. Inf. Forensics Secur., 2017

New Publicly Verifiable Computation for Batch Matrix Multiplication.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

2016
Public Integrity Auditing for Shared Dynamic Cloud Data with Group User Revocation.
IEEE Trans. Computers, 2016

Towards Efficient Fully Randomized Message-Locked Encryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Payment-based incentive mechanism for secure cloud deduplication.
Int. J. Inf. Manag., 2015

Towards secure and reliable cloud storage against data re-outsourcing.
Future Gener. Comput. Syst., 2015

2014
TIMER: Secure and Reliable Cloud Storage against Data Re-outsourcing.
Proceedings of the Information Security Practice and Experience, 2014

M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet.
Proceedings of the Information and Communication Technology, 2014

2011
Updatable Key Management Scheme with Intrusion Tolerance for Unattended Wireless Sensor Network.
Proceedings of the Global Communications Conference, 2011


  Loading...