default search action
Jian Mao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Yue Wu, Tao Jing, Qinghe Gao, Jian Mao, Yan Huo, Zhiwei Yang:
Multi-attribute weighted convolutional attention neural network for multiuser physical layer authentication in IIoT. Ad Hoc Networks 163: 103593 (2024) - [j65]Yan Huo, Ruixue Yang, Guanlin Jing, Xiaoxuan Wang, Jian Mao:
A multi-objective Roadside Units deployment strategy based on reliable coverage analysis in Internet of Vehicles. Ad Hoc Networks 164: 103630 (2024) - [j64]Hongyuan Zhao, Suyi Zhang, Hui Qin, Xiaogang Liu, Dongna Ma, Xiao Han, Jian Mao, Shuangping Liu:
DSNetax: a deep learning species annotation method based on a deep-shallow parallel framework. Briefings Bioinform. 25(3) (2024) - [j63]Jian Mao:
Optimizing Enterprise Marketing Project Portfolios Using Fuzzy Ant Colony Optimization. Int. J. Comput. Commun. Control 19(3) (2024) - [j62]Jian Mao, Kai Huang, Jinming Liu:
MLAWSMOTE: Oversampling in Imbalanced Multi-label Classification with Missing Labels by Learning Label Correlation Matrix. Int. J. Comput. Intell. Syst. 17(1): 205 (2024) - [j61]Jian Mao, Qixiao Lin, Shishi Zhu, Liran Ma, Jianwei Liu:
SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems. IEEE Internet Things J. 11(4): 5731-5744 (2024) - [j60]Yingzhen Wu, Yan Huo, Qinghe Gao, Jian Mao, Zhiwei Yang, Tao Jing:
Secure Uplink Transmission Against Multiintelligent Eavesdroppers With Time-Domain Artificial Noise in MIMO IoT Systems. IEEE Internet Things J. 11(19): 31662-31674 (2024) - [j59]Yunyun Wang, Jian Mao, Cong Zou, Xinyang Kong:
Universal domain adaptation from multiple black-box sources. Image Vis. Comput. 142: 104896 (2024) - [j58]Xingye You, Jian Mao, Jingming Liu, Kai Huang:
Denoising low SNR electromagnetic conducted emissions using an improved DnCNN based mode. J. Intell. Fuzzy Syst. 46(2): 5249-5261 (2024) - [j57]Yunyun Wang, Jian Mao, Chenguang Guo, Songcan Chen:
Contrastive Prototype-Guided Generation for Generalized Zero-Shot Learning. Neural Networks 176: 106324 (2024) - [j56]Yudi Zhou, Yan Huo, Qinghe Gao, Yue Wu, Tao Jing, Jian Mao:
Securing Collaborative Authentication: A Weighted Voting Strategy to Counter Unreliable Cooperators. IEEE Trans. Inf. Forensics Secur. 19: 5798-5813 (2024) - [c50]Yu Tian, Zhenyu Li, Matthew Yang Liu, Jian Mao, Gareth Tyson, Gaogang Xie:
Cost-Saving Streaming: Unlocking the Potential of Alternative Edge Node Resources. IMC 2024: 580-587 - [c49]Jiawei Li, Jian Mao, Jun Zeng, Qixiao Lin, Shaowen Feng, Zhenkai Liang:
UIHash: Detecting Similar Android UIs through Grid-Based Visual Appearance Representation. USENIX Security Symposium 2024 - 2023
- [j55]Jian Mao, Xiaohe Xu, Qixiao Lin, Liran Ma, Jianwei Liu:
EScope: Effective Event Validation for IoT Systems Based on State Correlation. Big Data Min. Anal. 6(2): 218-233 (2023) - [j54]Yang Chen, Jinming Liu, Jian Mao:
Blind source separation of electromagnetic signals based on deep focusing U-Net. J. Intell. Fuzzy Syst. 45(5): 9157-9167 (2023) - [j53]Yurong Guo, Jian Mao, Man Zhao:
Rolling Bearing Fault Diagnosis Method Based on Attention CNN and BiLSTM Network. Neural Process. Lett. 55(3): 3377-3410 (2023) - [j52]Yinhao Xiao, Yizhen Jia, Xiuzhen Cheng, Shengling Wang, Jian Mao, Zhenkai Liang:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. IEEE Trans. Dependable Secur. Comput. 20(2): 1017-1030 (2023) - [j51]Zequan Zhou, Xiling Luo, Yupeng Wang, Jian Mao, Feixiang Luo, Yi Bai, Xiaochao Wang, Gang Liu, Junjun Wang, Feng Zeng:
A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing. IEEE Trans. Veh. Technol. 72(12): 16592-16606 (2023) - [c48]Guorong Qi, Jian Mao:
An Improved CNN-LSTM Algorithm for Detection of DGA Domain Name. EITCE 2023: 1293-1298 - [c47]Ceyao Cao, Lei Chcn, Yi Wu, Jian Mao, Jie Xu:
Fast Algorithm for VVC Video Image Coding Based on Machine Learning. RICAI 2023: 1147-1151 - 2022
- [j50]Jian Mao, Xiang Li, Xiling Luo, Qixiao Lin:
SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors. Neurocomputing 500: 295-306 (2022) - [j49]Jian Mao, Ziwen Liu, Qixiao Lin, Zhenkai Liang:
Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages. IEEE Internet Things J. 9(12): 9151-9166 (2022) - [j48]Jialing He, Zijian Zhang, Jian Mao, Liran Ma, Bakh Khoussainov, Rui Jin, Liehuang Zhu:
Video Aficionado: We Know What You Are Watching. IEEE Trans. Mob. Comput. 21(8): 3041-3052 (2022) - [c46]Jianyu Huang, Nanting Cai, Jian Mao, Jialin Zhang, Xiaochun Zhao:
A denoising method based on CNN through multi-layer separation. EITCE 2022: 361-366 - [c45]Yongjin Zeng, Jie Chen, Jian Mao:
Deep Learning-based Road Crack Detection Technology. EITCE 2022: 580-584 - [c44]Jie Chen, Yongjin Zeng, Jian Mao:
Key Technologies of Electronic Perimeter System Based on Deep Learning. EITCE 2022: 623-626 - [c43]Yang Chen, Jinming Liu, Jian Mao:
Blind source separation of electromagnetic signals based on one-dimensional U-Net. EITCE 2022: 1597-1602 - 2021
- [j47]Jian Mao, Junyang Han, Tiejun Cui:
Development and Assessment of Improved Global Pressure and Temperature Series Models. IEEE Access 9: 104429-104447 (2021) - [j46]Jian Mao, Junyang Han, Tiejun Cui:
Development of a New Tabular Zenith Tropospheric Delay Model for Real-Time GNSS Applications. IEEE Access 9: 112837-112849 (2021) - [j45]Jian Mao, Jinming Liu, Jiemin Zhang, Zhen-zhong Han, Sen Shi:
A method for detecting image information leakage risk from electromagnetic emission of computer monitors. J. Intell. Fuzzy Syst. 40(2): 2981-2991 (2021) - [j44]Jian Mao, Yitong Yang, Tianchen Zhang:
Empirical Analysis of Attribute Inference Techniques in Online Social Network. IEEE Trans. Netw. Sci. Eng. 8(2): 881-893 (2021) - [c42]Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao:
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. NDSS 2021 - [c41]Yitong Yang, Qixiao Lin, Jian Mao, Lipei Liu:
An improved social attribute inference scheme based on multi-attribute correlation. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 370-377 - 2020
- [j43]Guangmin Xie, Zhongyuan Jiang, Mingxing He, Xiaoliang Chen, Jian Mao:
A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods. IEEE Access 8: 103759-103771 (2020) - [j42]Haosu Cheng, Jianwei Liu, Tongge Xu, Bohan Ren, Jian Mao, Wei Zhang:
Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks. Int. J. Sens. Networks 34(1): 56-69 (2020) - [j41]Jian Mao, Shishi Zhu, Xuan Dai, Qixiao Lin, Jianwei Liu:
Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems. IEEE Internet Things J. 7(9): 8025-8035 (2020) - [j40]Jian Mao, Shishi Zhu, Jianwei Liu:
An inaudible voice attack to context-based device authentication in smart IoT systems. J. Syst. Archit. 104: 101696 (2020) - [j39]Jian Mao, Jiemin Zhang, Zhi Tang, Zhiling Gu:
DNS anti-attack machine learning model for DGA domain name detection. Phys. Commun. 40: 101069 (2020) - [c40]Jinping Lu, Zhi Tang, Jian Mao, Zhiling Gu, Jiemin Zhang:
Mixed-Models Method Based on Machine Learning in Detecting WebShell Attack. CIPAE 2020: 251-259 - [c39]Xueming Zhang, Jian Mao:
Research on image enhancement algorithm based on Retinex theory. EITCE 2020: 361-365 - [c38]Tao Hu, Jian Mao:
A Survey of Moving Target Detection Methods Based on Machine Vision. EITCE 2020: 529-533 - [c37]Yurong Guo, Jian Mao:
Optimization analysis of assembly system based on digital twin and deep learning. EITCE 2020: 627-631
2010 – 2019
- 2019
- [j38]Jian Mao, Peiguo Liu, Jinming Liu, Sen Shi:
Identification of Multi-Dimensional Electromagnetic Information Leakage Using CNN. IEEE Access 7: 145714-145724 (2019) - [j37]Jian Mao, Wenqian Tian, Yitong Yang, Jianwei Liu:
An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance. IEEE Access 7: 153074-153085 (2019) - [j36]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Phishing page detection via learning classifiers from page layout feature. EURASIP J. Wirel. Commun. Netw. 2019: 43 (2019) - [j35]Jian Mao, Shishi Zhu, Jingdong Bian, Qixiao Lin, Jianwei Liu:
Anomalous Power-Usage Behavior Detection from Smart Home Wireless Communications. J. Commun. Inf. Networks 4(1): 13-23 (2019) - [j34]Hu Liu, Qiang Yu, Yuegang Tan, Wenjun Xu, Bing Huang, Zhichao Xie, Jian Mao:
Feasibility Study on Temperature Distribution Measurement Method of Thrust Sliding Bearing Bush Based on FBG Quasi-Distributed Sensing. Sensors 19(14): 3245 (2019) - [c36]Jiemin Zhang, Jian Mao, Jinming Liu, Zhi Tang, Zhiling Gu, Yongmei Liu:
Cloud-based Multi-core Architecture against DNS Attacks. ICCSE 2019: 391-393 - [c35]Ying Li, Jiong Zhang, Jian Mao:
Transforming knowledge into intelligence The research on Wisdom Class Teaching Theory and Practice. ICCSE 2019: 998-1005 - [c34]Qixiao Lin, Jian Mao, Futian Shi, Shishi Zhu, Zhenkai Liang:
Detecting Android Side Channel Probing Attacks Based on System States. WASA 2019: 201-212 - 2018
- [j33]Jian Mao, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang:
Detecting Malicious Behaviors in JavaScript Applications. IEEE Access 6: 12284-12294 (2018) - [j32]Jianhong Zhang, Jian Mao:
On the Security of a Pairing-Free Certificateless Signcryption Scheme. Comput. J. 61(4): 469-471 (2018) - [j31]Jian Mao, Wenqian Tian, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou, Jianwei Liu:
Understanding structure-based social network de-anonymization techniques via empirical analysis. EURASIP J. Wirel. Commun. Netw. 2018: 279 (2018) - [j30]Jian Mao, Qixiao Lin, Jingdong Bian:
Application of learning algorithms in smart home IoT system security. Math. Found. Comput. 1(1): 63-76 (2018) - [j29]Xiling Luo, Zequan Zhou, Lin Zhong, Jian Mao, Chaoyong Chen:
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature. Secur. Commun. Networks 2018: 2615249:1-2615249:11 (2018) - [j28]Haosu Cheng, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen, Jingdong Bian:
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN. Secur. Commun. Networks 2018: 8392080:1-8392080:20 (2018) - [j27]Ruiya Li, Yiyang Chen, Yuegang Tan, Zude Zhou, Tianliang Li, Jian Mao:
Sensitivity Enhancement of FBG-Based Strain Sensor. Sensors 18(5): 1607 (2018) - [c33]Jian Mao, Jingdong Bian, Hanjun Ma, Yaoqi Jia, Zhenkai Liang, Xuxian Jiang:
Robust Detection of Android UI Similarity. ICC 2018: 1-6 - [c32]Haosu Cheng, Jianwei Liu, Jian Mao, Mengmeng Wang, Jie Chen:
OSCO: An Open Security-Enhanced Compatible OpenFlow Platform. WASA 2018: 66-77 - 2017
- [j26]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang:
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity. IEEE Access 5: 17020-17030 (2017) - [j25]Jian Mao, Peiguo Liu, Jinming Liu, Zhen-zhong Han:
Method for Detecting electromagnetic Information Leakage from Computer Monitor. Control. Intell. Syst. 45(1) (2017) - [j24]Jian Mao, Yue Chen, Yan Zhang, Xiandong Xu, Yajian Zhou, Jianwei Liu:
Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems. Int. J. Commun. Syst. 30(5) (2017) - [j23]Jianhong Zhang, Jian Mao:
Anonymous multi-receiver broadcast encryption scheme with strong security. Int. J. Embed. Syst. 9(2): 177-187 (2017) - [j22]Jian Mao, Shandong Wang, Jianhua Ni, Changbai Xi, Jiechen Wang:
Management System for Dam-Break Hazard Mapping in a Complex Basin Environment. ISPRS Int. J. Geo Inf. 6(6): 162 (2017) - [j21]Jian Mao, Wenqian Tian, Yan Zhang, Jian Cui, Hanjun Ma, Jingdong Bian, Jianwei Liu, Jianhong Zhang:
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. Secur. Commun. Networks 2017: 2948025:1-2948025:13 (2017) - [j20]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang:
Toward Exposing Timing-Based Probing Attacks in Web Applications. Sensors 17(3): 464 (2017) - [j19]Jian Mao, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, Jianwei Liu:
A position-aware Merkle tree for dynamic cloud data integrity verification. Soft Comput. 21(8): 2151-2164 (2017) - [j18]Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu, Jian Mao:
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking. J. Signal Process. Syst. 86(2-3): 157-173 (2017) - [c31]Jian Mao, Zheng Leong Chua, Zhenkai Liang:
Enabling practical experimentation in cyber-security training. DSC 2017: 516-517 - [c30]Wenqian Tian, Jian Mao, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou, Jianwei Liu:
Deeply Understanding Structure-based Social Network De-anonymization. IIKI 2017: 52-58 - [c29]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Detecting Phishing Websites via Aggregation Analysis of Page Layouts. IIKI 2017: 224-230 - [c28]Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang, Wei Cheng:
Privilege Leakage and Information Stealing through the Android Task Mechanism. PAC 2017: 152-163 - [c27]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang:
Phishing Website Detection Based on Effective CSS Features of Web Pages. WASA 2017: 804-815 - 2016
- [j17]Jianhong Zhang, Pengyan Li, Jian Mao:
IPad: ID-based public auditing for the outsourced data in the standard model. Clust. Comput. 19(1): 127-138 (2016) - [j16]Jianhong Zhang, Jian Mao:
Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3): 1211-1217 (2016) - [j15]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. Future Gener. Comput. Syst. 62: 29-39 (2016) - [j14]Jian Mao, Ruilong Wang, Yue Chen, Yaoqi Jia:
Detecting injected behaviors in HTML5-based Android applications. J. High Speed Networks 22(1): 15-34 (2016) - [j13]Jian Mao, Hanjun Ma, Yue Chen, Yaoqi Jia, Zhenkai Liang:
Automatic permission inference for hybrid mobile apps. J. High Speed Networks 22(1): 55-64 (2016) - [j12]Jianhong Zhang, Jian Mao:
Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model. J. Inf. Sci. Eng. 32(4): 1097-1112 (2016) - [j11]Jianhong Zhang, Xubing Zhao, Jian Mao:
Attack on Chen et al.'s certificateless aggregate signature scheme. Secur. Commun. Networks 9(1): 54-59 (2016) - [c26]Mengmeng Wang, Jianwei Liu, Jian Mao, Haosu Cheng, Jie Chen:
NSV-GUARD: Constructing Secure Routing Paths in Software Defined Networking. BDCloud-SocialCom-SustainCom 2016: 293-300 - [c25]Jianhong Zhang, Shuai Liu, Jian Mao:
On the security of a dynamic-hash-table based public auditing protocol. CISP-BMEI 2016: 1954-1958 - [c24]Jinming Liu, Jian Mao, Peiguo Liu:
Design and implement of a MCU based random number generater. ICCSE 2016: 945-948 - [c23]Jian Mao, Ruilong Wang, Yue Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang:
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications. IIKI 2016: 497-505 - [c22]Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao:
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure. ProvSec 2016: 83-100 - [c21]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang:
Toward Exposing Timing-Based Probing Attacks in Web Applications. WASA 2016: 499-510 - [c20]Jian Mao, Jian Cui, Yan Zhang, Hanjun Ma, Jianhong Zhang:
Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment. WASA 2016: 511-523 - 2015
- [j10]Jian Mao, Jinming Liu:
Information Leakage from Computer Based on electromagnetic radiation. Control. Intell. Syst. 43(2) (2015) - [j9]Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang:
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning. Comput. Secur. 55: 62-80 (2015) - [j8]Jianhong Zhang, Jian Mao:
An improved anonymous multi-receiver identity-based encryption scheme. Int. J. Commun. Syst. 28(4): 645-658 (2015) - [j7]Teng Li, Jian Mao, Yue Chen, Pei Li, Jie Chen:
Rating cloud storage service by collaborative remote data checking. Int. J. High Perform. Comput. Netw. 8(2): 144-153 (2015) - [j6]Jifa Guo, Jian Mao, Tiejun Cui, Chongwei Li:
A Multi-Scale Fuzzy Spatial Analysis Framework for Large Data Based on IT2 FS. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 23(1): 73-104 (2015) - [c19]Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu, Jian Mao:
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking. CSCloud 2015: 127-132 - [c18]Hua Cheng, Wen Yang, Rongsheng Tang, Jian Mao, Qian Luo, Chuan Li, Ang Wang:
Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systems. FSKD 2015: 1908-1912 - [c17]Jianhong Zhang, Pengyan Li, Jian Mao:
An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing. SmartCity 2015: 996-1002 - 2014
- [j5]Jianhong Zhang, Wenjing Tang, Jian Mao:
Efficient public verification proof of retrievability scheme in cloud. Clust. Comput. 17(4): 1401-1411 (2014) - [c16]Hua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang, Wenchang Shi:
Who Is Touching My Cloud. ESORICS (1) 2014: 362-379 - [c15]Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei:
A Website Credibility Assessment Scheme Based on Page Association. ISPEC 2014: 105-118 - [c14]Shuangyu He, Jianwei Liu, Jian Mao, Jie Chen:
Hierarchical Solution for Access Control and Authentication in Software Defined Networks. NSS 2014: 70-81 - 2013
- [j4]Jianhong Zhang, Jian Mao, Yuwei Xu:
On the security of an ID-based anonymous proxy signature scheme and its improved scheme. Int. J. Embed. Syst. 5(3): 181-188 (2013) - [c13]Xinshu Dong, Kailas Patil, Jian Mao, Zhenkai Liang:
A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications. ICECCS 2013: 177-187 - [c12]Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang:
Rating Web Pages Using Page-Transition Evidence. ICICS 2013: 49-58 - [c11]Hua Deng, Bo Qin, Ruiying Du, Huanguo Zhang, Lina Wang, Jianwei Liu, Jian Mao:
Finding Key Leakage in Hierarchical Distribution of Encrypted Data. INCoS 2013: 780-785 - [c10]Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang:
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features. INCoS 2013: 790-795 - 2012
- [c9]Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu, Tao Wei:
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage. INCoS 2012: 365-372 - 2011
- [j3]Jian Mao, Shiqing Liu, Zhu Gao:
Three-axis NC milling simulation based on adaptive triangular mesh. Comput. Ind. Eng. 60(1): 1-6 (2011) - [j2]Jianhong Zhang, Jian Mao:
Another Efficient Proxy Signature Scheme in the Standard Model. J. Inf. Sci. Eng. 27(4): 1249-1264 (2011) - [c8]Peilin Zhang, Jian Mao, Ziwen Yuan:
Research on Yangtze River Dangerous Articles Logistics Port Hierarchical Layout Evaluation of Jiangsu Province Based on Disaster Theory. ICAIC (2) 2011: 50-58 - [c7]Robert B. Bohn, John Messina, Fang Liu, Jin Tong, Jian Mao:
NIST Cloud Computing Reference Architecture. SERVICES 2011: 594-596
2000 – 2009
- 2009
- [j1]Jianhong Zhang, Jian Mao:
A novel identity-based multi-signcryption scheme. Comput. Commun. 32(1): 14-18 (2009) - 2008
- [c6]Zihuai Lin, Branka Vucetic, Jian Mao:
Ergodic Capacity of LTE Downlink Multiuser MIMO Systems. ICC 2008: 3345-3349 - 2007
- [c5]Tao Wei, Jian Mao, Wei Zou, Yu Chen:
Structuring 2-way Branches in Binary Executables. COMPSAC (1) 2007: 115-118 - [c4]Jianhong Zhang, Jian Mao:
A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. ISPEC 2007: 65-78 - [c3]Tao Wei, Jian Mao, Wei Zou, Yu Chen:
A New Algorithm for Identifying Loops in Decompilation. SAS 2007: 170-183 - 2006
- [c2]Jianhong Zhang, Jian Mao:
Linkability Analysis of Some Blind Signature Schemes. CIS 2006: 556-566
1990 – 1999
- 1995
- [c1]Xian Ji, Jian Mao, Ali Zhu, Shixin Cheng:
Sliding-exponential window RLS algorithm and its square-root method's DFE for the TDMA digital mobile radio. PIMRC 1995: 223-227
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint