default search action
Rong Jiang 0001
Person information
- affiliation (PhD 2014): National University of Defense Technology, College of Computer Science and Technology, China
- affiliation (2013): University of Waterloo, Department of Electrical and Computer Engineering, Canada
Other persons with the same name
- Rong Jiang — disambiguation page
- Rong Jiang 0002 — University of Wisconsin, Electrical and Computer Engineering Department, College of Engineering, Madison, WI, USA (and 1 more)
- Rong Jiang 0003 — Tongji University, Department of Control Science and Engineering, Shanghai, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Xiaojuan Zhao, Rong Jiang, Yue Han, Aiping Li, Zhichao Peng:
A survey on cybersecurity knowledge graph construction. Comput. Secur. 136: 103524 (2024) - 2022
- [c22]Haitian Liu, Rong Jiang, Bin Zhou, Xing Rong, Juan Li, Aiping Li:
Multiple Sequential Network Attacks Detection Based on DTW-HMM. DSC 2022: 134-141 - [c21]Lei Chen, Rong Jiang, Changjian Lin, Aiping Li:
A Survey on Threat Hunting: Approaches and Applications. DSC 2022: 340-344 - 2021
- [j7]Xiaojuan Zhao, Yan Jia, Aiping Li, Rong Jiang, Kai Chen, Ye Wang:
Target relational attention-oriented knowledge graph reasoning. Neurocomputing 461: 577-586 (2021) - [c20]Haitian Liu, Rong Jiang, Bin Zhou, Xing Rong, Juan Li, Aiping Li:
A Survey of Cyber Security Approaches for Prediction. DSC 2021: 439-444 - [p2]Kai Xing, Aiping Li, Rong Jiang, Yan Jia:
Detection and Defense Methods of Cyber Attacks. MDATA: A New Knowledge Representation Model 2021: 185-198 - [p1]Yulu Qi, Rong Jiang, Aiping Li, Zhaoquan Gu, Yan Jia:
A Distributed Framework for APT Attack Analysis. MDATA: A New Knowledge Representation Model 2021: 199-219 - 2020
- [j6]Xiao-Juan Zhao, Yan Jia, Aiping Li, Rong Jiang, Yichen Song:
Multi-source knowledge fusion: a survey. World Wide Web 23(4): 2567-2592 (2020) - [c19]Yulu Qi, Rong Jiang, Yan Jia, Aiping Li:
An APT Attack Analysis Framework Based on Self-define Rules and Mapreduce. DSC 2020: 61-66 - [c18]Kai Xing, Aiping Li, Rong Jiang, Yan Jia:
A Review of APT Attack Detection Methods and Defense Strategies. DSC 2020: 67-70 - [c17]Han Yu, Rong Jiang, Aiping Li:
Striking a Balance in Unsupervised Fine-Grained Domain Adaptation Using Adversarial Learning. KSEM (2) 2020: 401-413 - [c16]Han Yu, Rong Jiang, Bin Zhou, Aiping Li:
Knowledge-Infused Pre-trained Models for KG Completion. WISE (1) 2020: 273-285
2010 – 2019
- 2019
- [c15]Haocheng Zhong, Chenxi Zeng, Aiping Li, Yan Jia, Rong Jiang, Yulu Qi, Weihong Han:
Research of Trojan Attack Effect Evaluation Based on FAHP. DSC 2019: 31-37 - [c14]Xiao-Juan Zhao, Yan Jia, Aiping Li, Rong Jiang, Haocheng Xie, Yichen Song, Weihong Han:
Multi-source Knowledge Fusion: A Survey. DSC 2019: 119-127 - [c13]Han Yu, Aiping Li, Rong Jiang, Yan Jia, Xiao-Juan Zhao, Weihong Han:
HDGS: A Hybrid Dialogue Generation System using Adversarial Learning. DSC 2019: 135-141 - [c12]Yulu Qi, Jincheng Zhong, Rong Jiang, Yan Jia, Aiping Li, Li Huang, Weihong Han:
FSM-Based Cyber Security Status Analysis Method. DSC 2019: 510-515 - [c11]Haocheng Xie, Aiping Li, Rong Jiang, Yan Jia, Li Huang, Weihong Han:
Intrusion Detection Results Analysis Based on Variational Auto-Encoder. DSC 2019: 516-521 - [c10]Han Yu, Aiping Li, Rong Jiang:
Needle in a Haystack: Attack Detection from Large-Scale System Audit. ICCT 2019: 1418-1426 - 2018
- [j5]Rong Jiang, Rongxing Lu, Kim-Kwang Raymond Choo:
Achieving high performance and privacy-preserving query over encrypted multidimensional big metering data. Future Gener. Comput. Syst. 78: 392-401 (2018) - [c9]Yulu Qi, Rong Jiang, Yan Jia, Aiping Li:
Analysis on the Related Evaluation Technique of Composite Attack in Network Confrontation. DSC 2018: 956-962 - 2017
- [c8]Wei Wang, Rong Jiang, Yan Jia, Aiping Li, Yi Chen:
KGBIAC: Knowledge Graph Based Intelligent Alert Correlation Framework. CSS 2017: 523-530 - [c7]Huaijun Shang, Rong Jiang, Aiping Li, Wei Wang:
A Framework to Construct Knowledge Base for Cyber Security. DSC 2017: 242-248 - [c6]Kai Ma, Rong Jiang, Mianxiong Dong, Yan Jia, Aiping Li:
Neural Network Based Web Log Analysis for Web Intrusion Detection. SpaCCS Workshops 2017: 194-204 - 2016
- [c5]Rong Jiang, Rongxing Lu, Chengzhe Lai, Aiping Li:
A Secure Communication Protocol with Privacy-Preserving Monitoring and Controllable Linkability for V2G. DSC 2016: 567-572 - 2015
- [j4]Tingting Yang, Chengzhe Lai, Rongxing Lu, Rong Jiang:
EAPSG: Efficient authentication protocol for secure group communications in maritime wideband communication networks. Peer-to-Peer Netw. Appl. 8(2): 216-228 (2015) - [j3]Rong Jiang, Rongxing Lu, Jun Luo, Chengzhe Lai, Xuemin Sherman Shen:
Efficient self-healing group key management with dynamic revocation and collusion resistance for SCADA in smart grid. Secur. Commun. Networks 8(6): 1026-1039 (2015) - 2014
- [c4]Xing Rong, Yong Zhao, Rong Jiang:
MMACS: A multi-authority cloud access scheme with mixed access structure. ICC Workshops 2014: 706-711 - [c3]Chengzhe Lai, Hui Li, Rongxing Lu, Rong Jiang, Xuemin Shen:
SEGR: A secure and efficient group roaming scheme for machine to machine communications between 3GPP and WiMAX networks. ICC 2014: 1011-1016 - 2013
- [j2]Rong Jiang, Chengzhe Lai, Jun Luo, Xiaoping Wang, Hong Wang:
EAP-Based Group Authentication and Key Agreement Protocol for Machine-Type Communications. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Rong Jiang, Jun Luo, Xiaoping Wang:
HRKT: A Hierarchical Route Key Tree based Group Key Management for Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 7(8): 2042-2060 (2013) - [c2]Rong Jiang, Rongxing Lu, Chengzhe Lai, Jun Luo, Xuemin Shen:
Robust group key management with revocation and collusion resistance for SCADA in smart grid. GLOBECOM 2013: 802-807 - [c1]Chengzhe Lai, Hui Li, Rongxing Lu, Rong Jiang, Xuemin Shen:
LGTH: A lightweight group authentication protocol for machine-type communication in LTE networks. GLOBECOM 2013: 832-837
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:23 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint