![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Jun Tao 0003
Person information
- affiliation: Southeast University, School of Cyber Science and Engineering, Key Lab of CNII, Nanjing, China
- affiliation: Purple Mountain Laboratories for Network and Communication Security, Nanjing, China
- affiliation (PhD 2005): Southeast University, Department of Computer Science and Engineering, Nanjing, China
Other persons with the same name
- Jun Tao — disambiguation page
- Jun Tao 0001
— Fudan University, State Key Laboratory of ASIC and System, School of Microelectronics, Shanghai, China (and 1 more)
- Jun Tao 0002
— Sun Yat-sen University, School of Data and Computer Science, Guangzhou, Guangdong, China (and 2 more)
- Jun Tao 0004
— Southeast University, School of Information Science and Engineering, Key Laboratory of Underwater Acoustic Signal Processing, Nanjing, China (and 4 more)
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j20]Jinghai Duan
, Jun Tao
, Dingwen Chi
, Xiaoqian Li, Yifan Xu
:
Toward Energy Variations for IoT Lightweight Authentication in Backscatter Communication. IEEE Internet Things J. 12(1): 569-581 (2025) - 2024
- [j19]Linxiao Yu, Jun Tao, Yifan Xu, Weice Sun
, Zuyan Wang
:
TLS fingerprint for encrypted malicious traffic detection with attributed graph kernel. Comput. Networks 247: 110475 (2024) - [j18]Yuantu Luo
, Jun Tao, Yuehao Zhu, Yifan Xu:
HSS: enhancing IoT malicious traffic classification leveraging hybrid sampling strategy. Cybersecur. 7(1): 11 (2024) - [j17]Haotian Wang
, Jun Tao
, Dingwen Chi
, Yu Gao
, Zuyan Wang
, Dika Zou
, Yifan Xu
:
A Preference-Driven Malicious Platform Detection Mechanism for Users in Mobile Crowdsensing. IEEE Trans. Inf. Forensics Secur. 19: 2720-2731 (2024) - [j16]Yuehao Zhu
, Jun Tao
, Haotian Wang
, Linxiao Yu, Yuantu Luo
, Tianyi Qi, Zuyan Wang
, Yifan Xu
:
DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural Network. IEEE Trans. Netw. Serv. Manag. 21(2): 1660-1671 (2024) - [j15]Haotian Wang
, Jun Tao
, Dingwen Chi
, Yu Gao
, Zuyan Wang
, Dika Zou
, Yifan Xu
:
IMRSG: Incentive Mechanism Based on Rubinstein-Starr Game for Mobile CrowdSensing. IEEE Trans. Veh. Technol. 73(2): 2656-2668 (2024) - [j14]Dingwen Chi, Jun Tao
, Yulai Hu, Haotian Wang, Zuyan Wang, Yifan Xu:
AUV-assisted information collection scheme with energy balance and low delay of underwater things. Wirel. Networks 30(1): 267-283 (2024) - [c33]Ruijie Li
, Chenyang Zhang
, Huajun Chai
, Lingyun Ying
, Haixin Duan
, Jun Tao
:
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. CCS 2024: 4539-4553 - [c32]Yu Ao, Jun Tao, Dikai Zou, Weice Sun, Linxiao Yu:
An Accurate And Lightweight Intrusion Detection Model Deployed on Edge Network Devices. IJCNN 2024: 1-8 - [i3]Zuyan Wang, Jun Tao, Dika Zou:
RASE: Efficient Privacy-preserving Data Aggregation against Disclosure Attacks for IoTs. CoRR abs/2405.20914 (2024) - [i2]Ruijie Li, Chenyang Zhang, Huajun Chai, Lingyun Ying, Haixin Duan, Jun Tao:
PowerPeeler: A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts. CoRR abs/2406.04027 (2024) - 2023
- [j13]Yu Gao
, Jun Tao
, Haotian Wang
, Zuyan Wang
, Weice Sun
, Changping Song:
Joint Server Deployment and Task Scheduling for the Maximal Profit in Mobile-Edge Computing. IEEE Internet Things J. 10(24): 22501-22513 (2023) - [j12]Yu Gao, Jun Tao, Haotian Wang, Zuyan Wang, Dika Zou, Yifan Xu:
Benefit-oriented task offloading in UAV-aided mobile edge computing: An approximate solution. Peer Peer Netw. Appl. 16(5): 2058-2072 (2023) - [j11]Zuyan Wang
, Jun Tao
, Yifan Xu
, Yang Gao
, Dika Zou
:
Toward the Minimal Wait-for Delay for Rechargeable WSNs with Multiple Mobile Chargers. ACM Trans. Sens. Networks 19(4): 78:1-78:24 (2023) - [c31]Xinyu Chen, Evan Yifan Xu, Jun Tao, Rujie Chen:
An LP-Based Online Dispatching Method with Privacy-Preserving in Online Ride-Hailing. GLOBECOM 2023: 862-867 - [c30]Zuyan Wang, Jun Tao, Dika Zou:
Privacy-Preserving Data Aggregation in IoTs: A Randomize-then-Shuffle Paradigm. VTC2023-Spring 2023: 1-5 - 2022
- [j10]Zuyan Wang
, Jun Tao
, Yang Gao
, Yifan Xu
, Weice Sun, Yu Gao, Wenqiang Li:
Joint flight scheduling and task allocation for secure data collection in UAV-aided IoTs. Comput. Networks 207: 108849 (2022) - [j9]Yujian Zhang
, Yuhao Luo, Xing Chen
, Fei Tong
, Yuwei Xu, Jun Tao, Guang Cheng:
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT. Secur. Commun. Networks 2022: 9686049:1-9686049:15 (2022) - 2021
- [j8]Zuyan Wang
, Jun Tao
, Yang Gao
, Yifan Xu, Weice Sun, Xiaoyan Li:
A precision adjustable trajectory planning scheme for UAV-based data collection in IoTs. Peer-to-Peer Netw. Appl. 14(2): 655-671 (2021) - [j7]Yang Gao
, Jun Tao
, Yifan Xu, Zuyan Wang, Weice Sun, Guang Cheng:
CEBD: Contact-Evidence-Driven Blackhole Detection Based on Machine Learning in OppNets. IEEE Trans. Comput. Soc. Syst. 8(6): 1344-1356 (2021) - [c29]Hongyu Wang
, Xiaolei Tang, Liming Sheng, Wenqiang Li, Jun Shen, Jun Tao:
scList: A PCRAM-based Hybrid Memory Management Scheme. EUC 2021: 1-7 - [c28]Weice Sun, Jun Tao, Yifan Xu, Yang Gao, Zuyan Wang:
Network Latency Estimation: A Tensor-based Weighted Singular Value Thresholding Method. HPCC/DSS/SmartCity/DependSys 2021: 431-438 - [c27]Wenqiang Li, Jun Tao, Zuyan Wang, Yifan Xu, Xiaolei Tang, Yichao Dong:
MobiTrack: Mobile Crowdsensing-Based Object Tracking with Min-Region and Max-Utility. ICA3PP (2) 2021: 65-80 - [c26]Hongyu Wang
, Liming Sheng, Xiaolei Tang, Wenqiang Li, Jun Shen, Jun Tao:
PCRAM-based data management method for storage and computation integration. iSCI 2021: 1-7 - [c25]Yang Gao
, Jun Tao, Zuyan Wang, Wenqiang Li, Guang Cheng:
Analytical Optimal Solution of Selfish Node Detection with 2-hop Constraints in OppNets. MASS 2021: 53-61 - 2020
- [c24]Haotian Wu
, Jun Tao, Bin Xiao
:
Towards a Stable and Truthful Incentive Mechanism for Task Delegation in Hierarchical Crowdsensing. ICC 2020: 1-6 - [c23]Yifan Xu, Pan Xu, Jianping Pan, Jun Tao:
A Unified Model for the Two-stage Offline-then-Online Resource Allocation. IJCAI 2020: 4206-4212 - [c22]Fei Tong, Yujian Zhang, Jun Tao, Guanghui Wang
, Xiufang Shi, Guang Cheng:
EPDC: An Enhanced Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. VTC Fall 2020: 1-5 - [c21]Yujian Zhang, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain. VTC Fall 2020: 1-6 - [i1]Yifan Xu, Pan Xu, Jianping Pan, Jun Tao:
A Unified Model for the Two-stage Offline-then-Online Resource Allocation. CoRR abs/2012.06845 (2020)
2010 – 2019
- 2019
- [j6]Xia Deng
, Le Chang
, Jun Tao, Jianping Pan
:
Reducing the Overhead of Multicast Using Social Features in Mobile Opportunistic Networks. IEEE Access 7: 50095-50108 (2019) - [j5]Yang Gao
, Jun Tao, Qian Fang, Zuyan Wang
, Xiao-Yan Li, Feng Xue:
POF: Probability-Driven Opportunistic Forwarding for Bike-Sharing System. IEEE Access 7: 52214-52225 (2019) - [c20]Jun Tao, Xiaoyan Li, Jinghao Li, Qian Fang, Zuyan Wang
, Fei Tong:
Similarity-Guided Multimedia Recommendation in Heterogeneous Information Network. GLOBECOM 2019: 1-6 - [c19]Jun Tao, Yizheng Li, Zhaoyue Wang, Pengkun Xu, Cong Su:
Self-Adaptive Probabilistic Sampling for Elephant Flows Detection. GLOBECOM 2019: 1-6 - [c18]Yang Gao
, Jun Tao, Li Zeng, Xiaoming Fang, Qian Fang, Xiaoyan Li:
User Profiling with Campus Wi-Fi Access Trace and Network Traffic. ICME 2019: 922-927 - [c17]Yifan Xu, Guanghui Wang, Jun Tao, Jianping Pan
:
Efficient Task Assignment for Crowd-Powered Rebalancing in Bike Sharing Systems. ITSC 2019: 232-237 - 2018
- [j4]Liang He, Linghe Kong
, Jun Tao, Jingdong Xu, Jianping Pan
:
On-Demand Mobile Data Collection in Cyber-Physical Systems. Wirel. Commun. Mob. Comput. 2018 (2018) - [c16]Zhengyang Ding, Qian Fang, Yaodan Hu, Hongyu Wang, Jun Tao:
Shape Retrieval with Adjustable Precision for Hole Detection in 3D Wireless Sensor Networks. APCC 2018: 622-627 - [c15]Yang Gao
, Jun Tao, Yifan Xu, Haotian Wu
, Noah Kwaku Baah:
Collaborative Route Plan for Parking Sites Selection in Bike-Sharing Systems. CSCWD 2018: 814-819 - [c14]Jun Tao, Haotian Wu
, Shujing Shi, Jing Hu, Yang Gao:
Contacts-aware opportunistic forwarding in mobile social networks: A community perspective. WCNC 2018: 1-6 - 2017
- [j3]Jun Tao, Yifan Xu, Ziyi Zhang, Fuqin Feng, Fei Tong, Fang Dong:
A resource allocation game with restriction mechanism in VANET cloud. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j2]Jun Tao, Yifan Xu
, Le Chang, Chengwei Tan, Xiaoxiao Wang:
LAOF: location-aware opportunistic forwarding scheme in mobile Ad hoc networks. Trans. Emerg. Telecommun. Technol. 28(1) (2017) - [c13]Yifan Xu, Jun Tao, Yang Gao
, Li Zeng:
Location-Aware Worker Selection for Mobile Opportunistic Crowdsensing in VANETs. GLOBECOM 2017: 1-6 - [c12]Jun Tao, Tianqi Zhai, Haotian Wu
, Yifan Xu, Yongqiang Dong:
A quality-enhancing coverage scheme for camera sensor networks. IECON 2017: 8458-8463 - 2016
- [c11]Jun Tao, Jianhua Liu, Tianqi Zhai, Chen Guo, Ziyi Zhang, Jian He:
PITM: Passive indoor object tracking with Markov probability estimation in wireless sensor networks. WCNC 2016: 1-6 - 2015
- [j1]Jun Tao, Limin Zhu, Le Chang, Jin Liu, Xiaoxiao Wang, Yaodan Hu:
Joint anti-attack scheme for channel assignment in multi-radio multi-channel wireless mesh networks. Secur. Commun. Networks 8(13): 2302-2316 (2015) - [c10]Jun Tao, Ziyi Zhang, Fuqin Feng, Jian He, Yifan Xu
:
Non-cooperative Resource Allocation Scheme for Data Access in VANET Cloud Environment. CBD 2015: 190-196 - [c9]Jun Tao, Yaodan Hu, Fei Tong, Jianping Pan
:
Data sweeping in deterministic trajectories-covered Wireless Sensor Networks. ICC 2015: 6312-6317 - [c8]Jun Tao, Chengwei Tan, Ziyi Zhang, Jian He, Yifan Xu
:
Opportunistic Forwarding based on the weighted social characteristics in MSNs. ICC 2015: 6318-6323 - [c7]Jun Tao, Yifan Xu
, Chengwei Tan, Xiaoxiao Wang:
Location-aware opportunistic forwarding in mobile opportunistic networks. WCNC 2015: 1847-1852 - 2014
- [c6]Jun Tao, Limin Zhu, Xiaoxiao Wang, Jian He, Ying Liu:
RSU deployment scheme with power control for highway message propagation in VANETs. GLOBECOM 2014: 169-174 - 2013
- [c5]Jun Tao, Lei Zhang, Maryam Ahmadi, Le Chang, Jianping Pan
, Wenqiang Chen:
Hexagonal clustering with mobile energy replenishment in wireless sensor networks. GLOBECOM 2013: 456-461 - [c4]Xia Deng
, Le Chang, Jun Tao, Jianping Pan
, Jianxin Wang:
Social profile-based multicast routing scheme for delay-tolerant networks. ICC 2013: 1857-1861 - 2012
- [c3]Jun Tao, Liang He, Yanyan Zhuang, Jianping Pan
, Maryam Ahmadi:
Sweeping and active skipping in wireless sensor networks with mobile elements. GLOBECOM 2012: 106-111 - 2011
- [c2]Liang He, Jun Tao, Jianping Pan
, Jingdong Xu:
Adaptive mobility-assisted data collection in wireless sensor networks. WCSP 2011: 1-6
2000 – 2009
- 2005
- [c1]Jun Tao, Ye Liu, Qingliang Wu:
A Selfish Non-atomic Routing Algorithm Based on Game Theory. ICNC (3) 2005: 761-767
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-28 23:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint