Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jian Mao
@article{DBLP:journals/iotj/MaoLZML24, author = {Jian Mao and Qixiao Lin and Shishi Zhu and Liran Ma and Jianwei Liu}, title = {SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation in Smart Home Systems}, journal = {{IEEE} Internet Things J.}, volume = {11}, number = {4}, pages = {5731--5744}, year = {2024}, url = {https://doi.org/10.1109/JIOT.2023.3308089}, doi = {10.1109/JIOT.2023.3308089}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/MaoLZML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/YouMLH24, author = {Xingye You and Jian Mao and Jingming Liu and Kai Huang}, title = {Denoising low {SNR} electromagnetic conducted emissions using an improved DnCNN based mode}, journal = {J. Intell. Fuzzy Syst.}, volume = {46}, number = {2}, pages = {5249--5261}, year = {2024}, url = {https://doi.org/10.3233/jifs-232371}, doi = {10.3233/JIFS-232371}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/YouMLH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bigdatama/MaoXLML23, author = {Jian Mao and Xiaohe Xu and Qixiao Lin and Liran Ma and Jianwei Liu}, title = {EScope: Effective Event Validation for IoT Systems Based on State Correlation}, journal = {Big Data Min. Anal.}, volume = {6}, number = {2}, pages = {218--233}, year = {2023}, url = {https://doi.org/10.26599/bdma.2022.9020034}, doi = {10.26599/BDMA.2022.9020034}, timestamp = {Tue, 16 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bigdatama/MaoXLML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/ChenLM23, author = {Yang Chen and Jinming Liu and Jian Mao}, title = {Blind source separation of electromagnetic signals based on deep focusing U-Net}, journal = {J. Intell. Fuzzy Syst.}, volume = {45}, number = {5}, pages = {9157--9167}, year = {2023}, url = {https://doi.org/10.3233/jifs-223568}, doi = {10.3233/JIFS-223568}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/ChenLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/npl/GuoMZ23, author = {Yurong Guo and Jian Mao and Man Zhao}, title = {Rolling Bearing Fault Diagnosis Method Based on Attention {CNN} and BiLSTM Network}, journal = {Neural Process. Lett.}, volume = {55}, number = {3}, pages = {3377--3410}, year = {2023}, url = {https://doi.org/10.1007/s11063-022-11013-2}, doi = {10.1007/S11063-022-11013-2}, timestamp = {Tue, 25 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/npl/GuoMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiaoJCWML23, author = {Yinhao Xiao and Yizhen Jia and Xiuzhen Cheng and Shengling Wang and Jian Mao and Zhenkai Liang}, title = {I Know Your Social Network Accounts: {A} Novel Attack Architecture for Device-Identity Association}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1017--1030}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3147785}, doi = {10.1109/TDSC.2022.3147785}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XiaoJCWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/ZhouLWMLBWLWZ23, author = {Zequan Zhou and Xiling Luo and Yupeng Wang and Jian Mao and Feixiang Luo and Yi Bai and Xiaochao Wang and Gang Liu and Junjun Wang and Feng Zeng}, title = {A Practical Data Audit Scheme With Retrievability and Indistinguishable Privacy-Preserving for Vehicular Cloud Computing}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {12}, pages = {16592--16606}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3295953}, doi = {10.1109/TVT.2023.3295953}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/ZhouLWMLBWLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/QiM23, author = {Guorong Qi and Jian Mao}, title = {An Improved {CNN-LSTM} Algorithm for Detection of {DGA} Domain Name}, booktitle = {Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2023, Xiamen, China, October 20-22, 2023}, pages = {1293--1298}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3650400.3650618}, doi = {10.1145/3650400.3650618}, timestamp = {Fri, 19 Apr 2024 08:09:03 +0200}, biburl = {https://dblp.org/rec/conf/eitce/QiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ricai/CaoCWMX23, author = {Ceyao Cao and Lei Chcn and Yi Wu and Jian Mao and Jie Xu}, title = {Fast Algorithm for {VVC} Video Image Coding Based on Machine Learning}, booktitle = {5th International Conference on Robotics, Intelligent Control and Artificial Intelligence, {RICAI} 2023, Hangzhou, China, December 1-3, 2023}, pages = {1147--1151}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/RICAI60863.2023.10489208}, doi = {10.1109/RICAI60863.2023.10489208}, timestamp = {Sat, 20 Apr 2024 12:53:27 +0200}, biburl = {https://dblp.org/rec/conf/ricai/CaoCWMX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/MaoLLL22, author = {Jian Mao and Xiang Li and Xiling Luo and Qixiao Lin}, title = {SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors}, journal = {Neurocomputing}, volume = {500}, pages = {295--306}, year = {2022}, url = {https://doi.org/10.1016/j.neucom.2021.07.106}, doi = {10.1016/J.NEUCOM.2021.07.106}, timestamp = {Fri, 01 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/MaoLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MaoLLL22, author = {Jian Mao and Ziwen Liu and Qixiao Lin and Zhenkai Liang}, title = {Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {12}, pages = {9151--9166}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3113645}, doi = {10.1109/JIOT.2021.3113645}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MaoLLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/HeZMMKJZ22, author = {Jialing He and Zijian Zhang and Jian Mao and Liran Ma and Bakh Khoussainov and Rui Jin and Liehuang Zhu}, title = {Video Aficionado: We Know What You Are Watching}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {21}, number = {8}, pages = {3041--3052}, year = {2022}, url = {https://doi.org/10.1109/TMC.2020.3045730}, doi = {10.1109/TMC.2020.3045730}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/HeZMMKJZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/HuangCMZZ22, author = {Jianyu Huang and Nanting Cai and Jian Mao and Jialin Zhang and Xiaochun Zhao}, title = {A denoising method based on {CNN} through multi-layer separation}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {361--366}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428.3573490}, doi = {10.1145/3573428.3573490}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/HuangCMZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/Zeng0M22, author = {Yongjin Zeng and Jie Chen and Jian Mao}, title = {Deep Learning-based Road Crack Detection Technology}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {580--584}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428.3573530}, doi = {10.1145/3573428.3573530}, timestamp = {Thu, 24 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/Zeng0M22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/0050ZM22, author = {Jie Chen and Yongjin Zeng and Jian Mao}, title = {Key Technologies of Electronic Perimeter System Based on Deep Learning}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {623--626}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428.3573538}, doi = {10.1145/3573428.3573538}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/0050ZM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/ChenLM22, author = {Yang Chen and Jinming Liu and Jian Mao}, title = {Blind source separation of electromagnetic signals based on one-dimensional U-Net}, booktitle = {Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, {EITCE} 2022, Xiamen, China, October 21-23, 2022}, pages = {1597--1602}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3573428.3573709}, doi = {10.1145/3573428.3573709}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/ChenLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaoHC21, author = {Jian Mao and Junyang Han and Tiejun Cui}, title = {Development and Assessment of Improved Global Pressure and Temperature Series Models}, journal = {{IEEE} Access}, volume = {9}, pages = {104429--104447}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3099255}, doi = {10.1109/ACCESS.2021.3099255}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaoHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaoHC21a, author = {Jian Mao and Junyang Han and Tiejun Cui}, title = {Development of a New Tabular Zenith Tropospheric Delay Model for Real-Time {GNSS} Applications}, journal = {{IEEE} Access}, volume = {9}, pages = {112837--112849}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3104023}, doi = {10.1109/ACCESS.2021.3104023}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaoHC21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/MaoLZHS21, author = {Jian Mao and Jinming Liu and Jiemin Zhang and Zhen{-}zhong Han and Sen Shi}, title = {A method for detecting image information leakage risk from electromagnetic emission of computer monitors}, journal = {J. Intell. Fuzzy Syst.}, volume = {40}, number = {2}, pages = {2981--2991}, year = {2021}, url = {https://doi.org/10.3233/JIFS-189337}, doi = {10.3233/JIFS-189337}, timestamp = {Tue, 09 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/MaoLZHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/MaoYZ21, author = {Jian Mao and Yitong Yang and Tianchen Zhang}, title = {Empirical Analysis of Attribute Inference Techniques in Online Social Network}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {2}, pages = {881--893}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3009864}, doi = {10.1109/TNSE.2020.3009864}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/MaoYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZengCCJLM21, author = {Jun Zeng and Zheng Leong Chua and Yinfang Chen and Kaihang Ji and Zhenkai Liang and Jian Mao}, title = {{WATSON:} Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/watson-abstracting-behaviors-from-audit-logs-via-aggregation-of-contextual-semantics/}, timestamp = {Thu, 17 Jun 2021 15:42:26 +0200}, biburl = {https://dblp.org/rec/conf/ndss/ZengCCJLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/YangLML21, author = {Yitong Yang and Qixiao Lin and Jian Mao and Lipei Liu}, title = {An improved social attribute inference scheme based on multi-attribute correlation}, booktitle = {2021 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI), Atlanta, GA, USA, October 18-21, 2021}, pages = {370--377}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SWC50871.2021.00057}, doi = {10.1109/SWC50871.2021.00057}, timestamp = {Fri, 03 Dec 2021 17:36:57 +0100}, biburl = {https://dblp.org/rec/conf/uic/YangLML21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XieJHCM20, author = {Guangmin Xie and Zhongyuan Jiang and Mingxing He and Xiaoliang Chen and Jian Mao}, title = {A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods}, journal = {{IEEE} Access}, volume = {8}, pages = {103759--103771}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2999074}, doi = {10.1109/ACCESS.2020.2999074}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XieJHCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsnet/ChengLXRMZ20, author = {Haosu Cheng and Jianwei Liu and Tongge Xu and Bohan Ren and Jian Mao and Wei Zhang}, title = {Machine learning based low-rate DDoS attack detection for {SDN} enabled IoT networks}, journal = {Int. J. Sens. Networks}, volume = {34}, number = {1}, pages = {56--69}, year = {2020}, url = {https://doi.org/10.1504/IJSNET.2020.109720}, doi = {10.1504/IJSNET.2020.109720}, timestamp = {Tue, 20 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsnet/ChengLXRMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MaoZDLL20, author = {Jian Mao and Shishi Zhu and Xuan Dai and Qixiao Lin and Jianwei Liu}, title = {Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {9}, pages = {8025--8035}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2997779}, doi = {10.1109/JIOT.2020.2997779}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MaoZDLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/MaoZL20, author = {Jian Mao and Shishi Zhu and Jianwei Liu}, title = {An inaudible voice attack to context-based device authentication in smart IoT systems}, journal = {J. Syst. Archit.}, volume = {104}, pages = {101696}, year = {2020}, url = {https://doi.org/10.1016/j.sysarc.2019.101696}, doi = {10.1016/J.SYSARC.2019.101696}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/MaoZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/phycomm/MaoZTG20, author = {Jian Mao and Jiemin Zhang and Zhi Tang and Zhiling Gu}, title = {{DNS} anti-attack machine learning model for {DGA} domain name detection}, journal = {Phys. Commun.}, volume = {40}, pages = {101069}, year = {2020}, url = {https://doi.org/10.1016/j.phycom.2020.101069}, doi = {10.1016/J.PHYCOM.2020.101069}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/phycomm/MaoZTG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cipae/LuTMGZ20, author = {Jinping Lu and Zhi Tang and Jian Mao and Zhiling Gu and Jiemin Zhang}, title = {Mixed-Models Method Based on Machine Learning in Detecting WebShell Attack}, booktitle = {{CIPAE} 2020: 2020 International Conference on Computers, Information Processing and Advanced Education, Ottawa, ON, Canada, October 16-18, 2020}, pages = {251--259}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3419635.3419716}, doi = {10.1145/3419635.3419716}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cipae/LuTMGZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/ZhangM20, author = {Xueming Zhang and Jian Mao}, title = {Research on image enhancement algorithm based on Retinex theory}, booktitle = {{EITCE} 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020 - 8 November, 2020}, pages = {361--365}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3443467.3443782}, doi = {10.1145/3443467.3443782}, timestamp = {Fri, 04 Aug 2023 10:04:46 +0200}, biburl = {https://dblp.org/rec/conf/eitce/ZhangM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/HuM20, author = {Tao Hu and Jian Mao}, title = {A Survey of Moving Target Detection Methods Based on Machine Vision}, booktitle = {{EITCE} 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020 - 8 November, 2020}, pages = {529--533}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3443467.3443810}, doi = {10.1145/3443467.3443810}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/HuM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eitce/GuoM20, author = {Yurong Guo and Jian Mao}, title = {Optimization analysis of assembly system based on digital twin and deep learning}, booktitle = {{EITCE} 2020: 4th International Conference on Electronic Information Technology and Computer Engineering, Xiamen, China, 6 November, 2020 - 8 November, 2020}, pages = {627--631}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3443467.3443825}, doi = {10.1145/3443467.3443825}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eitce/GuoM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaoLLS19, author = {Jian Mao and Peiguo Liu and Jinming Liu and Sen Shi}, title = {Identification of Multi-Dimensional Electromagnetic Information Leakage Using {CNN}}, journal = {{IEEE} Access}, volume = {7}, pages = {145714--145724}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2944902}, doi = {10.1109/ACCESS.2019.2944902}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MaoLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaoTYL19, author = {Jian Mao and Wenqian Tian and Yitong Yang and Jianwei Liu}, title = {An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance}, journal = {{IEEE} Access}, volume = {7}, pages = {153074--153085}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2946179}, doi = {10.1109/ACCESS.2019.2946179}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MaoTYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/MaoBTZWLL19, author = {Jian Mao and Jingdong Bian and Wenqian Tian and Shishi Zhu and Tao Wei and Aili Li and Zhenkai Liang}, title = {Phishing page detection via learning classifiers from page layout feature}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2019}, pages = {43}, year = {2019}, url = {https://doi.org/10.1186/s13638-019-1361-0}, doi = {10.1186/S13638-019-1361-0}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/MaoBTZWLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcin/MaoZBLL19, author = {Jian Mao and Shishi Zhu and Jingdong Bian and Qixiao Lin and Jianwei Liu}, title = {Anomalous Power-Usage Behavior Detection from Smart Home Wireless Communications}, journal = {J. Commun. Inf. Networks}, volume = {4}, number = {1}, pages = {13--23}, year = {2019}, url = {https://doi.org/10.23919/JCIN.2019.8916642}, doi = {10.23919/JCIN.2019.8916642}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcin/MaoZBLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiuYTXHXM19, author = {Hu Liu and Qiang Yu and Yuegang Tan and Wenjun Xu and Bing Huang and Zhichao Xie and Jian Mao}, title = {Feasibility Study on Temperature Distribution Measurement Method of Thrust Sliding Bearing Bush Based on {FBG} Quasi-Distributed Sensing}, journal = {Sensors}, volume = {19}, number = {14}, pages = {3245}, year = {2019}, url = {https://doi.org/10.3390/s19143245}, doi = {10.3390/S19143245}, timestamp = {Wed, 12 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LiuYTXHXM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/ZhangMLTGL19, author = {Jiemin Zhang and Jian Mao and Jinming Liu and Zhi Tang and Zhiling Gu and Yongmei Liu}, title = {Cloud-based Multi-core Architecture against {DNS} Attacks}, booktitle = {14th International Conference on Computer Science {\&} Education, {ICCSE} 2019, Toronto, ON, Canada, August 19-21, 2019}, pages = {391--393}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCSE.2019.8845508}, doi = {10.1109/ICCSE.2019.8845508}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccse2/ZhangMLTGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/LiZM19, author = {Ying Li and Jiong Zhang and Jian Mao}, title = {Transforming knowledge into intelligence The research on Wisdom Class Teaching Theory and Practice}, booktitle = {14th International Conference on Computer Science {\&} Education, {ICCSE} 2019, Toronto, ON, Canada, August 19-21, 2019}, pages = {998--1005}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCSE.2019.8845057}, doi = {10.1109/ICCSE.2019.8845057}, timestamp = {Mon, 30 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccse2/LiZM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/LinMSZL19, author = {Qixiao Lin and Jian Mao and Futian Shi and Shishi Zhu and Zhenkai Liang}, editor = {Edoardo S. Biagioni and Yao Zheng and Siyao Cheng}, title = {Detecting Android Side Channel Probing Attacks Based on System States}, booktitle = {Wireless Algorithms, Systems, and Applications - 14th International Conference, {WASA} 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11604}, pages = {201--212}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23597-0\_16}, doi = {10.1007/978-3-030-23597-0\_16}, timestamp = {Tue, 25 Jun 2019 13:02:57 +0200}, biburl = {https://dblp.org/rec/conf/wasa/LinMSZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaoBBWCXL18, author = {Jian Mao and Jingdong Bian and Guangdong Bai and Ruilong Wang and Yue Chen and Yinhao Xiao and Zhenkai Liang}, title = {Detecting Malicious Behaviors in JavaScript Applications}, journal = {{IEEE} Access}, volume = {6}, pages = {12284--12294}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2795383}, doi = {10.1109/ACCESS.2018.2795383}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MaoBBWCXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangM18, author = {Jianhong Zhang and Jian Mao}, title = {On the Security of a Pairing-Free Certificateless Signcryption Scheme}, journal = {Comput. J.}, volume = {61}, number = {4}, pages = {469--471}, year = {2018}, url = {https://doi.org/10.1093/comjnl/bxx081}, doi = {10.1093/COMJNL/BXX081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/MaoTJHZL18, author = {Jian Mao and Wenqian Tian and Jingbo Jiang and Zhaoyuan He and Zhihong Zhou and Jianwei Liu}, title = {Understanding structure-based social network de-anonymization techniques via empirical analysis}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2018}, pages = {279}, year = {2018}, url = {https://doi.org/10.1186/s13638-018-1291-2}, doi = {10.1186/S13638-018-1291-2}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/MaoTJHZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mfc/MaoLB18, author = {Jian Mao and Qixiao Lin and Jingdong Bian}, title = {Application of learning algorithms in smart home IoT system security}, journal = {Math. Found. Comput.}, volume = {1}, number = {1}, pages = {63--76}, year = {2018}, url = {https://doi.org/10.3934/mfc.2018004}, doi = {10.3934/MFC.2018004}, timestamp = {Tue, 14 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mfc/MaoLB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuoZZMC18, author = {Xiling Luo and Zequan Zhou and Lin Zhong and Jian Mao and Chaoyong Chen}, title = {An Effective Integrity Verification Scheme of Cloud Data Based on {BLS} Signature}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {2615249:1--2615249:11}, year = {2018}, url = {https://doi.org/10.1155/2018/2615249}, doi = {10.1155/2018/2615249}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuoZZMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengLMWCB18, author = {Haosu Cheng and Jianwei Liu and Jian Mao and Mengmeng Wang and Jie Chen and Jingdong Bian}, title = {A Compatible OpenFlow Platform for Enabling Security Enhancement in {SDN}}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {8392080:1--8392080:20}, year = {2018}, url = {https://doi.org/10.1155/2018/8392080}, doi = {10.1155/2018/8392080}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ChengLMWCB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/LiCTZLM18, author = {Ruiya Li and Yiyang Chen and Yuegang Tan and Zude Zhou and Tianliang Li and Jian Mao}, title = {Sensitivity Enhancement of FBG-Based Strain Sensor}, journal = {Sensors}, volume = {18}, number = {5}, pages = {1607}, year = {2018}, url = {https://doi.org/10.3390/s18051607}, doi = {10.3390/S18051607}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/LiCTZLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/MaoBMJLJ18, author = {Jian Mao and Jingdong Bian and Hanjun Ma and Yaoqi Jia and Zhenkai Liang and Xuxian Jiang}, title = {Robust Detection of Android {UI} Similarity}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422189}, doi = {10.1109/ICC.2018.8422189}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/MaoBMJLJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ChengLMW018, author = {Haosu Cheng and Jianwei Liu and Jian Mao and Mengmeng Wang and Jie Chen}, editor = {Sriram Chellappan and Wei Cheng and Wei Li}, title = {{OSCO:} An Open Security-Enhanced Compatible OpenFlow Platform}, booktitle = {Wireless Algorithms, Systems, and Applications - 13th International Conference, {WASA} 2018, Tianjin, China, June 20-22, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10874}, pages = {66--77}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-94268-1\_6}, doi = {10.1007/978-3-319-94268-1\_6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/ChengLMW018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaoTLWL17, author = {Jian Mao and Wenqian Tian and Pei Li and Tao Wei and Zhenkai Liang}, title = {Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity}, journal = {{IEEE} Access}, volume = {5}, pages = {17020--17030}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2743528}, doi = {10.1109/ACCESS.2017.2743528}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/MaoTLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cis/MaoLLH17, author = {Jian Mao and Peiguo Liu and Jinming Liu and Zhen{-}zhong Han}, title = {Method for Detecting electromagnetic Information Leakage from Computer Monitor}, journal = {Control. Intell. Syst.}, volume = {45}, number = {1}, year = {2017}, url = {https://doi.org/10.2316/Journal.201.2017.1.201-2791}, doi = {10.2316/JOURNAL.201.2017.1.201-2791}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cis/MaoLLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/MaoCZXZL17, author = {Jian Mao and Yue Chen and Yan Zhang and Xiandong Xu and Yajian Zhou and Jianwei Liu}, title = {Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems}, journal = {Int. J. Commun. Syst.}, volume = {30}, number = {5}, year = {2017}, url = {https://doi.org/10.1002/dac.3163}, doi = {10.1002/DAC.3163}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/MaoCZXZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ZhangM17, author = {Jianhong Zhang and Jian Mao}, title = {Anonymous multi-receiver broadcast encryption scheme with strong security}, journal = {Int. J. Embed. Syst.}, volume = {9}, number = {2}, pages = {177--187}, year = {2017}, url = {https://doi.org/10.1504/IJES.2017.10004397}, doi = {10.1504/IJES.2017.10004397}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ZhangM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgi/MaoWNXW17, author = {Jian Mao and Shandong Wang and Jianhua Ni and Changbai Xi and Jiechen Wang}, title = {Management System for Dam-Break Hazard Mapping in a Complex Basin Environment}, journal = {{ISPRS} Int. J. Geo Inf.}, volume = {6}, number = {6}, pages = {162}, year = {2017}, url = {https://doi.org/10.3390/ijgi6060162}, doi = {10.3390/IJGI6060162}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgi/MaoWNXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaoTZCMBLZ17, author = {Jian Mao and Wenqian Tian and Yan Zhang and Jian Cui and Hanjun Ma and Jingdong Bian and Jianwei Liu and Jianhong Zhang}, title = {Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment}, journal = {Secur. Commun. Networks}, volume = {2017}, pages = {2948025:1--2948025:13}, year = {2017}, url = {https://doi.org/10.1155/2017/2948025}, doi = {10.1155/2017/2948025}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaoTZCMBLZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/MaoCSJL17, author = {Jian Mao and Yue Chen and Futian Shi and Yaoqi Jia and Zhenkai Liang}, title = {Toward Exposing Timing-Based Probing Attacks in Web Applications}, journal = {Sensors}, volume = {17}, number = {3}, pages = {464}, year = {2017}, url = {https://doi.org/10.3390/s17030464}, doi = {10.3390/S17030464}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/MaoCSJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soco/MaoZLLWL17, author = {Jian Mao and Yan Zhang and Pei Li and Teng Li and Qianhong Wu and Jianwei Liu}, title = {A position-aware Merkle tree for dynamic cloud data integrity verification}, journal = {Soft Comput.}, volume = {21}, number = {8}, pages = {2151--2164}, year = {2017}, url = {https://doi.org/10.1007/s00500-015-1918-8}, doi = {10.1007/S00500-015-1918-8}, timestamp = {Tue, 03 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soco/MaoZLLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlsisp/WangLCLM17, author = {Mengmeng Wang and Jianwei Liu and Jie Chen and Xiao Liu and Jian Mao}, title = {{PERM-GUARD:} Authenticating the Validity of Flow Rules in Software Defined Networking}, journal = {J. Signal Process. Syst.}, volume = {86}, number = {2-3}, pages = {157--173}, year = {2017}, url = {https://doi.org/10.1007/s11265-016-1115-8}, doi = {10.1007/S11265-016-1115-8}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/vlsisp/WangLCLM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/MaoCL17, author = {Jian Mao and Zheng Leong Chua and Zhenkai Liang}, title = {Enabling practical experimentation in cyber-security training}, booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017, Taipei, Taiwan, August 7-10, 2017}, pages = {516--517}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/DESEC.2017.8073870}, doi = {10.1109/DESEC.2017.8073870}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/desec/MaoCL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/TianMJHZL17, author = {Wenqian Tian and Jian Mao and Jingbo Jiang and Zhaoyuan He and Zhihong Zhou and Jianwei Liu}, editor = {Rongfang Bie and Yunchuan Sun and Jiguo Yu}, title = {Deeply Understanding Structure-based Social Network De-anonymization}, booktitle = {2017 International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2017, Shandong, China, October 19-21, 2017}, series = {Procedia Computer Science}, volume = {129}, pages = {52--58}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.procs.2018.03.045}, doi = {10.1016/J.PROCS.2018.03.045}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/TianMJHZL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/MaoBTZWLL17, author = {Jian Mao and Jingdong Bian and Wenqian Tian and Shishi Zhu and Tao Wei and Aili Li and Zhenkai Liang}, editor = {Rongfang Bie and Yunchuan Sun and Jiguo Yu}, title = {Detecting Phishing Websites via Aggregation Analysis of Page Layouts}, booktitle = {2017 International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2017, Shandong, China, October 19-21, 2017}, series = {Procedia Computer Science}, volume = {129}, pages = {224--230}, publisher = {Elsevier}, year = {2017}, url = {https://doi.org/10.1016/j.procs.2018.03.053}, doi = {10.1016/J.PROCS.2018.03.053}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/MaoBTZWLL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pac/XiaoBMLC17, author = {Yinhao Xiao and Guangdong Bai and Jian Mao and Zhenkai Liang and Wei Cheng}, title = {Privilege Leakage and Information Stealing through the Android Task Mechanism}, booktitle = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington, DC, USA, August 1-4, 2017}, pages = {152--163}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.29}, doi = {10.1109/PAC.2017.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pac/XiaoBMLC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/MaoTLWL17, author = {Jian Mao and Wenqian Tian and Pei Li and Tao Wei and Zhenkai Liang}, editor = {Liran Ma and Abdallah Khreishah and Yan Zhang and Mingyuan Yan}, title = {Phishing Website Detection Based on Effective {CSS} Features of Web Pages}, booktitle = {Wireless Algorithms, Systems, and Applications - 12th International Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10251}, pages = {804--815}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60033-8\_68}, doi = {10.1007/978-3-319-60033-8\_68}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/wasa/MaoTLWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhangLM16, author = {Jianhong Zhang and Pengyan Li and Jian Mao}, title = {IPad: ID-based public auditing for the outsourced data in the standard model}, journal = {Clust. Comput.}, volume = {19}, number = {1}, pages = {127--138}, year = {2016}, url = {https://doi.org/10.1007/s10586-015-0511-3}, doi = {10.1007/S10586-015-0511-3}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhangLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhangM16, author = {Jianhong Zhang and Jian Mao}, title = {Efficient public key encryption with revocable keyword search in cloud computing}, journal = {Clust. Comput.}, volume = {19}, number = {3}, pages = {1211--1217}, year = {2016}, url = {https://doi.org/10.1007/s10586-016-0584-7}, doi = {10.1007/S10586-016-0584-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangWWQMD16, author = {Yujue Wang and Qianhong Wu and Duncan S. Wong and Bo Qin and Jian Mao and Yong Ding}, title = {Provably secure robust optimistic fair exchange of distributed signatures}, journal = {Future Gener. Comput. Syst.}, volume = {62}, pages = {29--39}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.03.012}, doi = {10.1016/J.FUTURE.2016.03.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/WangWWQMD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/MaoWCJ16, author = {Jian Mao and Ruilong Wang and Yue Chen and Yaoqi Jia}, title = {Detecting injected behaviors in HTML5-based Android applications}, journal = {J. High Speed Networks}, volume = {22}, number = {1}, pages = {15--34}, year = {2016}, url = {https://doi.org/10.3233/JHS-160534}, doi = {10.3233/JHS-160534}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/MaoWCJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/MaoMCJL16, author = {Jian Mao and Hanjun Ma and Yue Chen and Yaoqi Jia and Zhenkai Liang}, title = {Automatic permission inference for hybrid mobile apps}, journal = {J. High Speed Networks}, volume = {22}, number = {1}, pages = {55--64}, year = {2016}, url = {https://doi.org/10.3233/JHS-160538}, doi = {10.3233/JHS-160538}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jhsn/MaoMCJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZhangM16, author = {Jianhong Zhang and Jian Mao}, title = {Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model}, journal = {J. Inf. Sci. Eng.}, volume = {32}, number = {4}, pages = {1097--1112}, year = {2016}, url = {http://www.iis.sinica.edu.tw/page/jise/2016/201607\_15.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ZhangM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZM16, author = {Jianhong Zhang and Xubing Zhao and Jian Mao}, title = {Attack on Chen \emph{et al.}'s certificateless aggregate signature scheme}, journal = {Secur. Commun. Networks}, volume = {9}, number = {1}, pages = {54--59}, year = {2016}, url = {https://doi.org/10.1002/sec.1380}, doi = {10.1002/SEC.1380}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bdcloud/WangLMCC16, author = {Mengmeng Wang and Jianwei Liu and Jian Mao and Haosu Cheng and Jie Chen}, editor = {Zhipeng Cai and Rafal A. Angryk and Wen{-}Zhan Song and Yingshu Li and Xiaojun Cao and Anu G. Bourgeois and Guangchun Luo and Liang Cheng and Bhaskar Krishnamachari}, title = {{NSV-GUARD:} Constructing Secure Routing Paths in Software Defined Networking}, booktitle = {2016 {IEEE} International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sustainable Computing and Communications (SustainCom), BDCloud-SocialCom-SustainCom 2016, Atlanta, GA, USA, October 8-10, 2016}, pages = {293--300}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.52}, doi = {10.1109/BDCLOUD-SOCIALCOM-SUSTAINCOM.2016.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bdcloud/WangLMCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/ZhangLM16, author = {Jianhong Zhang and Shuai Liu and Jian Mao}, editor = {Yaoli Wang and Jiancheng An and Lipo Wang and Qingli Li and Gaowei Van and Qing Chang}, title = {On the security of a dynamic-hash-table based public auditing protocol}, booktitle = {9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2016, Datong, China, October 15-17, 2016}, pages = {1954--1958}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CISP-BMEI.2016.7853038}, doi = {10.1109/CISP-BMEI.2016.7853038}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/ZhangLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccse2/LiuML16, author = {Jinming Liu and Jian Mao and Peiguo Liu}, title = {Design and implement of a {MCU} based random number generater}, booktitle = {11th International Conference on Computer Science {\&} Education, {ICCSE} 2016, Nagoya, Japan, August 23-25, 2016}, pages = {945--948}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/ICCSE.2016.7581710}, doi = {10.1109/ICCSE.2016.7581710}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iccse2/LiuML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iiki/MaoWCXJL16, author = {Jian Mao and Ruilong Wang and Yue Chen and Yinhao Xiao and Yaoqi Jia and Zhenkai Liang}, title = {A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications}, booktitle = {International Conference on Identification, Information and Knowledge in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21, 2016}, pages = {497--505}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/IIKI.2016.2}, doi = {10.1109/IIKI.2016.2}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iiki/MaoWCXJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangLSM16, author = {Jianhong Zhang and Pengyan Li and Zhibin Sun and Jian Mao}, editor = {Liqun Chen and Jinguang Han}, title = {ID-based Data Integrity Auditing Scheme from {RSA} with Resisting Key Exposure}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {83--100}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_5}, doi = {10.1007/978-3-319-47422-9\_5}, timestamp = {Wed, 14 Jul 2021 15:56:25 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhangLSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/MaoCSJL16, author = {Jian Mao and Yue Chen and Futian Shi and Yaoqi Jia and Zhenkai Liang}, editor = {Qing Yang and Wei Yu and Yacine Challal}, title = {Toward Exposing Timing-Based Probing Attacks in Web Applications}, booktitle = {Wireless Algorithms, Systems, and Applications - 11th International Conference, {WASA} 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9798}, pages = {499--510}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42836-9\_44}, doi = {10.1007/978-3-319-42836-9\_44}, timestamp = {Mon, 30 Jan 2023 09:32:36 +0100}, biburl = {https://dblp.org/rec/conf/wasa/MaoCSJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/MaoCZMZ16, author = {Jian Mao and Jian Cui and Yan Zhang and Hanjun Ma and Jianhong Zhang}, editor = {Qing Yang and Wei Yu and Yacine Challal}, title = {Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment}, booktitle = {Wireless Algorithms, Systems, and Applications - 11th International Conference, {WASA} 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9798}, pages = {511--523}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42836-9\_45}, doi = {10.1007/978-3-319-42836-9\_45}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/MaoCZMZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cis/MaoL15, author = {Jian Mao and Jinming Liu}, title = {Information Leakage from Computer Based on electromagnetic radiation}, journal = {Control. Intell. Syst.}, volume = {43}, number = {2}, year = {2015}, url = {https://doi.org/10.2316/Journal.201.2015.2.201-2699}, doi = {10.2316/JOURNAL.201.2015.2.201-2699}, timestamp = {Tue, 11 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cis/MaoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiaCDSML15, author = {Yaoqi Jia and Yue Chen and Xinshu Dong and Prateek Saxena and Jian Mao and Zhenkai Liang}, title = {Man-in-the-browser-cache: Persisting {HTTPS} attacks via browser cache poisoning}, journal = {Comput. Secur.}, volume = {55}, pages = {62--80}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.07.004}, doi = {10.1016/J.COSE.2015.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiaCDSML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ZhangM15, author = {Jianhong Zhang and Jian Mao}, title = {An improved anonymous multi-receiver identity-based encryption scheme}, journal = {Int. J. Commun. Syst.}, volume = {28}, number = {4}, pages = {645--658}, year = {2015}, url = {https://doi.org/10.1002/dac.2693}, doi = {10.1002/DAC.2693}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ZhangM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpcn/LiMCLC15, author = {Teng Li and Jian Mao and Yue Chen and Pei Li and Jie Chen}, title = {Rating cloud storage service by collaborative remote data checking}, journal = {Int. J. High Perform. Comput. Netw.}, volume = {8}, number = {2}, pages = {144--153}, year = {2015}, url = {https://doi.org/10.1504/IJHPCN.2015.070014}, doi = {10.1504/IJHPCN.2015.070014}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpcn/LiMCLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijufks/GuoMCL15, author = {Jifa Guo and Jian Mao and Tiejun Cui and Chongwei Li}, title = {A Multi-Scale Fuzzy Spatial Analysis Framework for Large Data Based on {IT2} {FS}}, journal = {Int. J. Uncertain. Fuzziness Knowl. Based Syst.}, volume = {23}, number = {1}, pages = {73--104}, year = {2015}, url = {https://doi.org/10.1142/S021848851550004X}, doi = {10.1142/S021848851550004X}, timestamp = {Thu, 18 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijufks/GuoMCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscloud/WangLCLM15, author = {Mengmeng Wang and Jianwei Liu and Jie Chen and Xiao Liu and Jian Mao}, title = {{PERM-GUARD:} Authenticating the Validity of Flow Rules in Software Defined Networking}, booktitle = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing, CSCloud 2015, New York, NY, USA, November 3-5, 2015}, pages = {127--132}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CSCloud.2015.89}, doi = {10.1109/CSCLOUD.2015.89}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cscloud/WangLCLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/ChengYTMLLW15, author = {Hua Cheng and Wen Yang and Rongsheng Tang and Jian Mao and Qian Luo and Chuan Li and Ang Wang}, title = {Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systems}, booktitle = {12th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2015, Zhangjiajie, China, August 15-17, 2015}, pages = {1908--1912}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/FSKD.2015.7382239}, doi = {10.1109/FSKD.2015.7382239}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/fskd/ChengYTMLLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcity/ZhangLM15, author = {Jianhong Zhang and Pengyan Li and Jian Mao}, title = {An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing}, booktitle = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2 2015, Chengdu, China, December 19-21, 2015}, pages = {996--1002}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SmartCity.2015.200}, doi = {10.1109/SMARTCITY.2015.200}, timestamp = {Thu, 13 Apr 2023 12:52:26 +0200}, biburl = {https://dblp.org/rec/conf/smartcity/ZhangLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/ZhangTM14, author = {Jianhong Zhang and Wenjing Tang and Jian Mao}, title = {Efficient public verification proof of retrievability scheme in cloud}, journal = {Clust. Comput.}, volume = {17}, number = {4}, pages = {1401--1411}, year = {2014}, url = {https://doi.org/10.1007/s10586-014-0394-8}, doi = {10.1007/S10586-014-0394-8}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/ZhangTM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/DengWQMLZS14, author = {Hua Deng and Qianhong Wu and Bo Qin and Jian Mao and Xiao Liu and Lei Zhang and Wenchang Shi}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Who Is Touching My Cloud}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {362--379}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_21}, doi = {10.1007/978-3-319-11203-9\_21}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/DengWQMLZS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiMWZW14, author = {Pei Li and Jian Mao and Ruilong Wang and Lihua Zhang and Tao Wei}, editor = {Xinyi Huang and Jianying Zhou}, title = {A Website Credibility Assessment Scheme Based on Page Association}, booktitle = {Information Security Practice and Experience - 10th International Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8434}, pages = {105--118}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06320-1\_9}, doi = {10.1007/978-3-319-06320-1\_9}, timestamp = {Fri, 09 Apr 2021 18:45:22 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiMWZW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/HeLMC14, author = {Shuangyu He and Jianwei Liu and Jian Mao and Jie Chen}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Hierarchical Solution for Access Control and Authentication in Software Defined Networks}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {70--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_6}, doi = {10.1007/978-3-319-11698-3\_6}, timestamp = {Thu, 14 Oct 2021 10:08:32 +0200}, biburl = {https://dblp.org/rec/conf/nss/HeLMC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/ZhangMX13, author = {Jianhong Zhang and Jian Mao and Yuwei Xu}, title = {On the security of an ID-based anonymous proxy signature scheme and its improved scheme}, journal = {Int. J. Embed. Syst.}, volume = {5}, number = {3}, pages = {181--188}, year = {2013}, url = {https://doi.org/10.1504/IJES.2013.057082}, doi = {10.1504/IJES.2013.057082}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/ZhangMX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceccs/DongPML13, author = {Xinshu Dong and Kailas Patil and Jian Mao and Zhenkai Liang}, title = {A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications}, booktitle = {2013 18th International Conference on Engineering of Complex Computer Systems, Singapore, July 17-19, 2013}, pages = {177--187}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICECCS.2013.35}, doi = {10.1109/ICECCS.2013.35}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iceccs/DongPML13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/MaoDLWL13, author = {Jian Mao and Xinshu Dong and Pei Li and Tao Wei and Zhenkai Liang}, editor = {Sihan Qing and Jianying Zhou and Dongmei Liu}, title = {Rating Web Pages Using Page-Transition Evidence}, booktitle = {Information and Communications Security - 15th International Conference, {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8233}, pages = {49--58}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02726-5\_4}, doi = {10.1007/978-3-319-02726-5\_4}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/MaoDLWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/DengQDZWLM13, author = {Hua Deng and Bo Qin and Ruiying Du and Huanguo Zhang and Lina Wang and Jianwei Liu and Jian Mao}, title = {Finding Key Leakage in Hierarchical Distribution of Encrypted Data}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {780--785}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.149}, doi = {10.1109/INCOS.2013.149}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/DengQDZWLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/MaoLLWL13, author = {Jian Mao and Pei Li and Kun Li and Tao Wei and Zhenkai Liang}, title = {BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {790--795}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.151}, doi = {10.1109/INCOS.2013.151}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/MaoLLWL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/MaoZXLW12, author = {Jian Mao and Yan Zhang and Xiandong Xu and Jianwei Liu and Tao Wei}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {{ET-DMD:} An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {365--372}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.67}, doi = {10.1109/INCOS.2012.67}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/incos/MaoZXLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/candie/MaoLG11, author = {Jian Mao and Shiqing Liu and Zhu Gao}, title = {Three-axis {NC} milling simulation based on adaptive triangular mesh}, journal = {Comput. Ind. Eng.}, volume = {60}, number = {1}, pages = {1--6}, year = {2011}, url = {https://doi.org/10.1016/j.cie.2010.06.016}, doi = {10.1016/J.CIE.2010.06.016}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/candie/MaoLG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/ZhangM11, author = {Jianhong Zhang and Jian Mao}, title = {Another Efficient Proxy Signature Scheme in the Standard Model}, journal = {J. Inf. Sci. Eng.}, volume = {27}, number = {4}, pages = {1249--1264}, year = {2011}, url = {http://www.iis.sinica.edu.tw/page/jise/2011/201107\_04.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/ZhangM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic/ZhangMY11, author = {Peilin Zhang and Jian Mao and Ziwen Yuan}, editor = {Dehuai Zeng}, title = {Research on Yangtze River Dangerous Articles Logistics Port Hierarchical Layout Evaluation of Jiangsu Province Based on Disaster Theory}, booktitle = {Applied Informatics and Communication - International Conference, {ICAIC} 2011, Xi'an, China, August 20-21, 2011, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {225}, pages = {50--58}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23220-6\_7}, doi = {10.1007/978-3-642-23220-6\_7}, timestamp = {Fri, 19 May 2017 01:26:23 +0200}, biburl = {https://dblp.org/rec/conf/icaic/ZhangMY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/services/BohnMLTM11, author = {Robert B. Bohn and John Messina and Fang Liu and Jin Tong and Jian Mao}, title = {{NIST} Cloud Computing Reference Architecture}, booktitle = {World Congress on Services, {SERVICES} 2011, Washington, DC, USA, July 4-9, 2011}, pages = {594--596}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SERVICES.2011.105}, doi = {10.1109/SERVICES.2011.105}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/services/BohnMLTM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhangM09, author = {Jianhong Zhang and Jian Mao}, title = {A novel identity-based multi-signcryption scheme}, journal = {Comput. Commun.}, volume = {32}, number = {1}, pages = {14--18}, year = {2009}, url = {https://doi.org/10.1016/j.comcom.2008.07.004}, doi = {10.1016/J.COMCOM.2008.07.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ZhangM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LinVM08, author = {Zihuai Lin and Branka Vucetic and Jian Mao}, title = {Ergodic Capacity of {LTE} Downlink Multiuser {MIMO} Systems}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2008, Beijing, China, 19-23 May 2008}, pages = {3345--3349}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ICC.2008.629}, doi = {10.1109/ICC.2008.629}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/LinVM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/WeiMZC07, author = {Tao Wei and Jian Mao and Wei Zou and Yu Chen}, title = {Structuring 2-way Branches in Binary Executables}, booktitle = {31st Annual International Computer Software and Applications Conference, {COMPSAC} 2007, Beijing, China, July 24-27, 2007. Volume 1}, pages = {115--118}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/COMPSAC.2007.203}, doi = {10.1109/COMPSAC.2007.203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/WeiMZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ZhangM07, author = {Jianhong Zhang and Jian Mao}, editor = {Ed Dawson and Duncan S. Wong}, title = {A Novel Verifiably Encrypted Signature Scheme Without Random Oracle}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {65--78}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_7}, doi = {10.1007/978-3-540-72163-5\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ZhangM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sas/WeiMZC07, author = {Tao Wei and Jian Mao and Wei Zou and Yu Chen}, editor = {Hanne Riis Nielson and Gilberto Fil{\'{e}}}, title = {A New Algorithm for Identifying Loops in Decompilation}, booktitle = {Static Analysis, 14th International Symposium, {SAS} 2007, Kongens Lyngby, Denmark, August 22-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4634}, pages = {170--183}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74061-2\_11}, doi = {10.1007/978-3-540-74061-2\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/sas/WeiMZC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ZhangM06, author = {Jianhong Zhang and Jian Mao}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Linkability Analysis of Some Blind Signature Schemes}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {556--566}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_58}, doi = {10.1007/978-3-540-74377-4\_58}, timestamp = {Tue, 19 Nov 2019 12:34:54 +0100}, biburl = {https://dblp.org/rec/conf/cis/ZhangM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/JiMZC95, author = {Xian Ji and Jian Mao and Ali Zhu and Shixin Cheng}, title = {Sliding-exponential window {RLS} algorithm and its square-root method's {DFE} for the {TDMA} digital mobile radio}, booktitle = {The 6th {IEEE} International Symposium on Personal, Indoor and Mobile Radio Communications, {PIMRC} 1995, Toronto, ON, Canada, September 27-29, 1995}, pages = {223--227}, year = {1995}, url = {https://doi.org/10.1109/PIMRC.1995.476888}, doi = {10.1109/PIMRC.1995.476888}, timestamp = {Thu, 04 Jun 2020 15:17:53 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/JiMZC95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.