BibTeX records: Jian Mao

download as .bib file

@article{DBLP:journals/iotj/MaoLZML24,
  author       = {Jian Mao and
                  Qixiao Lin and
                  Shishi Zhu and
                  Liran Ma and
                  Jianwei Liu},
  title        = {SmartTracer: Anomaly-Driven Provenance Analysis Based on Device Correlation
                  in Smart Home Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {11},
  number       = {4},
  pages        = {5731--5744},
  year         = {2024},
  url          = {https://doi.org/10.1109/JIOT.2023.3308089},
  doi          = {10.1109/JIOT.2023.3308089},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/MaoLZML24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/YouMLH24,
  author       = {Xingye You and
                  Jian Mao and
                  Jingming Liu and
                  Kai Huang},
  title        = {Denoising low {SNR} electromagnetic conducted emissions using an improved
                  DnCNN based mode},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {46},
  number       = {2},
  pages        = {5249--5261},
  year         = {2024},
  url          = {https://doi.org/10.3233/jifs-232371},
  doi          = {10.3233/JIFS-232371},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/YouMLH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bigdatama/MaoXLML23,
  author       = {Jian Mao and
                  Xiaohe Xu and
                  Qixiao Lin and
                  Liran Ma and
                  Jianwei Liu},
  title        = {EScope: Effective Event Validation for IoT Systems Based on State
                  Correlation},
  journal      = {Big Data Min. Anal.},
  volume       = {6},
  number       = {2},
  pages        = {218--233},
  year         = {2023},
  url          = {https://doi.org/10.26599/bdma.2022.9020034},
  doi          = {10.26599/BDMA.2022.9020034},
  timestamp    = {Tue, 16 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bigdatama/MaoXLML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/ChenLM23,
  author       = {Yang Chen and
                  Jinming Liu and
                  Jian Mao},
  title        = {Blind source separation of electromagnetic signals based on deep focusing
                  U-Net},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {45},
  number       = {5},
  pages        = {9157--9167},
  year         = {2023},
  url          = {https://doi.org/10.3233/jifs-223568},
  doi          = {10.3233/JIFS-223568},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/ChenLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/npl/GuoMZ23,
  author       = {Yurong Guo and
                  Jian Mao and
                  Man Zhao},
  title        = {Rolling Bearing Fault Diagnosis Method Based on Attention {CNN} and
                  BiLSTM Network},
  journal      = {Neural Process. Lett.},
  volume       = {55},
  number       = {3},
  pages        = {3377--3410},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11063-022-11013-2},
  doi          = {10.1007/S11063-022-11013-2},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/npl/GuoMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiaoJCWML23,
  author       = {Yinhao Xiao and
                  Yizhen Jia and
                  Xiuzhen Cheng and
                  Shengling Wang and
                  Jian Mao and
                  Zhenkai Liang},
  title        = {I Know Your Social Network Accounts: {A} Novel Attack Architecture
                  for Device-Identity Association},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {2},
  pages        = {1017--1030},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3147785},
  doi          = {10.1109/TDSC.2022.3147785},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XiaoJCWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/ZhouLWMLBWLWZ23,
  author       = {Zequan Zhou and
                  Xiling Luo and
                  Yupeng Wang and
                  Jian Mao and
                  Feixiang Luo and
                  Yi Bai and
                  Xiaochao Wang and
                  Gang Liu and
                  Junjun Wang and
                  Feng Zeng},
  title        = {A Practical Data Audit Scheme With Retrievability and Indistinguishable
                  Privacy-Preserving for Vehicular Cloud Computing},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {72},
  number       = {12},
  pages        = {16592--16606},
  year         = {2023},
  url          = {https://doi.org/10.1109/TVT.2023.3295953},
  doi          = {10.1109/TVT.2023.3295953},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvt/ZhouLWMLBWLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/QiM23,
  author       = {Guorong Qi and
                  Jian Mao},
  title        = {An Improved {CNN-LSTM} Algorithm for Detection of {DGA} Domain Name},
  booktitle    = {Proceedings of the 2023 7th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2023, Xiamen,
                  China, October 20-22, 2023},
  pages        = {1293--1298},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3650400.3650618},
  doi          = {10.1145/3650400.3650618},
  timestamp    = {Fri, 19 Apr 2024 08:09:03 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/QiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ricai/CaoCWMX23,
  author       = {Ceyao Cao and
                  Lei Chcn and
                  Yi Wu and
                  Jian Mao and
                  Jie Xu},
  title        = {Fast Algorithm for {VVC} Video Image Coding Based on Machine Learning},
  booktitle    = {5th International Conference on Robotics, Intelligent Control and
                  Artificial Intelligence, {RICAI} 2023, Hangzhou, China, December 1-3,
                  2023},
  pages        = {1147--1151},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/RICAI60863.2023.10489208},
  doi          = {10.1109/RICAI60863.2023.10489208},
  timestamp    = {Sat, 20 Apr 2024 12:53:27 +0200},
  biburl       = {https://dblp.org/rec/conf/ricai/CaoCWMX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijon/MaoLLL22,
  author       = {Jian Mao and
                  Xiang Li and
                  Xiling Luo and
                  Qixiao Lin},
  title        = {SybilHunter: Hybrid graph-based sybil detection by aggregating user
                  behaviors},
  journal      = {Neurocomputing},
  volume       = {500},
  pages        = {295--306},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.neucom.2021.07.106},
  doi          = {10.1016/J.NEUCOM.2021.07.106},
  timestamp    = {Fri, 01 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijon/MaoLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MaoLLL22,
  author       = {Jian Mao and
                  Ziwen Liu and
                  Qixiao Lin and
                  Zhenkai Liang},
  title        = {Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems
                  of Asian Symbol Languages},
  journal      = {{IEEE} Internet Things J.},
  volume       = {9},
  number       = {12},
  pages        = {9151--9166},
  year         = {2022},
  url          = {https://doi.org/10.1109/JIOT.2021.3113645},
  doi          = {10.1109/JIOT.2021.3113645},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/MaoLLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HeZMMKJZ22,
  author       = {Jialing He and
                  Zijian Zhang and
                  Jian Mao and
                  Liran Ma and
                  Bakh Khoussainov and
                  Rui Jin and
                  Liehuang Zhu},
  title        = {Video Aficionado: We Know What You Are Watching},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {8},
  pages        = {3041--3052},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2020.3045730},
  doi          = {10.1109/TMC.2020.3045730},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/HeZMMKJZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/HuangCMZZ22,
  author       = {Jianyu Huang and
                  Nanting Cai and
                  Jian Mao and
                  Jialin Zhang and
                  Xiaochun Zhao},
  title        = {A denoising method based on {CNN} through multi-layer separation},
  booktitle    = {Proceedings of the 2022 6th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2022, Xiamen,
                  China, October 21-23, 2022},
  pages        = {361--366},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573428.3573490},
  doi          = {10.1145/3573428.3573490},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/HuangCMZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/Zeng0M22,
  author       = {Yongjin Zeng and
                  Jie Chen and
                  Jian Mao},
  title        = {Deep Learning-based Road Crack Detection Technology},
  booktitle    = {Proceedings of the 2022 6th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2022, Xiamen,
                  China, October 21-23, 2022},
  pages        = {580--584},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573428.3573530},
  doi          = {10.1145/3573428.3573530},
  timestamp    = {Thu, 24 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/Zeng0M22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/0050ZM22,
  author       = {Jie Chen and
                  Yongjin Zeng and
                  Jian Mao},
  title        = {Key Technologies of Electronic Perimeter System Based on Deep Learning},
  booktitle    = {Proceedings of the 2022 6th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2022, Xiamen,
                  China, October 21-23, 2022},
  pages        = {623--626},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573428.3573538},
  doi          = {10.1145/3573428.3573538},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/0050ZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/ChenLM22,
  author       = {Yang Chen and
                  Jinming Liu and
                  Jian Mao},
  title        = {Blind source separation of electromagnetic signals based on one-dimensional
                  U-Net},
  booktitle    = {Proceedings of the 2022 6th International Conference on Electronic
                  Information Technology and Computer Engineering, {EITCE} 2022, Xiamen,
                  China, October 21-23, 2022},
  pages        = {1597--1602},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3573428.3573709},
  doi          = {10.1145/3573428.3573709},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/ChenLM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaoHC21,
  author       = {Jian Mao and
                  Junyang Han and
                  Tiejun Cui},
  title        = {Development and Assessment of Improved Global Pressure and Temperature
                  Series Models},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {104429--104447},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3099255},
  doi          = {10.1109/ACCESS.2021.3099255},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaoHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaoHC21a,
  author       = {Jian Mao and
                  Junyang Han and
                  Tiejun Cui},
  title        = {Development of a New Tabular Zenith Tropospheric Delay Model for Real-Time
                  {GNSS} Applications},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {112837--112849},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3104023},
  doi          = {10.1109/ACCESS.2021.3104023},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaoHC21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/MaoLZHS21,
  author       = {Jian Mao and
                  Jinming Liu and
                  Jiemin Zhang and
                  Zhen{-}zhong Han and
                  Sen Shi},
  title        = {A method for detecting image information leakage risk from electromagnetic
                  emission of computer monitors},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {40},
  number       = {2},
  pages        = {2981--2991},
  year         = {2021},
  url          = {https://doi.org/10.3233/JIFS-189337},
  doi          = {10.3233/JIFS-189337},
  timestamp    = {Tue, 09 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/MaoLZHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/MaoYZ21,
  author       = {Jian Mao and
                  Yitong Yang and
                  Tianchen Zhang},
  title        = {Empirical Analysis of Attribute Inference Techniques in Online Social
                  Network},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {881--893},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3009864},
  doi          = {10.1109/TNSE.2020.3009864},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/MaoYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZengCCJLM21,
  author       = {Jun Zeng and
                  Zheng Leong Chua and
                  Yinfang Chen and
                  Kaihang Ji and
                  Zhenkai Liang and
                  Jian Mao},
  title        = {{WATSON:} Abstracting Behaviors from Audit Logs via Aggregation of
                  Contextual Semantics},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/watson-abstracting-behaviors-from-audit-logs-via-aggregation-of-contextual-semantics/},
  timestamp    = {Thu, 17 Jun 2021 15:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/ZengCCJLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/YangLML21,
  author       = {Yitong Yang and
                  Qixiao Lin and
                  Jian Mao and
                  Lipei Liu},
  title        = {An improved social attribute inference scheme based on multi-attribute
                  correlation},
  booktitle    = {2021 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/IOP/SCI),
                  Atlanta, GA, USA, October 18-21, 2021},
  pages        = {370--377},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SWC50871.2021.00057},
  doi          = {10.1109/SWC50871.2021.00057},
  timestamp    = {Fri, 03 Dec 2021 17:36:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/YangLML21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XieJHCM20,
  author       = {Guangmin Xie and
                  Zhongyuan Jiang and
                  Mingxing He and
                  Xiaoliang Chen and
                  Jian Mao},
  title        = {A Minimum Capacity Optimization Scheme for Airport Terminals During
                  Peak Periods},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {103759--103771},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2999074},
  doi          = {10.1109/ACCESS.2020.2999074},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XieJHCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/ChengLXRMZ20,
  author       = {Haosu Cheng and
                  Jianwei Liu and
                  Tongge Xu and
                  Bohan Ren and
                  Jian Mao and
                  Wei Zhang},
  title        = {Machine learning based low-rate DDoS attack detection for {SDN} enabled
                  IoT networks},
  journal      = {Int. J. Sens. Networks},
  volume       = {34},
  number       = {1},
  pages        = {56--69},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJSNET.2020.109720},
  doi          = {10.1504/IJSNET.2020.109720},
  timestamp    = {Tue, 20 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/ChengLXRMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/MaoZDLL20,
  author       = {Jian Mao and
                  Shishi Zhu and
                  Xuan Dai and
                  Qixiao Lin and
                  Jianwei Liu},
  title        = {Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart
                  Home Systems},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {9},
  pages        = {8025--8035},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2020.2997779},
  doi          = {10.1109/JIOT.2020.2997779},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/MaoZDLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/MaoZL20,
  author       = {Jian Mao and
                  Shishi Zhu and
                  Jianwei Liu},
  title        = {An inaudible voice attack to context-based device authentication in
                  smart IoT systems},
  journal      = {J. Syst. Archit.},
  volume       = {104},
  pages        = {101696},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.sysarc.2019.101696},
  doi          = {10.1016/J.SYSARC.2019.101696},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/MaoZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/MaoZTG20,
  author       = {Jian Mao and
                  Jiemin Zhang and
                  Zhi Tang and
                  Zhiling Gu},
  title        = {{DNS} anti-attack machine learning model for {DGA} domain name detection},
  journal      = {Phys. Commun.},
  volume       = {40},
  pages        = {101069},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.phycom.2020.101069},
  doi          = {10.1016/J.PHYCOM.2020.101069},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/phycomm/MaoZTG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cipae/LuTMGZ20,
  author       = {Jinping Lu and
                  Zhi Tang and
                  Jian Mao and
                  Zhiling Gu and
                  Jiemin Zhang},
  title        = {Mixed-Models Method Based on Machine Learning in Detecting WebShell
                  Attack},
  booktitle    = {{CIPAE} 2020: 2020 International Conference on Computers, Information
                  Processing and Advanced Education, Ottawa, ON, Canada, October 16-18,
                  2020},
  pages        = {251--259},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3419635.3419716},
  doi          = {10.1145/3419635.3419716},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cipae/LuTMGZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/ZhangM20,
  author       = {Xueming Zhang and
                  Jian Mao},
  title        = {Research on image enhancement algorithm based on Retinex theory},
  booktitle    = {{EITCE} 2020: 4th International Conference on Electronic Information
                  Technology and Computer Engineering, Xiamen, China, 6 November, 2020
                  - 8 November, 2020},
  pages        = {361--365},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3443467.3443782},
  doi          = {10.1145/3443467.3443782},
  timestamp    = {Fri, 04 Aug 2023 10:04:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/ZhangM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/HuM20,
  author       = {Tao Hu and
                  Jian Mao},
  title        = {A Survey of Moving Target Detection Methods Based on Machine Vision},
  booktitle    = {{EITCE} 2020: 4th International Conference on Electronic Information
                  Technology and Computer Engineering, Xiamen, China, 6 November, 2020
                  - 8 November, 2020},
  pages        = {529--533},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3443467.3443810},
  doi          = {10.1145/3443467.3443810},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/HuM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eitce/GuoM20,
  author       = {Yurong Guo and
                  Jian Mao},
  title        = {Optimization analysis of assembly system based on digital twin and
                  deep learning},
  booktitle    = {{EITCE} 2020: 4th International Conference on Electronic Information
                  Technology and Computer Engineering, Xiamen, China, 6 November, 2020
                  - 8 November, 2020},
  pages        = {627--631},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3443467.3443825},
  doi          = {10.1145/3443467.3443825},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eitce/GuoM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaoLLS19,
  author       = {Jian Mao and
                  Peiguo Liu and
                  Jinming Liu and
                  Sen Shi},
  title        = {Identification of Multi-Dimensional Electromagnetic Information Leakage
                  Using {CNN}},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {145714--145724},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2944902},
  doi          = {10.1109/ACCESS.2019.2944902},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MaoLLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaoTYL19,
  author       = {Jian Mao and
                  Wenqian Tian and
                  Yitong Yang and
                  Jianwei Liu},
  title        = {An Efficient Social Attribute Inference Scheme Based on Social Links
                  and Attribute Relevance},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {153074--153085},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2946179},
  doi          = {10.1109/ACCESS.2019.2946179},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MaoTYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/MaoBTZWLL19,
  author       = {Jian Mao and
                  Jingdong Bian and
                  Wenqian Tian and
                  Shishi Zhu and
                  Tao Wei and
                  Aili Li and
                  Zhenkai Liang},
  title        = {Phishing page detection via learning classifiers from page layout
                  feature},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2019},
  pages        = {43},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13638-019-1361-0},
  doi          = {10.1186/S13638-019-1361-0},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/MaoBTZWLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcin/MaoZBLL19,
  author       = {Jian Mao and
                  Shishi Zhu and
                  Jingdong Bian and
                  Qixiao Lin and
                  Jianwei Liu},
  title        = {Anomalous Power-Usage Behavior Detection from Smart Home Wireless
                  Communications},
  journal      = {J. Commun. Inf. Networks},
  volume       = {4},
  number       = {1},
  pages        = {13--23},
  year         = {2019},
  url          = {https://doi.org/10.23919/JCIN.2019.8916642},
  doi          = {10.23919/JCIN.2019.8916642},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcin/MaoZBLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiuYTXHXM19,
  author       = {Hu Liu and
                  Qiang Yu and
                  Yuegang Tan and
                  Wenjun Xu and
                  Bing Huang and
                  Zhichao Xie and
                  Jian Mao},
  title        = {Feasibility Study on Temperature Distribution Measurement Method of
                  Thrust Sliding Bearing Bush Based on {FBG} Quasi-Distributed Sensing},
  journal      = {Sensors},
  volume       = {19},
  number       = {14},
  pages        = {3245},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19143245},
  doi          = {10.3390/S19143245},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LiuYTXHXM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse2/ZhangMLTGL19,
  author       = {Jiemin Zhang and
                  Jian Mao and
                  Jinming Liu and
                  Zhi Tang and
                  Zhiling Gu and
                  Yongmei Liu},
  title        = {Cloud-based Multi-core Architecture against {DNS} Attacks},
  booktitle    = {14th International Conference on Computer Science {\&} Education,
                  {ICCSE} 2019, Toronto, ON, Canada, August 19-21, 2019},
  pages        = {391--393},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCSE.2019.8845508},
  doi          = {10.1109/ICCSE.2019.8845508},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccse2/ZhangMLTGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse2/LiZM19,
  author       = {Ying Li and
                  Jiong Zhang and
                  Jian Mao},
  title        = {Transforming knowledge into intelligence The research on Wisdom Class
                  Teaching Theory and Practice},
  booktitle    = {14th International Conference on Computer Science {\&} Education,
                  {ICCSE} 2019, Toronto, ON, Canada, August 19-21, 2019},
  pages        = {998--1005},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCSE.2019.8845057},
  doi          = {10.1109/ICCSE.2019.8845057},
  timestamp    = {Mon, 30 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccse2/LiZM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/LinMSZL19,
  author       = {Qixiao Lin and
                  Jian Mao and
                  Futian Shi and
                  Shishi Zhu and
                  Zhenkai Liang},
  editor       = {Edoardo S. Biagioni and
                  Yao Zheng and
                  Siyao Cheng},
  title        = {Detecting Android Side Channel Probing Attacks Based on System States},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 14th International
                  Conference, {WASA} 2019, Honolulu, HI, USA, June 24-26, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11604},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23597-0\_16},
  doi          = {10.1007/978-3-030-23597-0\_16},
  timestamp    = {Tue, 25 Jun 2019 13:02:57 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/LinMSZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaoBBWCXL18,
  author       = {Jian Mao and
                  Jingdong Bian and
                  Guangdong Bai and
                  Ruilong Wang and
                  Yue Chen and
                  Yinhao Xiao and
                  Zhenkai Liang},
  title        = {Detecting Malicious Behaviors in JavaScript Applications},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {12284--12294},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2795383},
  doi          = {10.1109/ACCESS.2018.2795383},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MaoBBWCXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangM18,
  author       = {Jianhong Zhang and
                  Jian Mao},
  title        = {On the Security of a Pairing-Free Certificateless Signcryption Scheme},
  journal      = {Comput. J.},
  volume       = {61},
  number       = {4},
  pages        = {469--471},
  year         = {2018},
  url          = {https://doi.org/10.1093/comjnl/bxx081},
  doi          = {10.1093/COMJNL/BXX081},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejwcn/MaoTJHZL18,
  author       = {Jian Mao and
                  Wenqian Tian and
                  Jingbo Jiang and
                  Zhaoyuan He and
                  Zhihong Zhou and
                  Jianwei Liu},
  title        = {Understanding structure-based social network de-anonymization techniques
                  via empirical analysis},
  journal      = {{EURASIP} J. Wirel. Commun. Netw.},
  volume       = {2018},
  pages        = {279},
  year         = {2018},
  url          = {https://doi.org/10.1186/s13638-018-1291-2},
  doi          = {10.1186/S13638-018-1291-2},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejwcn/MaoTJHZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mfc/MaoLB18,
  author       = {Jian Mao and
                  Qixiao Lin and
                  Jingdong Bian},
  title        = {Application of learning algorithms in smart home IoT system security},
  journal      = {Math. Found. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {63--76},
  year         = {2018},
  url          = {https://doi.org/10.3934/mfc.2018004},
  doi          = {10.3934/MFC.2018004},
  timestamp    = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mfc/MaoLB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuoZZMC18,
  author       = {Xiling Luo and
                  Zequan Zhou and
                  Lin Zhong and
                  Jian Mao and
                  Chaoyong Chen},
  title        = {An Effective Integrity Verification Scheme of Cloud Data Based on
                  {BLS} Signature},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {2615249:1--2615249:11},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/2615249},
  doi          = {10.1155/2018/2615249},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuoZZMC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengLMWCB18,
  author       = {Haosu Cheng and
                  Jianwei Liu and
                  Jian Mao and
                  Mengmeng Wang and
                  Jie Chen and
                  Jingdong Bian},
  title        = {A Compatible OpenFlow Platform for Enabling Security Enhancement in
                  {SDN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {8392080:1--8392080:20},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/8392080},
  doi          = {10.1155/2018/8392080},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ChengLMWCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/LiCTZLM18,
  author       = {Ruiya Li and
                  Yiyang Chen and
                  Yuegang Tan and
                  Zude Zhou and
                  Tianliang Li and
                  Jian Mao},
  title        = {Sensitivity Enhancement of FBG-Based Strain Sensor},
  journal      = {Sensors},
  volume       = {18},
  number       = {5},
  pages        = {1607},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18051607},
  doi          = {10.3390/S18051607},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/LiCTZLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/MaoBMJLJ18,
  author       = {Jian Mao and
                  Jingdong Bian and
                  Hanjun Ma and
                  Yaoqi Jia and
                  Zhenkai Liang and
                  Xuxian Jiang},
  title        = {Robust Detection of Android {UI} Similarity},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422189},
  doi          = {10.1109/ICC.2018.8422189},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/MaoBMJLJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/ChengLMW018,
  author       = {Haosu Cheng and
                  Jianwei Liu and
                  Jian Mao and
                  Mengmeng Wang and
                  Jie Chen},
  editor       = {Sriram Chellappan and
                  Wei Cheng and
                  Wei Li},
  title        = {{OSCO:} An Open Security-Enhanced Compatible OpenFlow Platform},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 13th International
                  Conference, {WASA} 2018, Tianjin, China, June 20-22, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10874},
  pages        = {66--77},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-94268-1\_6},
  doi          = {10.1007/978-3-319-94268-1\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wasa/ChengLMW018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaoTLWL17,
  author       = {Jian Mao and
                  Wenqian Tian and
                  Pei Li and
                  Tao Wei and
                  Zhenkai Liang},
  title        = {Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component
                  Similarity},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {17020--17030},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2743528},
  doi          = {10.1109/ACCESS.2017.2743528},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/MaoTLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cis/MaoLLH17,
  author       = {Jian Mao and
                  Peiguo Liu and
                  Jinming Liu and
                  Zhen{-}zhong Han},
  title        = {Method for Detecting electromagnetic Information Leakage from Computer
                  Monitor},
  journal      = {Control. Intell. Syst.},
  volume       = {45},
  number       = {1},
  year         = {2017},
  url          = {https://doi.org/10.2316/Journal.201.2017.1.201-2791},
  doi          = {10.2316/JOURNAL.201.2017.1.201-2791},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cis/MaoLLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/MaoCZXZL17,
  author       = {Jian Mao and
                  Yue Chen and
                  Yan Zhang and
                  Xiandong Xu and
                  Yajian Zhou and
                  Jianwei Liu},
  title        = {Parallel checking of content integrity in multi-cloud storage of heterogeneous
                  sensor systems},
  journal      = {Int. J. Commun. Syst.},
  volume       = {30},
  number       = {5},
  year         = {2017},
  url          = {https://doi.org/10.1002/dac.3163},
  doi          = {10.1002/DAC.3163},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/MaoCZXZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhangM17,
  author       = {Jianhong Zhang and
                  Jian Mao},
  title        = {Anonymous multi-receiver broadcast encryption scheme with strong security},
  journal      = {Int. J. Embed. Syst.},
  volume       = {9},
  number       = {2},
  pages        = {177--187},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJES.2017.10004397},
  doi          = {10.1504/IJES.2017.10004397},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ZhangM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgi/MaoWNXW17,
  author       = {Jian Mao and
                  Shandong Wang and
                  Jianhua Ni and
                  Changbai Xi and
                  Jiechen Wang},
  title        = {Management System for Dam-Break Hazard Mapping in a Complex Basin
                  Environment},
  journal      = {{ISPRS} Int. J. Geo Inf.},
  volume       = {6},
  number       = {6},
  pages        = {162},
  year         = {2017},
  url          = {https://doi.org/10.3390/ijgi6060162},
  doi          = {10.3390/IJGI6060162},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgi/MaoWNXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaoTZCMBLZ17,
  author       = {Jian Mao and
                  Wenqian Tian and
                  Yan Zhang and
                  Jian Cui and
                  Hanjun Ma and
                  Jingdong Bian and
                  Jianwei Liu and
                  Jianhong Zhang},
  title        = {Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment},
  journal      = {Secur. Commun. Networks},
  volume       = {2017},
  pages        = {2948025:1--2948025:13},
  year         = {2017},
  url          = {https://doi.org/10.1155/2017/2948025},
  doi          = {10.1155/2017/2948025},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaoTZCMBLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/MaoCSJL17,
  author       = {Jian Mao and
                  Yue Chen and
                  Futian Shi and
                  Yaoqi Jia and
                  Zhenkai Liang},
  title        = {Toward Exposing Timing-Based Probing Attacks in Web Applications},
  journal      = {Sensors},
  volume       = {17},
  number       = {3},
  pages        = {464},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17030464},
  doi          = {10.3390/S17030464},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/MaoCSJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soco/MaoZLLWL17,
  author       = {Jian Mao and
                  Yan Zhang and
                  Pei Li and
                  Teng Li and
                  Qianhong Wu and
                  Jianwei Liu},
  title        = {A position-aware Merkle tree for dynamic cloud data integrity verification},
  journal      = {Soft Comput.},
  volume       = {21},
  number       = {8},
  pages        = {2151--2164},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00500-015-1918-8},
  doi          = {10.1007/S00500-015-1918-8},
  timestamp    = {Tue, 03 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soco/MaoZLLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vlsisp/WangLCLM17,
  author       = {Mengmeng Wang and
                  Jianwei Liu and
                  Jie Chen and
                  Xiao Liu and
                  Jian Mao},
  title        = {{PERM-GUARD:} Authenticating the Validity of Flow Rules in Software
                  Defined Networking},
  journal      = {J. Signal Process. Syst.},
  volume       = {86},
  number       = {2-3},
  pages        = {157--173},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11265-016-1115-8},
  doi          = {10.1007/S11265-016-1115-8},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vlsisp/WangLCLM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/MaoCL17,
  author       = {Jian Mao and
                  Zheng Leong Chua and
                  Zhenkai Liang},
  title        = {Enabling practical experimentation in cyber-security training},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2017,
                  Taipei, Taiwan, August 7-10, 2017},
  pages        = {516--517},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/DESEC.2017.8073870},
  doi          = {10.1109/DESEC.2017.8073870},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/MaoCL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/TianMJHZL17,
  author       = {Wenqian Tian and
                  Jian Mao and
                  Jingbo Jiang and
                  Zhaoyuan He and
                  Zhihong Zhou and
                  Jianwei Liu},
  editor       = {Rongfang Bie and
                  Yunchuan Sun and
                  Jiguo Yu},
  title        = {Deeply Understanding Structure-based Social Network De-anonymization},
  booktitle    = {2017 International Conference on Identification, Information and Knowledge
                  in the Internet of Things, {IIKI} 2017, Shandong, China, October 19-21,
                  2017},
  series       = {Procedia Computer Science},
  volume       = {129},
  pages        = {52--58},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.procs.2018.03.045},
  doi          = {10.1016/J.PROCS.2018.03.045},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/TianMJHZL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/MaoBTZWLL17,
  author       = {Jian Mao and
                  Jingdong Bian and
                  Wenqian Tian and
                  Shishi Zhu and
                  Tao Wei and
                  Aili Li and
                  Zhenkai Liang},
  editor       = {Rongfang Bie and
                  Yunchuan Sun and
                  Jiguo Yu},
  title        = {Detecting Phishing Websites via Aggregation Analysis of Page Layouts},
  booktitle    = {2017 International Conference on Identification, Information and Knowledge
                  in the Internet of Things, {IIKI} 2017, Shandong, China, October 19-21,
                  2017},
  series       = {Procedia Computer Science},
  volume       = {129},
  pages        = {224--230},
  publisher    = {Elsevier},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.procs.2018.03.053},
  doi          = {10.1016/J.PROCS.2018.03.053},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/MaoBTZWLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pac/XiaoBMLC17,
  author       = {Yinhao Xiao and
                  Guangdong Bai and
                  Jian Mao and
                  Zhenkai Liang and
                  Wei Cheng},
  title        = {Privilege Leakage and Information Stealing through the Android Task
                  Mechanism},
  booktitle    = {{IEEE} Symposium on Privacy-Aware Computing, {PAC} 2017, Washington,
                  DC, USA, August 1-4, 2017},
  pages        = {152--163},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.ieeecomputersociety.org/10.1109/PAC.2017.29},
  doi          = {10.1109/PAC.2017.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pac/XiaoBMLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/MaoTLWL17,
  author       = {Jian Mao and
                  Wenqian Tian and
                  Pei Li and
                  Tao Wei and
                  Zhenkai Liang},
  editor       = {Liran Ma and
                  Abdallah Khreishah and
                  Yan Zhang and
                  Mingyuan Yan},
  title        = {Phishing Website Detection Based on Effective {CSS} Features of Web
                  Pages},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 12th International
                  Conference, {WASA} 2017, Guilin, China, June 19-21, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10251},
  pages        = {804--815},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60033-8\_68},
  doi          = {10.1007/978-3-319-60033-8\_68},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/MaoTLWL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhangLM16,
  author       = {Jianhong Zhang and
                  Pengyan Li and
                  Jian Mao},
  title        = {IPad: ID-based public auditing for the outsourced data in the standard
                  model},
  journal      = {Clust. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {127--138},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10586-015-0511-3},
  doi          = {10.1007/S10586-015-0511-3},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhangLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhangM16,
  author       = {Jianhong Zhang and
                  Jian Mao},
  title        = {Efficient public key encryption with revocable keyword search in cloud
                  computing},
  journal      = {Clust. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1211--1217},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10586-016-0584-7},
  doi          = {10.1007/S10586-016-0584-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangWWQMD16,
  author       = {Yujue Wang and
                  Qianhong Wu and
                  Duncan S. Wong and
                  Bo Qin and
                  Jian Mao and
                  Yong Ding},
  title        = {Provably secure robust optimistic fair exchange of distributed signatures},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {62},
  pages        = {29--39},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2016.03.012},
  doi          = {10.1016/J.FUTURE.2016.03.012},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangWWQMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/MaoWCJ16,
  author       = {Jian Mao and
                  Ruilong Wang and
                  Yue Chen and
                  Yaoqi Jia},
  title        = {Detecting injected behaviors in HTML5-based Android applications},
  journal      = {J. High Speed Networks},
  volume       = {22},
  number       = {1},
  pages        = {15--34},
  year         = {2016},
  url          = {https://doi.org/10.3233/JHS-160534},
  doi          = {10.3233/JHS-160534},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jhsn/MaoWCJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jhsn/MaoMCJL16,
  author       = {Jian Mao and
                  Hanjun Ma and
                  Yue Chen and
                  Yaoqi Jia and
                  Zhenkai Liang},
  title        = {Automatic permission inference for hybrid mobile apps},
  journal      = {J. High Speed Networks},
  volume       = {22},
  number       = {1},
  pages        = {55--64},
  year         = {2016},
  url          = {https://doi.org/10.3233/JHS-160538},
  doi          = {10.3233/JHS-160538},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jhsn/MaoMCJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ZhangM16,
  author       = {Jianhong Zhang and
                  Jian Mao},
  title        = {Efficient Multi-Proxy Signature Scheme with Short Length in the Standard
                  Model},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {32},
  number       = {4},
  pages        = {1097--1112},
  year         = {2016},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2016/201607\_15.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ZhangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZM16,
  author       = {Jianhong Zhang and
                  Xubing Zhao and
                  Jian Mao},
  title        = {Attack on Chen \emph{et al.}'s certificateless aggregate signature
                  scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {1},
  pages        = {54--59},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1380},
  doi          = {10.1002/SEC.1380},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bdcloud/WangLMCC16,
  author       = {Mengmeng Wang and
                  Jianwei Liu and
                  Jian Mao and
                  Haosu Cheng and
                  Jie Chen},
  editor       = {Zhipeng Cai and
                  Rafal A. Angryk and
                  Wen{-}Zhan Song and
                  Yingshu Li and
                  Xiaojun Cao and
                  Anu G. Bourgeois and
                  Guangchun Luo and
                  Liang Cheng and
                  Bhaskar Krishnamachari},
  title        = {{NSV-GUARD:} Constructing Secure Routing Paths in Software Defined
                  Networking},
  booktitle    = {2016 {IEEE} International Conferences on Big Data and Cloud Computing
                  (BDCloud), Social Computing and Networking (SocialCom), Sustainable
                  Computing and Communications (SustainCom), BDCloud-SocialCom-SustainCom
                  2016, Atlanta, GA, USA, October 8-10, 2016},
  pages        = {293--300},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BDCloud-SocialCom-SustainCom.2016.52},
  doi          = {10.1109/BDCLOUD-SOCIALCOM-SUSTAINCOM.2016.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bdcloud/WangLMCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/ZhangLM16,
  author       = {Jianhong Zhang and
                  Shuai Liu and
                  Jian Mao},
  editor       = {Yaoli Wang and
                  Jiancheng An and
                  Lipo Wang and
                  Qingli Li and
                  Gaowei Van and
                  Qing Chang},
  title        = {On the security of a dynamic-hash-table based public auditing protocol},
  booktitle    = {9th International Congress on Image and Signal Processing, BioMedical
                  Engineering and Informatics, {CISP-BMEI} 2016, Datong, China, October
                  15-17, 2016},
  pages        = {1954--1958},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISP-BMEI.2016.7853038},
  doi          = {10.1109/CISP-BMEI.2016.7853038},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/ZhangLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccse2/LiuML16,
  author       = {Jinming Liu and
                  Jian Mao and
                  Peiguo Liu},
  title        = {Design and implement of a {MCU} based random number generater},
  booktitle    = {11th International Conference on Computer Science {\&} Education,
                  {ICCSE} 2016, Nagoya, Japan, August 23-25, 2016},
  pages        = {945--948},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCSE.2016.7581710},
  doi          = {10.1109/ICCSE.2016.7581710},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iccse2/LiuML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iiki/MaoWCXJL16,
  author       = {Jian Mao and
                  Ruilong Wang and
                  Yue Chen and
                  Yinhao Xiao and
                  Yaoqi Jia and
                  Zhenkai Liang},
  title        = {A Function-Level Behavior Model for Anomalous Behavior Detection in
                  Hybrid Mobile Applications},
  booktitle    = {International Conference on Identification, Information and Knowledge
                  in the Internet of Things, {IIKI} 2016, Beijing, China, October 20-21,
                  2016},
  pages        = {497--505},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/IIKI.2016.2},
  doi          = {10.1109/IIKI.2016.2},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iiki/MaoWCXJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangLSM16,
  author       = {Jianhong Zhang and
                  Pengyan Li and
                  Zhibin Sun and
                  Jian Mao},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {ID-based Data Integrity Auditing Scheme from {RSA} with Resisting
                  Key Exposure},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {83--100},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_5},
  doi          = {10.1007/978-3-319-47422-9\_5},
  timestamp    = {Wed, 14 Jul 2021 15:56:25 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangLSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/MaoCSJL16,
  author       = {Jian Mao and
                  Yue Chen and
                  Futian Shi and
                  Yaoqi Jia and
                  Zhenkai Liang},
  editor       = {Qing Yang and
                  Wei Yu and
                  Yacine Challal},
  title        = {Toward Exposing Timing-Based Probing Attacks in Web Applications},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 11th International
                  Conference, {WASA} 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9798},
  pages        = {499--510},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42836-9\_44},
  doi          = {10.1007/978-3-319-42836-9\_44},
  timestamp    = {Mon, 30 Jan 2023 09:32:36 +0100},
  biburl       = {https://dblp.org/rec/conf/wasa/MaoCSJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/MaoCZMZ16,
  author       = {Jian Mao and
                  Jian Cui and
                  Yan Zhang and
                  Hanjun Ma and
                  Jianhong Zhang},
  editor       = {Qing Yang and
                  Wei Yu and
                  Yacine Challal},
  title        = {Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 11th International
                  Conference, {WASA} 2016, Bozeman, MT, USA, August 8-10, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9798},
  pages        = {511--523},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42836-9\_45},
  doi          = {10.1007/978-3-319-42836-9\_45},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/MaoCZMZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cis/MaoL15,
  author       = {Jian Mao and
                  Jinming Liu},
  title        = {Information Leakage from Computer Based on electromagnetic radiation},
  journal      = {Control. Intell. Syst.},
  volume       = {43},
  number       = {2},
  year         = {2015},
  url          = {https://doi.org/10.2316/Journal.201.2015.2.201-2699},
  doi          = {10.2316/JOURNAL.201.2015.2.201-2699},
  timestamp    = {Tue, 11 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cis/MaoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiaCDSML15,
  author       = {Yaoqi Jia and
                  Yue Chen and
                  Xinshu Dong and
                  Prateek Saxena and
                  Jian Mao and
                  Zhenkai Liang},
  title        = {Man-in-the-browser-cache: Persisting {HTTPS} attacks via browser cache
                  poisoning},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {62--80},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.07.004},
  doi          = {10.1016/J.COSE.2015.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiaCDSML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ZhangM15,
  author       = {Jianhong Zhang and
                  Jian Mao},
  title        = {An improved anonymous multi-receiver identity-based encryption scheme},
  journal      = {Int. J. Commun. Syst.},
  volume       = {28},
  number       = {4},
  pages        = {645--658},
  year         = {2015},
  url          = {https://doi.org/10.1002/dac.2693},
  doi          = {10.1002/DAC.2693},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ZhangM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpcn/LiMCLC15,
  author       = {Teng Li and
                  Jian Mao and
                  Yue Chen and
                  Pei Li and
                  Jie Chen},
  title        = {Rating cloud storage service by collaborative remote data checking},
  journal      = {Int. J. High Perform. Comput. Netw.},
  volume       = {8},
  number       = {2},
  pages        = {144--153},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJHPCN.2015.070014},
  doi          = {10.1504/IJHPCN.2015.070014},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpcn/LiMCLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijufks/GuoMCL15,
  author       = {Jifa Guo and
                  Jian Mao and
                  Tiejun Cui and
                  Chongwei Li},
  title        = {A Multi-Scale Fuzzy Spatial Analysis Framework for Large Data Based
                  on {IT2} {FS}},
  journal      = {Int. J. Uncertain. Fuzziness Knowl. Based Syst.},
  volume       = {23},
  number       = {1},
  pages        = {73--104},
  year         = {2015},
  url          = {https://doi.org/10.1142/S021848851550004X},
  doi          = {10.1142/S021848851550004X},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijufks/GuoMCL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscloud/WangLCLM15,
  author       = {Mengmeng Wang and
                  Jianwei Liu and
                  Jie Chen and
                  Xiao Liu and
                  Jian Mao},
  title        = {{PERM-GUARD:} Authenticating the Validity of Flow Rules in Software
                  Defined Networking},
  booktitle    = {{IEEE} 2nd International Conference on Cyber Security and Cloud Computing,
                  CSCloud 2015, New York, NY, USA, November 3-5, 2015},
  pages        = {127--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CSCloud.2015.89},
  doi          = {10.1109/CSCLOUD.2015.89},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cscloud/WangLCLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/ChengYTMLLW15,
  author       = {Hua Cheng and
                  Wen Yang and
                  Rongsheng Tang and
                  Jian Mao and
                  Qian Luo and
                  Chuan Li and
                  Ang Wang},
  title        = {Distributed indexes design to accelerate similarity based images retrieval
                  in airport video monitoring systems},
  booktitle    = {12th International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2015, Zhangjiajie, China, August 15-17, 2015},
  pages        = {1908--1912},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/FSKD.2015.7382239},
  doi          = {10.1109/FSKD.2015.7382239},
  timestamp    = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl       = {https://dblp.org/rec/conf/fskd/ChengYTMLLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcity/ZhangLM15,
  author       = {Jianhong Zhang and
                  Pengyan Li and
                  Jian Mao},
  title        = {An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing},
  booktitle    = {2015 {IEEE} International Conference on Smart City/SocialCom/SustainCom/DataCom/SC2
                  2015, Chengdu, China, December 19-21, 2015},
  pages        = {996--1002},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SmartCity.2015.200},
  doi          = {10.1109/SMARTCITY.2015.200},
  timestamp    = {Thu, 13 Apr 2023 12:52:26 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcity/ZhangLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/ZhangTM14,
  author       = {Jianhong Zhang and
                  Wenjing Tang and
                  Jian Mao},
  title        = {Efficient public verification proof of retrievability scheme in cloud},
  journal      = {Clust. Comput.},
  volume       = {17},
  number       = {4},
  pages        = {1401--1411},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10586-014-0394-8},
  doi          = {10.1007/S10586-014-0394-8},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/ZhangTM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DengWQMLZS14,
  author       = {Hua Deng and
                  Qianhong Wu and
                  Bo Qin and
                  Jian Mao and
                  Xiao Liu and
                  Lei Zhang and
                  Wenchang Shi},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Who Is Touching My Cloud},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {362--379},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_21},
  doi          = {10.1007/978-3-319-11203-9\_21},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/DengWQMLZS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiMWZW14,
  author       = {Pei Li and
                  Jian Mao and
                  Ruilong Wang and
                  Lihua Zhang and
                  Tao Wei},
  editor       = {Xinyi Huang and
                  Jianying Zhou},
  title        = {A Website Credibility Assessment Scheme Based on Page Association},
  booktitle    = {Information Security Practice and Experience - 10th International
                  Conference, {ISPEC} 2014, Fuzhou, China, May 5-8, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8434},
  pages        = {105--118},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06320-1\_9},
  doi          = {10.1007/978-3-319-06320-1\_9},
  timestamp    = {Fri, 09 Apr 2021 18:45:22 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiMWZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/HeLMC14,
  author       = {Shuangyu He and
                  Jianwei Liu and
                  Jian Mao and
                  Jie Chen},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Hierarchical Solution for Access Control and Authentication in Software
                  Defined Networks},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {70--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_6},
  doi          = {10.1007/978-3-319-11698-3\_6},
  timestamp    = {Thu, 14 Oct 2021 10:08:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/HeLMC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/ZhangMX13,
  author       = {Jianhong Zhang and
                  Jian Mao and
                  Yuwei Xu},
  title        = {On the security of an ID-based anonymous proxy signature scheme and
                  its improved scheme},
  journal      = {Int. J. Embed. Syst.},
  volume       = {5},
  number       = {3},
  pages        = {181--188},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJES.2013.057082},
  doi          = {10.1504/IJES.2013.057082},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijes/ZhangMX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceccs/DongPML13,
  author       = {Xinshu Dong and
                  Kailas Patil and
                  Jian Mao and
                  Zhenkai Liang},
  title        = {A Comprehensive Client-Side Behavior Model for Diagnosing Attacks
                  in Ajax Applications},
  booktitle    = {2013 18th International Conference on Engineering of Complex Computer
                  Systems, Singapore, July 17-19, 2013},
  pages        = {177--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICECCS.2013.35},
  doi          = {10.1109/ICECCS.2013.35},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iceccs/DongPML13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MaoDLWL13,
  author       = {Jian Mao and
                  Xinshu Dong and
                  Pei Li and
                  Tao Wei and
                  Zhenkai Liang},
  editor       = {Sihan Qing and
                  Jianying Zhou and
                  Dongmei Liu},
  title        = {Rating Web Pages Using Page-Transition Evidence},
  booktitle    = {Information and Communications Security - 15th International Conference,
                  {ICICS} 2013, Beijing, China, November 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8233},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02726-5\_4},
  doi          = {10.1007/978-3-319-02726-5\_4},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MaoDLWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/DengQDZWLM13,
  author       = {Hua Deng and
                  Bo Qin and
                  Ruiying Du and
                  Huanguo Zhang and
                  Lina Wang and
                  Jianwei Liu and
                  Jian Mao},
  title        = {Finding Key Leakage in Hierarchical Distribution of Encrypted Data},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {780--785},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.149},
  doi          = {10.1109/INCOS.2013.149},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/DengQDZWLM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/MaoLLWL13,
  author       = {Jian Mao and
                  Pei Li and
                  Kun Li and
                  Tao Wei and
                  Zhenkai Liang},
  title        = {BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental
                  Visual Features},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {790--795},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.151},
  doi          = {10.1109/INCOS.2013.151},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/MaoLLWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/MaoZXLW12,
  author       = {Jian Mao and
                  Yan Zhang and
                  Xiandong Xu and
                  Jianwei Liu and
                  Tao Wei},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {{ET-DMD:} An Error-Tolerant Scheme to Detect Malicious File Deletion
                  on Distributed Storage},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {365--372},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.67},
  doi          = {10.1109/INCOS.2012.67},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/incos/MaoZXLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/candie/MaoLG11,
  author       = {Jian Mao and
                  Shiqing Liu and
                  Zhu Gao},
  title        = {Three-axis {NC} milling simulation based on adaptive triangular mesh},
  journal      = {Comput. Ind. Eng.},
  volume       = {60},
  number       = {1},
  pages        = {1--6},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cie.2010.06.016},
  doi          = {10.1016/J.CIE.2010.06.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/candie/MaoLG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/ZhangM11,
  author       = {Jianhong Zhang and
                  Jian Mao},
  title        = {Another Efficient Proxy Signature Scheme in the Standard Model},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {27},
  number       = {4},
  pages        = {1249--1264},
  year         = {2011},
  url          = {http://www.iis.sinica.edu.tw/page/jise/2011/201107\_04.html},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/ZhangM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic/ZhangMY11,
  author       = {Peilin Zhang and
                  Jian Mao and
                  Ziwen Yuan},
  editor       = {Dehuai Zeng},
  title        = {Research on Yangtze River Dangerous Articles Logistics Port Hierarchical
                  Layout Evaluation of Jiangsu Province Based on Disaster Theory},
  booktitle    = {Applied Informatics and Communication - International Conference,
                  {ICAIC} 2011, Xi'an, China, August 20-21, 2011, Proceedings, Part
                  {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {225},
  pages        = {50--58},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23220-6\_7},
  doi          = {10.1007/978-3-642-23220-6\_7},
  timestamp    = {Fri, 19 May 2017 01:26:23 +0200},
  biburl       = {https://dblp.org/rec/conf/icaic/ZhangMY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/services/BohnMLTM11,
  author       = {Robert B. Bohn and
                  John Messina and
                  Fang Liu and
                  Jin Tong and
                  Jian Mao},
  title        = {{NIST} Cloud Computing Reference Architecture},
  booktitle    = {World Congress on Services, {SERVICES} 2011, Washington, DC, USA,
                  July 4-9, 2011},
  pages        = {594--596},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SERVICES.2011.105},
  doi          = {10.1109/SERVICES.2011.105},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/services/BohnMLTM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhangM09,
  author       = {Jianhong Zhang and
                  Jian Mao},
  title        = {A novel identity-based multi-signcryption scheme},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {1},
  pages        = {14--18},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2008.07.004},
  doi          = {10.1016/J.COMCOM.2008.07.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhangM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LinVM08,
  author       = {Zihuai Lin and
                  Branka Vucetic and
                  Jian Mao},
  title        = {Ergodic Capacity of {LTE} Downlink Multiuser {MIMO} Systems},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2008, Beijing, China, 19-23 May 2008},
  pages        = {3345--3349},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICC.2008.629},
  doi          = {10.1109/ICC.2008.629},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LinVM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/WeiMZC07,
  author       = {Tao Wei and
                  Jian Mao and
                  Wei Zou and
                  Yu Chen},
  title        = {Structuring 2-way Branches in Binary Executables},
  booktitle    = {31st Annual International Computer Software and Applications Conference,
                  {COMPSAC} 2007, Beijing, China, July 24-27, 2007. Volume 1},
  pages        = {115--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/COMPSAC.2007.203},
  doi          = {10.1109/COMPSAC.2007.203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/WeiMZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ZhangM07,
  author       = {Jianhong Zhang and
                  Jian Mao},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {A Novel Verifiably Encrypted Signature Scheme Without Random Oracle},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_7},
  doi          = {10.1007/978-3-540-72163-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ZhangM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sas/WeiMZC07,
  author       = {Tao Wei and
                  Jian Mao and
                  Wei Zou and
                  Yu Chen},
  editor       = {Hanne Riis Nielson and
                  Gilberto Fil{\'{e}}},
  title        = {A New Algorithm for Identifying Loops in Decompilation},
  booktitle    = {Static Analysis, 14th International Symposium, {SAS} 2007, Kongens
                  Lyngby, Denmark, August 22-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4634},
  pages        = {170--183},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74061-2\_11},
  doi          = {10.1007/978-3-540-74061-2\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/sas/WeiMZC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ZhangM06,
  author       = {Jianhong Zhang and
                  Jian Mao},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {Linkability Analysis of Some Blind Signature Schemes},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {556--566},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_58},
  doi          = {10.1007/978-3-540-74377-4\_58},
  timestamp    = {Tue, 19 Nov 2019 12:34:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ZhangM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/JiMZC95,
  author       = {Xian Ji and
                  Jian Mao and
                  Ali Zhu and
                  Shixin Cheng},
  title        = {Sliding-exponential window {RLS} algorithm and its square-root method's
                  {DFE} for the {TDMA} digital mobile radio},
  booktitle    = {The 6th {IEEE} International Symposium on Personal, Indoor and Mobile
                  Radio Communications, {PIMRC} 1995, Toronto, ON, Canada, September
                  27-29, 1995},
  pages        = {223--227},
  year         = {1995},
  url          = {https://doi.org/10.1109/PIMRC.1995.476888},
  doi          = {10.1109/PIMRC.1995.476888},
  timestamp    = {Thu, 04 Jun 2020 15:17:53 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/JiMZC95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics