Jianming Zhu
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – today
- 2019
- [j18]Yonggui Fu
, Jianming Zhu:
Big Production Enterprise Supply Chain Endogenous Risk Management Based on Blockchain. IEEE Access 7: 15310-15319 (2019) - [j17]Jianming Zhu
, Smita Ghosh, Junlei Zhu, Weili Wu:
Near-Optimal Convergent Approach for Composed Influence Maximization Problem in Social Networks. IEEE Access 7: 142488-142497 (2019) - [j16]Yonggui Fu
, Jianming Zhu:
Operation Mechanisms for Intelligent Logistics System: A Blockchain Perspective. IEEE Access 7: 144202-144213 (2019) - [j15]Jianming Zhu, Ju Yang:
On the minimal matching energies of unicyclic graphs. Discrete Applied Mathematics 254: 246-255 (2019) - [j14]Haifeng Li, Mo Hai, Ning Zhang, Jianming Zhu, Yue Wang, Huaihu Cao:
Probabilistic maximal frequent itemset mining methods over uncertain databases. Intell. Data Anal. 23(6): 1219-1241 (2019) - [j13]Jianming Zhu
, Shuyue Liu, Smita Ghosh:
Model and algorithm of routes planning for emergency relief distribution in disaster management with disaster information update. J. Comb. Optim. 38(1): 208-223 (2019) - [c16]Jianming Zhu
, Smita Ghosh, Weili Wu, Chuangen Gao:
Profit Maximization Under Group Influence Model in Social Networks. CSoNet 2019: 108-119 - 2018
- [j12]Youwei Wang, Lizhou Feng, Jianming Zhu:
Novel artificial bee colony based feature selection method for filtering redundant information. Appl. Intell. 48(4): 868-885 (2018) - [j11]Haifeng Li
, Ning Zhang, Jianming Zhu, Yue Wang, Huaihu Cao:
Probabilistic frequent itemset mining over uncertain data streams. Expert Syst. Appl. 112: 274-287 (2018) - [j10]Tieming Chen
, Qingyu Mao, Yimin Yang, Mingqi Lv, Jianming Zhu:
TinyDroid: A Lightweight and Efficient Model for Android Malware Detection and Classification. Mobile Information Systems 2018: 4157156:1-4157156:9 (2018) - [c15]Maoning Wang, Meijiao Duan, Jianming Zhu:
Research on the Security Criteria of Hash Functions in the Blockchain. BCC@AsiaCCS 2018: 47-55 - 2017
- [j9]Sheng Gao, XinDi Ma, Jianming Zhu, Jianfeng Ma:
APRS: a privacy-preserving location-aware recommender system based on differentially private histogram. SCIENCE CHINA Information Sciences 60(11): 119103:1-119103:3 (2017) - [j8]Yue Wang
, Liang Chen
, Li Zhang, Haifeng Li, Huaihu Cao, Jianming Zhu:
On Carrier Sensing Accuracy and Range Scaling Laws in Nakagami Fading Channels. Wireless Communications and Mobile Computing 2017 (2017) - [c14]Yonggui Fu, Jianming Zhu, Sheng Gao:
CPS Information Security Risk Evaluation System Based on Petri Net. DSC 2017: 541-548 - [c13]Zhiwen Xiao, Guoqing Wang, Jianming Zhu:
Model and Algorithm for Rescue Resource Assignment Problem in Disaster Response Based on Demand-Ability-Equipment Matching. QTNA 2017: 246-261 - 2016
- [c12]Ning Zhang, Jianming Zhu:
Privacy-Preserving Access Control Scheme for Outsourced Data in Cloud. WEB 2016: 215-224 - 2015
- [j7]Jing Wang, Haoxiong Yang, Jianming Zhu:
Research on emergency resources storage region division based on two-stage stochastic programming. IJITM 14(2/3): 124-132 (2015) - 2014
- [j6]Haifeng Li, Ning Zhang, Jianming Zhu, Huaihu Cao, Yue Wang:
Efficient frequent itemset mining methods over time-sensitive streams. Knowl.-Based Syst. 56: 281-298 (2014) - [c11]Jingqi Zhang, Jianming Zhu, Ning Zhang:
An Improved Privacy-Preserving Collaborative Filtering Recommendation Algorithm. PACIS 2014: 277 - 2012
- [j5]Jianming Zhu:
Two new edge grafting operations on the energy of unicyclic graphs and their applications. Discrete Mathematics 312(21): 3117-3127 (2012) - [j4]Junjie Wu, Shiwei Zhu, Hui Xiong, Jian Chen, Jianming Zhu:
Adapting the Right Measures for Pattern Discovery: A Unified View. IEEE Trans. Systems, Man, and Cybernetics, Part B 42(4): 1203-1214 (2012) - [c10]Qingjie Zhang, Jianming Zhu, Xiaoxu Wang:
Monoecism Watermarking Algorithm. PAAP 2012: 52-59 - 2011
- [c9]Youliang Tian, Jianfeng Ma, Changgen Peng, Jianming Zhu:
Secret Sharing Scheme with Fairness. TrustCom 2011: 494-500 - 2010
- [c8]Yanmei Chai, Tian Xia, Jianming Zhu, Haifeng Li:
Intelligent Digital Photo Management System Using Ontology and SWRL. CIS 2010: 18-22
2000 – 2009
- 2009
- [j3]Xujin Chen, Xiaodong Hu, Jianming Zhu:
Data Gathering Schedule for Minimal Aggregation Time in Wireless Sensor Networks. IJDSN 5(4): 321-337 (2009) - [c7]Jianming Zhu:
A New Scheme to Privacy-Preserving Collaborative Data Mining. IAS 2009: 468-471 - 2008
- [j2]Jianming Zhu, Xiaodong Hu:
Improved Algorithm for Minimum Data Aggregation Time Problem in Wireless Sensor Networks. J. Systems Science & Complexity 21(4): 626-636 (2008) - [c6]Yanmei Zhang, Jianming Zhu:
A Hybrid Vulnerability Analysis Method against Non-Security Protocols. ICYCS 2008: 1559-1564 - 2007
- [c5]Jianming Zhu, Weiping Shang, Xiaodong Hu:
New Algorithm for Minimum Multicast Time Problem in Wireless Sensor Networks. WCNC 2007: 3529-3534 - 2006
- [c4]Jianming Zhu, Xujin Chen, Xiaodong Hu:
Minimum Multicast Time Problem in Wireless Sensor Networks. WASA 2006: 490-501 - 2005
- [c3]Chao Wang, Jianfeng Ma, Jianming Zhu:
Design and Implementation of Survivable Network Systems. ICIC (2) 2005: 376-385 - [c2]Xujin Chen, Xiaodong Hu, Jianming Zhu:
Minimum Data Aggregation Time Problem in Wireless Sensor Networks. MSN 2005: 133-142 - 2004
- [j1]Jianming Zhu, Jianfeng Ma:
A new authentication scheme with anonymity for wireless environments. IEEE Trans. Consumer Electronics 50(1): 231-235 (2004) - 2002
- [c1]Jianming Zhu, Yeheskel Bar-Ness:
Power allocation algorithm in MC-CDMA. ICC 2002: 931-935
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org and opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy.
Citation data
Add a list of citing articles from to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter accout. At the same time, Twitter will persitently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2019-12-11 22:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint