


Остановите войну!
for scientists:


default search action
Jian Mao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j52]Jian Mao, Xiaohe Xu, Qixiao Lin, Liran Ma, Jianwei Liu:
EScope: Effective Event Validation for IoT Systems Based on State Correlation. Big Data Min. Anal. 6(2): 218-233 (2023) - [j51]Yinhao Xiao
, Yizhen Jia
, Xiuzhen Cheng
, Shengling Wang
, Jian Mao
, Zhenkai Liang
:
I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association. IEEE Trans. Dependable Secur. Comput. 20(2): 1017-1030 (2023) - 2022
- [j50]Jian Mao, Xiang Li, Xiling Luo, Qixiao Lin:
SybilHunter: Hybrid graph-based sybil detection by aggregating user behaviors. Neurocomputing 500: 295-306 (2022) - [j49]Jian Mao
, Ziwen Liu, Qixiao Lin, Zhenkai Liang
:
Semantic-Fuzzing-Based Empirical Analysis of Voice Assistant Systems of Asian Symbol Languages. IEEE Internet Things J. 9(12): 9151-9166 (2022) - [j48]Jialing He
, Zijian Zhang
, Jian Mao
, Liran Ma
, Bakh Khoussainov
, Rui Jin
, Liehuang Zhu
:
Video Aficionado: We Know What You Are Watching. IEEE Trans. Mob. Comput. 21(8): 3041-3052 (2022) - 2021
- [j47]Jian Mao
, Junyang Han
, Tiejun Cui
:
Development and Assessment of Improved Global Pressure and Temperature Series Models. IEEE Access 9: 104429-104447 (2021) - [j46]Jian Mao
, Junyang Han
, Tiejun Cui
:
Development of a New Tabular Zenith Tropospheric Delay Model for Real-Time GNSS Applications. IEEE Access 9: 112837-112849 (2021) - [j45]Jian Mao, Jinming Liu, Jiemin Zhang, Zhen-zhong Han, Sen Shi:
A method for detecting image information leakage risk from electromagnetic emission of computer monitors. J. Intell. Fuzzy Syst. 40(2): 2981-2991 (2021) - [j44]Jian Mao
, Yitong Yang, Tianchen Zhang:
Empirical Analysis of Attribute Inference Techniques in Online Social Network. IEEE Trans. Netw. Sci. Eng. 8(2): 881-893 (2021) - [c39]Jun Zeng, Zheng Leong Chua, Yinfang Chen, Kaihang Ji, Zhenkai Liang, Jian Mao:
WATSON: Abstracting Behaviors from Audit Logs via Aggregation of Contextual Semantics. NDSS 2021 - [c38]Yitong Yang, Qixiao Lin, Jian Mao, Lipei Liu:
An improved social attribute inference scheme based on multi-attribute correlation. SmartWorld/SCALCOM/UIC/ATC/IOP/SCI 2021: 370-377 - 2020
- [j43]Guangmin Xie
, Zhongyuan Jiang
, Mingxing He
, Xiaoliang Chen
, Jian Mao
:
A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods. IEEE Access 8: 103759-103771 (2020) - [j42]Haosu Cheng, Jianwei Liu, Tongge Xu, Bohan Ren, Jian Mao, Wei Zhang:
Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks. Int. J. Sens. Networks 34(1): 56-69 (2020) - [j41]Jian Mao
, Shishi Zhu, Xuan Dai
, Qixiao Lin, Jianwei Liu
:
Watchdog: Detecting Ultrasonic-Based Inaudible Voice Attacks to Smart Home Systems. IEEE Internet Things J. 7(9): 8025-8035 (2020) - [j40]Jian Mao, Shishi Zhu, Jianwei Liu:
An inaudible voice attack to context-based device authentication in smart IoT systems. J. Syst. Archit. 104: 101696 (2020) - [j39]Jian Mao, Jiemin Zhang, Zhi Tang, Zhiling Gu:
DNS anti-attack machine learning model for DGA domain name detection. Phys. Commun. 40: 101069 (2020) - [c37]Jinping Lu, Zhi Tang, Jian Mao, Zhiling Gu, Jiemin Zhang:
Mixed-Models Method Based on Machine Learning in Detecting WebShell Attack. CIPAE 2020: 251-259
2010 – 2019
- 2019
- [j38]Jian Mao
, Peiguo Liu, Jinming Liu, Sen Shi:
Identification of Multi-Dimensional Electromagnetic Information Leakage Using CNN. IEEE Access 7: 145714-145724 (2019) - [j37]Jian Mao
, Wenqian Tian, Yitong Yang, Jianwei Liu
:
An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance. IEEE Access 7: 153074-153085 (2019) - [j36]Jian Mao
, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang:
Phishing page detection via learning classifiers from page layout feature. EURASIP J. Wirel. Commun. Netw. 2019: 43 (2019) - [j35]Jian Mao, Shishi Zhu, Jingdong Bian, Qixiao Lin, Jianwei Liu
:
Anomalous Power-Usage Behavior Detection from Smart Home Wireless Communications. J. Commun. Inf. Networks 4(1): 13-23 (2019) - [j34]Hu Liu, Qiang Yu, Yuegang Tan, Wenjun Xu, Bing Huang, Zhichao Xie, Jian Mao:
Feasibility Study on Temperature Distribution Measurement Method of Thrust Sliding Bearing Bush Based on FBG Quasi-Distributed Sensing. Sensors 19(14): 3245 (2019) - [c36]Jiemin Zhang, Jian Mao, Jinming Liu, Zhi Tang, Zhiling Gu, Yongmei Liu:
Cloud-based Multi-core Architecture against DNS Attacks. ICCSE 2019: 391-393 - [c35]Ying Li, Jiong Zhang, Jian Mao:
Transforming knowledge into intelligence The research on Wisdom Class Teaching Theory and Practice. ICCSE 2019: 998-1005 - [c34]Qixiao Lin, Jian Mao, Futian Shi, Shishi Zhu, Zhenkai Liang:
Detecting Android Side Channel Probing Attacks Based on System States. WASA 2019: 201-212 - 2018
- [j33]Jian Mao
, Jingdong Bian, Guangdong Bai, Ruilong Wang, Yue Chen, Yinhao Xiao, Zhenkai Liang
:
Detecting Malicious Behaviors in JavaScript Applications. IEEE Access 6: 12284-12294 (2018) - [j32]Jianhong Zhang
, Jian Mao:
On the Security of a Pairing-Free Certificateless Signcryption Scheme. Comput. J. 61(4): 469-471 (2018) - [j31]Jian Mao
, Wenqian Tian, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou, Jianwei Liu:
Understanding structure-based social network de-anonymization techniques via empirical analysis. EURASIP J. Wirel. Commun. Netw. 2018: 279 (2018) - [j30]Jian Mao, Qixiao Lin, Jingdong Bian:
Application of learning algorithms in smart home IoT system security. Math. Found. Comput. 1(1): 63-76 (2018) - [j29]Xiling Luo, Zequan Zhou, Lin Zhong, Jian Mao
, Chaoyong Chen:
An Effective Integrity Verification Scheme of Cloud Data Based on BLS Signature. Secur. Commun. Networks 2018: 2615249:1-2615249:11 (2018) - [j28]Haosu Cheng, Jianwei Liu
, Jian Mao
, Mengmeng Wang, Jie Chen, Jingdong Bian:
A Compatible OpenFlow Platform for Enabling Security Enhancement in SDN. Secur. Commun. Networks 2018: 8392080:1-8392080:20 (2018) - [j27]Ruiya Li
, Yiyang Chen, Yuegang Tan, Zude Zhou, Tianliang Li
, Jian Mao:
Sensitivity Enhancement of FBG-Based Strain Sensor. Sensors 18(5): 1607 (2018) - [c33]Jian Mao, Jingdong Bian, Hanjun Ma, Yaoqi Jia, Zhenkai Liang
, Xuxian Jiang:
Robust Detection of Android UI Similarity. ICC 2018: 1-6 - [c32]Haosu Cheng, Jianwei Liu
, Jian Mao, Mengmeng Wang, Jie Chen:
OSCO: An Open Security-Enhanced Compatible OpenFlow Platform. WASA 2018: 66-77 - 2017
- [j26]Jian Mao
, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang
:
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity. IEEE Access 5: 17020-17030 (2017) - [j25]Jian Mao, Peiguo Liu, Jinming Liu, Zhen-zhong Han:
Method for Detecting electromagnetic Information Leakage from Computer Monitor. Control. Intell. Syst. 45(1) (2017) - [j24]Jian Mao, Yue Chen, Yan Zhang, Xiandong Xu, Yajian Zhou, Jianwei Liu:
Parallel checking of content integrity in multi-cloud storage of heterogeneous sensor systems. Int. J. Commun. Syst. 30(5) (2017) - [j23]Jianhong Zhang, Jian Mao:
Anonymous multi-receiver broadcast encryption scheme with strong security. Int. J. Embed. Syst. 9(2): 177-187 (2017) - [j22]Jian Mao, Shandong Wang, Jianhua Ni, Changbai Xi, Jiechen Wang:
Management System for Dam-Break Hazard Mapping in a Complex Basin Environment. ISPRS Int. J. Geo Inf. 6(6): 162 (2017) - [j21]Jian Mao, Wenqian Tian
, Yan Zhang, Jian Cui, Hanjun Ma
, Jingdong Bian, Jianwei Liu, Jianhong Zhang
:
Co-Check: Collaborative Outsourced Data Auditing in Multicloud Environment. Secur. Commun. Networks 2017: 2948025:1-2948025:13 (2017) - [j20]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang
:
Toward Exposing Timing-Based Probing Attacks in Web Applications. Sensors 17(3): 464 (2017) - [j19]Jian Mao
, Yan Zhang, Pei Li, Teng Li, Qianhong Wu, Jianwei Liu:
A position-aware Merkle tree for dynamic cloud data integrity verification. Soft Comput. 21(8): 2151-2164 (2017) - [j18]Mengmeng Wang, Jianwei Liu
, Jie Chen, Xiao Liu, Jian Mao:
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking. J. Signal Process. Syst. 86(2-3): 157-173 (2017) - [c31]Jian Mao, Zheng Leong Chua, Zhenkai Liang
:
Enabling practical experimentation in cyber-security training. DSC 2017: 516-517 - [c30]Wenqian Tian, Jian Mao, Jingbo Jiang, Zhaoyuan He, Zhihong Zhou, Jianwei Liu:
Deeply Understanding Structure-based Social Network De-anonymization. IIKI 2017: 52-58 - [c29]Jian Mao, Jingdong Bian, Wenqian Tian, Shishi Zhu, Tao Wei, Aili Li, Zhenkai Liang
:
Detecting Phishing Websites via Aggregation Analysis of Page Layouts. IIKI 2017: 224-230 - [c28]Yinhao Xiao, Guangdong Bai, Jian Mao, Zhenkai Liang
, Wei Cheng:
Privilege Leakage and Information Stealing through the Android Task Mechanism. PAC 2017: 152-163 - [c27]Jian Mao, Wenqian Tian, Pei Li, Tao Wei, Zhenkai Liang
:
Phishing Website Detection Based on Effective CSS Features of Web Pages. WASA 2017: 804-815 - 2016
- [j17]Jianhong Zhang, Pengyan Li, Jian Mao:
IPad: ID-based public auditing for the outsourced data in the standard model. Clust. Comput. 19(1): 127-138 (2016) - [j16]Jianhong Zhang, Jian Mao:
Efficient public key encryption with revocable keyword search in cloud computing. Clust. Comput. 19(3): 1211-1217 (2016) - [j15]Yujue Wang, Qianhong Wu, Duncan S. Wong, Bo Qin, Jian Mao, Yong Ding:
Provably secure robust optimistic fair exchange of distributed signatures. Future Gener. Comput. Syst. 62: 29-39 (2016) - [j14]Jian Mao, Ruilong Wang, Yue Chen, Yaoqi Jia:
Detecting injected behaviors in HTML5-based Android applications. J. High Speed Networks 22(1): 15-34 (2016) - [j13]Jian Mao, Hanjun Ma, Yue Chen, Yaoqi Jia, Zhenkai Liang
:
Automatic permission inference for hybrid mobile apps. J. High Speed Networks 22(1): 55-64 (2016) - [j12]Jianhong Zhang, Jian Mao:
Efficient Multi-Proxy Signature Scheme with Short Length in the Standard Model. J. Inf. Sci. Eng. 32(4): 1097-1112 (2016) - [j11]Jianhong Zhang, Xubing Zhao, Jian Mao:
Attack on Chen et al.'s certificateless aggregate signature scheme. Secur. Commun. Networks 9(1): 54-59 (2016) - [c26]Mengmeng Wang, Jianwei Liu
, Jian Mao, Haosu Cheng, Jie Chen:
NSV-GUARD: Constructing Secure Routing Paths in Software Defined Networking. BDCloud-SocialCom-SustainCom 2016: 293-300 - [c25]Jianhong Zhang, Shuai Liu, Jian Mao:
On the security of a dynamic-hash-table based public auditing protocol. CISP-BMEI 2016: 1954-1958 - [c24]Jinming Liu, Jian Mao, Peiguo Liu:
Design and implement of a MCU based random number generater. ICCSE 2016: 945-948 - [c23]Jian Mao, Ruilong Wang, Yue Chen, Yinhao Xiao, Yaoqi Jia, Zhenkai Liang
:
A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications. IIKI 2016: 497-505 - [c22]Jianhong Zhang, Pengyan Li, Zhibin Sun, Jian Mao:
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure. ProvSec 2016: 83-100 - [c21]Jian Mao, Yue Chen, Futian Shi, Yaoqi Jia, Zhenkai Liang
:
Toward Exposing Timing-Based Probing Attacks in Web Applications. WASA 2016: 499-510 - [c20]Jian Mao, Jian Cui, Yan Zhang, Hanjun Ma, Jianhong Zhang:
Collaborative Outsourced Data Integrity Checking in Multi-Cloud Environment. WASA 2016: 511-523 - 2015
- [j10]Jian Mao, Jinming Liu:
Information Leakage from Computer Based on electromagnetic radiation. Control. Intell. Syst. 43(2) (2015) - [j9]Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang
:
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning. Comput. Secur. 55: 62-80 (2015) - [j8]Jianhong Zhang, Jian Mao:
An improved anonymous multi-receiver identity-based encryption scheme. Int. J. Commun. Syst. 28(4): 645-658 (2015) - [j7]Teng Li, Jian Mao, Yue Chen, Pei Li, Jie Chen:
Rating cloud storage service by collaborative remote data checking. Int. J. High Perform. Comput. Netw. 8(2): 144-153 (2015) - [j6]Jifa Guo, Jian Mao, Tiejun Cui, Chongwei Li:
A Multi-Scale Fuzzy Spatial Analysis Framework for Large Data Based on IT2 FS. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 23(1): 73-104 (2015) - [c19]Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu, Jian Mao:
PERM-GUARD: Authenticating the Validity of Flow Rules in Software Defined Networking. CSCloud 2015: 127-132 - [c18]Hua Cheng, Wen Yang, Rongsheng Tang, Jian Mao, Qian Luo, Chuan Li, Ang Wang:
Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systems. FSKD 2015: 1908-1912 - [c17]Jianhong Zhang, Pengyan Li, Jian Mao:
An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing. SmartCity 2015: 996-1002 - 2014
- [j5]Jianhong Zhang, Wenjing Tang, Jian Mao:
Efficient public verification proof of retrievability scheme in cloud. Clust. Comput. 17(4): 1401-1411 (2014) - [c16]Hua Deng, Qianhong Wu, Bo Qin, Jian Mao, Xiao Liu, Lei Zhang, Wenchang Shi:
Who Is Touching My Cloud. ESORICS (1) 2014: 362-379 - [c15]Pei Li, Jian Mao, Ruilong Wang, Lihua Zhang, Tao Wei:
A Website Credibility Assessment Scheme Based on Page Association. ISPEC 2014: 105-118 - [c14]Shuangyu He, Jianwei Liu, Jian Mao, Jie Chen:
Hierarchical Solution for Access Control and Authentication in Software Defined Networks. NSS 2014: 70-81 - 2013
- [j4]Jianhong Zhang, Jian Mao, Yuwei Xu:
On the security of an ID-based anonymous proxy signature scheme and its improved scheme. Int. J. Embed. Syst. 5(3): 181-188 (2013) - [c13]Xinshu Dong, Kailas Patil, Jian Mao, Zhenkai Liang
:
A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications. ICECCS 2013: 177-187 - [c12]Jian Mao, Xinshu Dong, Pei Li, Tao Wei, Zhenkai Liang
:
Rating Web Pages Using Page-Transition Evidence. ICICS 2013: 49-58 - [c11]Hua Deng, Bo Qin, Ruiying Du, Huanguo Zhang, Lina Wang, Jianwei Liu
, Jian Mao:
Finding Key Leakage in Hierarchical Distribution of Encrypted Data. INCoS 2013: 780-785 - [c10]Jian Mao, Pei Li, Kun Li, Tao Wei, Zhenkai Liang
:
BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features. INCoS 2013: 790-795 - 2012
- [c9]Jian Mao, Yan Zhang, Xiandong Xu, Jianwei Liu
, Tao Wei:
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage. INCoS 2012: 365-372 - 2011
- [j3]Jian Mao, Shiqing Liu, Zhu Gao:
Three-axis NC milling simulation based on adaptive triangular mesh. Comput. Ind. Eng. 60(1): 1-6 (2011) - [j2]Jianhong Zhang, Jian Mao:
Another Efficient Proxy Signature Scheme in the Standard Model. J. Inf. Sci. Eng. 27(4): 1249-1264 (2011) - [c8]Peilin Zhang, Jian Mao, Ziwen Yuan:
Research on Yangtze River Dangerous Articles Logistics Port Hierarchical Layout Evaluation of Jiangsu Province Based on Disaster Theory. ICAIC (2) 2011: 50-58 - [c7]Robert B. Bohn, John Messina, Fang Liu, Jin Tong, Jian Mao:
NIST Cloud Computing Reference Architecture. SERVICES 2011: 594-596
2000 – 2009
- 2009
- [j1]Jianhong Zhang, Jian Mao:
A novel identity-based multi-signcryption scheme. Comput. Commun. 32(1): 14-18 (2009) - 2008
- [c6]Zihuai Lin
, Branka Vucetic, Jian Mao:
Ergodic Capacity of LTE Downlink Multiuser MIMO Systems. ICC 2008: 3345-3349 - 2007
- [c5]Tao Wei, Jian Mao, Wei Zou, Yu Chen:
Structuring 2-way Branches in Binary Executables. COMPSAC (1) 2007: 115-118 - [c4]Jianhong Zhang, Jian Mao:
A Novel Verifiably Encrypted Signature Scheme Without Random Oracle. ISPEC 2007: 65-78 - [c3]Tao Wei, Jian Mao, Wei Zou, Yu Chen:
A New Algorithm for Identifying Loops in Decompilation. SAS 2007: 170-183 - 2006
- [c2]Jianhong Zhang, Jian Mao:
Linkability Analysis of Some Blind Signature Schemes. CIS 2006: 556-566
1990 – 1999
- 1995
- [c1]Xian Ji, Jian Mao, Ali Zhu, Shixin Cheng:
Sliding-exponential window RLS algorithm and its square-root method's DFE for the TDMA digital mobile radio. PIMRC 1995: 223-227
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-17 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint