default search action
Jianan Hong
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Zehui Zhang, Futai Zou, Jianan Hong, Libo Chen, Ping Yi:
Detection and Analysis of Broken Access Control Vulnerabilities in App-Cloud Interaction in IoT. IEEE Internet Things J. 11(17): 28267-28280 (2024) - [j15]Xin Xie, Cunqing Hua, Jianan Hong, Pengwenlong Gu, Wenchao Xu:
AirCon: Over-the-Air Consensus for Wireless Blockchain Networks. IEEE Trans. Mob. Comput. 23(5): 4566-4582 (2024) - [j14]Xin Xie, Cunqing Hua, Jianan Hong, Wenchao Xu:
Optimal Power Control and CSI Acquisition for Over-the-Air Computation in OFDM System. IEEE Trans. Wirel. Commun. 23(6): 6533-6545 (2024) - [c13]Chengchen Zhu, Kunling Li, Jianan Hong, Cunqing Hua, Futai Zou:
A Secure and Private Authentication Based on Radio Frequency Fingerprinting. ICC 2024: 2210-2215 - [c12]Jiayue Zhou, Jianan Hong, Chengchen Zhu, Futai Zou, Cunqing Hua:
Trustful Blockchain-Enabled Identity Management for VANET with Short-Latency Authentication. ICNC 2024: 659-663 - [c11]Jianan Hong, Jiayue Zhou, Yuqing Li, Jia Cheng, Cunqing Hua:
AcBF: A Revocable Blockchain-Based Identity Management Enabling Low-Latency Authentication. ICDCS 2024: 312-321 - [c10]Nan Yan, Yuqing Li, Jing Chen, Xiong Wang, Jianan Hong, Kun He, Wei Wang:
Efficient and Straggler-Resistant Homomorphic Encryption for Heterogeneous Federated Learning. INFOCOM 2024: 791-800 - [c9]Jia Cao, Jiayue Zhou, Jianan Hong:
UE-detectable Authentication and Key Agreement Method Resisting Serving Network Forging. NaNA 2024: 424-430 - 2023
- [c8]Weilin Gan, Mingyang Zhao, Hongchen Guo, Chuan Zhang, Jianan Hong, Liehuang Zhu:
Fine-Grained Data Rights Governance in Blockchain-Based Cloud-Edge Communications. GLOBECOM 2023: 904-909 - [c7]Jiazhong Bao, Xin Xie, Zhaoyi Lu, Jianan Hong, Cunqing Hua:
Receiver-Agnostic Radio Frequency Fingerprinting Based on Two-stage Unsupervised Domain Adaptation and Fine-tuning. GLOBECOM 2023: 6085-6090 - 2022
- [j13]Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong, Nenghai Yu:
Efficient and Secure Attribute-Based Access Control With Identical Sub-Policies Frequently Used in Cloud Storage. IEEE Trans. Dependable Secur. Comput. 19(1): 635-646 (2022) - [j12]Kaiping Xue, Xinyi Luo, Hangyu Tian, Jianan Hong, David S. L. Wei, Jian Li:
A Blockchain Based User Subscription Data Management and Access Control Scheme in Mobile Communication Networks. IEEE Trans. Veh. Technol. 71(3): 3108-3120 (2022) - [c6]Xin Xie, Cunqing Hua, Jianan Hong:
Joint Power Control for Over-the-Air Computation in Multicarrier Wireless System. GLOBECOM 2022: 794-799 - [c5]Jinjiang Yang, Feng Liu, Xinyi Luo, Jianan Hong, Jian Li, Kaiping Xue:
Forward Private Multi-Client Searchable Encryption with Efficient Access Control in Cloud Storage. GLOBECOM 2022: 3791-3796 - 2020
- [j11]Jianan Hong, Kaiping Xue, Na Gai, David S. L. Wei, Peilin Hong:
Service Outsourcing in F2C Architecture with Attribute-based Anonymous Access Control and Bounded Service Number. IEEE Trans. Dependable Secur. Comput. 17(5): 1051-1062 (2020) - [j10]Jianan Hong, Kaiping Xue, Yingjie Xue, Weikeng Chen, David S. L. Wei, Nenghai Yu, Peilin Hong:
TAFC: Time and Attribute Factors Combined Access Control for Time-Sensitive Data in Public Cloud. IEEE Trans. Serv. Comput. 13(1): 158-171 (2020) - [j9]Jie Xu, Kaiping Xue, Hangyu Tian, Jianan Hong, David S. L. Wei, Peilin Hong:
An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks. IEEE Trans. Veh. Technol. 69(6): 6688-6698 (2020)
2010 – 2019
- 2019
- [j8]Jie Xu, Kaiping Xue, Shaohua Li, Hangyu Tian, Jianan Hong, Peilin Hong, Nenghai Yu:
Healthchain: A Blockchain-Based Privacy Preserving Scheme for Large-Scale Health Data. IEEE Internet Things J. 6(5): 8770-8781 (2019) - [j7]Yingjie Xue, Kaiping Xue, Na Gai, Jianan Hong, David S. L. Wei, Peilin Hong:
An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage. IEEE Trans. Inf. Forensics Secur. 14(11): 2927-2942 (2019) - 2018
- [j6]Kaiping Xue, Jianan Hong, Yongjin Ma, David S. L. Wei, Peilin Hong, Nenghai Yu:
Fog-Aided Verifiable Privacy Preserving Access Control for Latency-Sensitive Data Sharing in Vehicular Cloud Computing. IEEE Netw. 32(3): 7-13 (2018) - [j5]Kaiping Xue, Weikeng Chen, Wei Li, Jianan Hong, Peilin Hong:
Combining Data Owner-Side and Cloud-Side Access Control for Encrypted Cloud Storage. IEEE Trans. Inf. Forensics Secur. 13(8): 2062-2074 (2018) - [c4]Peixuan He, Yinxin Wan, Qiudong Xia, Shaohua Li, Jianan Hong, Kaiping Xue:
LASA: Lightweight, Auditable and Secure Access Control in ICN with Limitation of Access Times. ICC 2018: 1-6 - [c3]Wei Meng, Kaiping Xue, Jie Xu, Jianan Hong, Nenghai Yu:
Low-Latency Authentication Against Satellite Compromising for Space Information Network. MASS 2018: 237-244 - 2017
- [j4]Kaiping Xue, Jianan Hong, Yingjie Xue, David S. L. Wei, Nenghai Yu, Peilin Hong:
CABE: A New Comparable Attribute-Based Encryption Construction with 0-Encoding and 1-Encoding. IEEE Trans. Computers 66(9): 1491-1503 (2017) - [j3]Kaiping Xue, Yingjie Xue, Jianan Hong, Wei Li, Hao Yue, David S. L. Wei, Peilin Hong:
RAAC: Robust and Auditable Access Control With Multiple Attribute Authorities for Public Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 953-967 (2017) - [j2]Kaiping Xue, Shaohua Li, Jianan Hong, Yingjie Xue, Nenghai Yu, Peilin Hong:
Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving. IEEE Trans. Inf. Forensics Secur. 12(7): 1596-1608 (2017) - [c2]Qingyou Yang, Jianan Hong, Kaiping Xue, Weikeng Chen, Xiang Zhang, Hao Yue:
A privacy-preserving and real-time traceable power request scheme for smart grid. ICC 2017: 1-6 - 2016
- [j1]Wei Li, Kaiping Xue, Yingjie Xue, Jianan Hong:
TMACS: A Robust and Verifiable Threshold Multi-Authority Access Control System in Public Cloud Storage. IEEE Trans. Parallel Distributed Syst. 27(5): 1484-1496 (2016) - [c1]Yingjie Xue, Jianan Hong, Wei Li, Kaiping Xue, Peilin Hong:
LABAC: A Location-Aware Attribute-Based Access Control Scheme for Cloud Storage. GLOBECOM 2016: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-21 20:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint