[go: up one dir, main page]

Follow
Jinjun Chen
Jinjun Chen
MAE, IEEE Fellow (Computer Society), AAIA Fellow; IEEE TCSC Chair
Verified email at swin.edu.au
Title
Cited by
Cited by
Year
Detection of malicious code variants based on deep learning
Z Cui, F Xue, X Cai, Y Cao, G Wang, J Chen
IEEE Transactions on Industrial Informatics 14 (7), 3187-3196, 2018
7502018
Differential privacy techniques for cyber physical systems: a survey
MU Hassan, MH Rehmani, J Chen
IEEE Communications Surveys & Tutorials 22 (1), 746-789, 2020
6792020
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
MU Hassan, MH Rehmani, J Chen
Future Generation Computer Systems 97, 512-529, 2019
6702019
A hybrid BlockChain-based identity authentication scheme for multi-WSN
Z Cui, XUE Fei, S Zhang, X Cai, Y Cao, W Zhang, J Chen
IEEE Transactions on Services Computing 13 (2), 241-251, 2020
6452020
Personalized recommendation system based on collaborative filtering for IoT scenarios
Z Cui, X Xu, X Cai, Y Cao, W Zhang, J Chen
IEEE Transactions on Services Computing 13 (4), 685-695, 2020
6142020
A data placement strategy in scientific cloud workflows
D Yuan, Y Yang, X Liu, J Chen
Future Generation Computer Systems 26 (8), 1200-1214, 2010
4752010
A Survey on Differential Privacy for Unstructured Data Content
Y Zhao, J Chen
ACM Computing Surveys 54 (10s), Article No.: 207, pp. 1–28, 2022
3712022
A scalable two-phase top-down specialization approach for data anonymization using mapreduce on cloud
X Zhang, LT Yang, C Liu, J Chen
IEEE Transactions on Parallel and Distributed Systems 25 (2), 363-373, 2014
3562014
A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber–physical systems
Z Cui, B Sun, G Wang, Y Xue, J Chen
Journal of Parallel and Distributed Computing 103, 42-52, 2017
3492017
DEAL: Differentially Private Auction for Blockchain-Based Microgrids Energy Trading
MU Hassan, MH Rehmani, J Chen
IEEE Transactions on Services Computing 13 (2), 263-275, 2020
3232020
External integrity verification for outsourced big data in cloud and IoT: A big picture
C Liu, C Yang, X Zhang, J Chen
Future Generation Computer Systems 49, 58-67, 2015
2982015
An under‐sampled software defect prediction method based on hybrid multi‐objective cuckoo search
X Cai, Y Niu, S Geng, J Zhang, Z Cui, J Li, J Chen
Concurrency and Computation: Practice and Experience 32 (5), e5478, 2020
2962020
A pigeon-inspired optimization algorithm for many-objective optimization problems
Z Cui, J Zhang, Y Wang, Y Cao, X Cai, W Zhang, J Chen
Science China. Information Sciences 62 (7), 70212, 2019
2912019
MuR-DPA: Top-down levelled multi-replica merkle hash tree based secure public auditing for dynamic big data storage on cloud
C Liu, R Ranjan, C Yang, X Zhang, L Wang, J Chen
IEEE Transactions on Computers 64 (9), 2609-2622, 2015
2902015
Authorized public auditing of dynamic big data storage on cloud with efficient verifiable fine-grained updates
C Liu, J Chen, LT Yang, X Zhang, C Yang, R Ranjan, R Kotagiri
IEEE Transactions on Parallel and Distributed Systems 25 (9), 2234-2244, 2014
2842014
A Multicloud-Model-Based Many-Objective Intelligent Algorithm for Efficient Task Scheduling in Internet of Things
X Cai, S Geng, D Wu, J Cai, J Chen
IEEE Internet of Things Journal 8 (12), 9645-9653, 2021
2792021
Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things
Z Cui, Y Cao, X Cai, J Cai, J Chen
Journal of Parallel and Distributed Computing 132, 217-229, 2019
2762019
Anomaly detection in blockchain networks: A comprehensive survey
MU Hassan, MH Rehmani, J Chen
IEEE Communications Surveys & Tutorials 25 (1), 289 - 318, 2023
2752023
A New Subspace Clustering Strategy for AI-Based Data Analysis in IoT System
Z Cui, X Jing, P Zhao, W Zhang, J Chen
IEEE Internet of Things Journal 8 (16), 12540-12549, 2021
2612021
Cloud computing: methodology, systems, and applications
L Wang, R Ranjan, J Chen, B Benatallah
CRC Press, 2011
254*2011
The system can't perform the operation now. Try again later.
Articles 1–20