default search action
Jian Ren 0001
Person information
- affiliation: Michigan State University, Department of ECE, East Lansing, MI, USA
- affiliation (PhD): Xidian University, Xi'an, China
Other persons with the same name
- Jian Ren — disambiguation page
- Jian Ren 0002 — Sun Yat-Sen University, School of Life Sciences, Guangzhou, China (and 1 more)
- Jian Ren 0003 — Massachusetts General Hospital, Harvard Medical School, Wellman Center for Photomedicine, Boston, MA, USA
- Jian Ren 0004 — Beihang University, School of Computer Science and Engineering, Beijing, China (and 1 more)
- Jian Ren 0005 — Snap Inc., Los Angeles, CA, USA (and 1 more)
- Jian Ren 0006 — National University of Singapore, Department of Computer Science, Singapore
- Jian Ren 0007 — Xidian University, National Key Laboratory of Antennas and Microwave Technology, Xi'an, China (and 1 more)
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j54]Boxin Sun, Jinxian Deng, Norman Scheel, David C. Zhu, Jian Ren, Rong Zhang, Tongtong Li:
Causalized Convergent Cross Mapping and Its Implementation in Causality Analysis. Entropy 26(7): 539 (2024) - [j53]Zixiao Yu, Xinyi Wu, Haohong Wang, Aggelos K. Katsaggelos, Jian Ren:
Automated Adaptive Cinematography for User Interaction in Open World. IEEE Trans. Multim. 26: 6178-6190 (2024) - [c75]Jialong Zhou, Yuni Lai, Jian Ren, Kai Zhou:
Black-Box Attacks Against Signed Graph Analysis via Balance Poisoning. ICNC 2024: 530-535 - [c74]Jian Ren, Tongtong Li:
Privacy-Preserving Characterization and Data Publishing. ICNC 2024: 549-553 - [c73]Jian Ren, Tongtong Li:
Graph Isomorphism-Characterization and Efficient Algorithms. ICNC 2024: 789-793 - 2023
- [j52]Tongtong Li, Jinxian Deng, Jian Ren:
Security and Energy Efficiency: Breaking the Barriers of High Peak-to-Average Power Ratio and Disguised Jamming in NextG IoT System Design. IEEE Internet Things J. 10(3): 2658-2666 (2023) - [j51]Zixiao Yu, Haohong Wang, Aggelos K. Katsaggelos, Jian Ren:
A Novel Automatic Content Generation and Optimization Framework. IEEE Internet Things J. 10(14): 12338-12351 (2023) - [c72]Yu Zheng, David C. Zhu, Jian Ren, Taosheng Liu, Karl J. Friston, Tongtong Li:
A Mathematical Model for Neuronal Activity and Brain Information Processing Capacity. ICASSP 2023: 1-5 - [c71]Jian Ren, Jian Li, Tongtong Li:
Optimal Codes for Distributed Storage. ICNC 2023: 42-46 - [c70]Tongtong Li, Jinxian Deng, Jian Ren:
Can We Have a Better System than OFDM? ICNC 2023: 383-387 - [c69]Zixiao Yu, Xinyi Wu, Haohong Wang, Aggelos K. Katsaggelos, Jian Ren:
Adaptive Auto-Cinematography in Open Worlds. MIPR 2023: 1-6 - [i14]Jialong Zhou, Yuni Lai, Jian Ren, Kai Zhou:
Black-Box Attacks against Signed Graph Analysis via Balance Poisoning. CoRR abs/2309.02396 (2023) - 2022
- [j50]Zixiao Yu, Haohong Wang, Jian Ren:
RealPRNet: A Real-Time Phoneme-Recognized Network for "Believable" Speech Animation. IEEE Internet Things J. 9(7): 5357-5367 (2022) - [j49]Jian Ren, Jian Li, Tongtong Li, Matt W. Mutka:
Feasible Region of Secure and Distributed Data Storage in Adversarial Networks. IEEE Internet Things J. 9(11): 8980-8988 (2022) - [j48]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
$d$d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. IEEE Trans. Serv. Comput. 15(3): 1592-1605 (2022) - [c68]Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou:
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. ICDE 2022: 14-26 - [c67]Zixiao Yu, Chenyu Yu, Haohong Wang, Jian Ren:
Enabling Automatic Cinematography with Reinforcement Learning. MIPR 2022: 103-108 - [c66]Zixiao Yu, Enhao Guo, Haohong Wang, Jian Ren:
Bridging Script and Animation Utilizing a New Automatic Cinematography Model. MIPR 2022: 268-273 - [i13]Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jun Wu, Jian Ren, Kai Zhou:
From Bi-Level to One-Level: A Framework for Structural Attacks to Graph Anomaly Detection. CoRR abs/2206.08260 (2022) - 2021
- [j47]Ehab Zaghloul, Tongtong Li, Jian Ren:
d-BAME: Distributed Blockchain-Based Anonymous Mobile Electronic Voting. IEEE Internet Things J. 8(22): 16585-16597 (2021) - [j46]Kai Zhou, Jian Ren:
CASO: Cost-Aware Secure Outsourcing of General Computational Problems. IEEE Trans. Serv. Comput. 14(2): 386-399 (2021) - [i12]Yulin Zhu, Yuni Lai, Kaifa Zhao, Xiapu Luo, Mingquan Yuan, Jian Ren, Kai Zhou:
BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection. CoRR abs/2106.09989 (2021) - 2020
- [j45]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
Bitcoin and Blockchain: Security and Privacy. IEEE Internet Things J. 7(10): 10288-10313 (2020) - [j44]Ehab Zaghloul, Kai Zhou, Jian Ren:
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing. IEEE Trans. Big Data 6(4): 804-815 (2020) - [j43]Yuan Liang, Jian Ren, Tongtong Li:
Secure OFDM System Design and Capacity Analysis Under Disguised Jamming. IEEE Trans. Inf. Forensics Secur. 15: 738-752 (2020) - [j42]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS Bound in Distributed Cloud Storage. IEEE Trans. Inf. Theory 66(7): 3957-3975 (2020) - [c65]Ehab Zaghloul, Tongtong Li, Jian Ren:
Anonymous and Coercion-Resistant Distributed Electronic Voting. ICNC 2020: 389-393 - [c64]Yuan Liang, Jian Ren, Tongtong Li:
Secure and Efficient OFDM System Design under Disguised Jamming. ICNC 2020: 394-399 - [c63]Zixiao Yu, Haohong Wang, Jian Ren:
A Hybrid Temporal Modeling Phoneme Recognized Network for Real-Time Speech Animation. MIPR 2020: 55-60
2010 – 2019
- 2019
- [c62]Yuan Liang, Yunhao Liu, Jian Ren, Tongtong Li:
Malicious Link Detection in Multi-Hop Wireless Sensor Networks. GLOBECOM 2019: 1-6 - [c61]Ehab Zaghloul, Tongtong Li, Jian Ren:
Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts. ICNC 2019: 375-379 - [c60]Ahmed Alahmadi, Yuan Liang, Run Tian, Jian Ren, Tongtong Li:
Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry. ICNC 2019: 509-514 - [i11]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
$d$-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications. CoRR abs/1904.11432 (2019) - [i10]Ehab Zaghloul, Tongtong Li, Matt W. Mutka, Jian Ren:
Bitcoin and Blockchain: Security and Privacy. CoRR abs/1904.11435 (2019) - 2018
- [j41]M. H. Afifi, Liang Zhou, Shantanu Chakrabartty, Jian Ren:
Dynamic Authentication Protocol Using Self-Powered Timers for Passive Internet of Things. IEEE Internet Things J. 5(4): 2927-2935 (2018) - [j40]Kai Zhou, Jian Ren:
PassBio: Privacy-Preserving User-Centric Biometric Authentication. IEEE Trans. Inf. Forensics Secur. 13(12): 3050-3063 (2018) - [j39]M. H. Afifi, Kai Zhou, Jian Ren:
Privacy Characterization and Quantification in Data Publishing. IEEE Trans. Knowl. Data Eng. 30(9): 1756-1769 (2018) - [j38]Jian Li, Tongtong Li, Jian Ren, Han-Chieh Chao:
Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks. Wirel. Commun. Mob. Comput. 2018: 3473910:1-3473910:13 (2018) - [c59]M. H. Afifi, Ehab Zaghloul, Tongtong Li, Jian Ren:
UBNB-PPDP: Utility-Boosting Negotiation-Based Privacy Preserving Data Publishing. GLOBECOM 2018: 1-6 - [c58]Yuan Liang, Jian Ren, Tongtong Li:
The Worst Jamming Distribution for Securely Precoded OFDM. GLOBECOM 2018: 1-6 - [c57]Zhe Wang, Yu Zheng, Michael Jigo, Taosheng Liu, Jian Ren, Zhi Tian, Tongtong Li:
Decoding Behavioral Accuracy in an Attention Task Using Brain fMRI Data. GLOBECOM 2018: 1-6 - [c56]Ehab Zaghloul, Tongtong Li, Jian Ren:
An Attribute-Based Distributed Data Sharing Scheme. GLOBECOM 2018: 1-6 - [c55]Kai Zhou, Jian Ren, Tongtong Li:
Security and Privacy Enhancement for Outsourced Biometric Identification. GLOBECOM 2018: 1-5 - [c54]M. H. Afifi, Liang Zhou, Shantanu Chakrabartty, Jian Ren:
HPMAP: A Hash-Based Privacy-Preserving Mutual Authentication Protocol for Passive IoT Devices Using Self-Powered Timers. ICC 2018: 1-6 - [c53]Maozhen Liu, Chao Yang, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data. ICC 2018: 1-7 - [c52]Yuan Liang, Yu Zheng, Jian Ren, Tongtong Li:
End-to-End Delay in Multi-Hop Wireless Networks With Random Relay Deployment. ICNC 2018: 513-517 - [i9]Ehab Zaghloul, Kai Zhou, Jian Ren:
P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing. CoRR abs/1801.02685 (2018) - [i8]Kai Zhou, Jian Ren:
Security and Privacy Enhancement for Outsourced Biometric Identification. CoRR abs/1809.04219 (2018) - 2017
- [j37]Jian Li, Yun Liu, Zhen-Jiang Zhang, Jian Ren, Nan Zhao:
Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage. IEEE Access 5: 8780-8791 (2017) - [j36]Di Tang, Tongtong Li, Jian Ren:
Congestion-Aware Routing Scheme based on Traffic Information in Sensor Networks. Ad Hoc Sens. Wirel. Networks 35(3-4): 281-300 (2017) - [j35]Chao Yang, Min Zhang, Qi Jiang, Junwei Zhang, Danping Li, Jianfeng Ma, Jian Ren:
Zero knowledge based client side deduplication for encrypted files of secure cloud storage in smart cities. Pervasive Mob. Comput. 41: 243-258 (2017) - [j34]Kai Zhou, M. H. Afifi, Jian Ren:
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. IEEE Trans. Inf. Forensics Secur. 12(11): 2518-2531 (2017) - [j33]Jian Li, Tongtong Li, Jian Ren:
Optimal Construction of Regenerating Code Through Rate-Matching in Hostile Networks. IEEE Trans. Inf. Theory 63(7): 4414-4429 (2017) - [c51]Danping Li, Chao Yang, Chengzhou Li, Qi Jiang, Xiaofeng Chen, Jianfeng Ma, Jian Ren:
A client-based secure deduplication of multimedia data. ICC 2017: 1-6 - [i7]Jian Li, Yun Liu, Zhen-Jiang Zhang, Jian Ren, Nan Zhao:
Performance Optimization of Network Coding Based Communication and Reliable Storage in Internet of Things. CoRR abs/1703.03210 (2017) - [i6]Zhe Wang, Yu Zheng, David C. Zhu, Jian Ren, Tongtong Li:
Discrete Dynamic Causal Modeling and Its Relationship with Directed Information. CoRR abs/1709.06134 (2017) - [i5]Kai Zhou, Jian Ren:
PassBio: Privacy-Preserving User-Centric Biometric Authentication. CoRR abs/1711.04902 (2017) - 2016
- [j32]Yong Yu, Yi Mu, Rongxing Lu, Jian Ren:
Recent advances in security and privacy in large-scale networks. Concurr. Comput. Pract. Exp. 28(4): 1080-1082 (2016) - [j31]Leron Lightfoot, Yun Li, Jian Ren:
STaR: design and quantitative measurement of source-location privacy for wireless sensor networks. Secur. Commun. Networks 9(3): 220-228 (2016) - [j30]Jian Ren, Yun Li, Tingting Jiang, Tongtong Li:
Anonymous communication in overlay networks. Secur. Commun. Networks 9(3): 229-240 (2016) - [j29]Di Tang, Jian Ren:
A Novel Delay-Aware and Privacy-Preserving Data-Forwarding Scheme for Urban Sensing Network. IEEE Trans. Veh. Technol. 65(4): 2578-2588 (2016) - [c50]Kai Zhou, Tianlong Song, Jian Ren, Tongtong Li:
Robust CDMA receiver design under disguised jamming. ICASSP 2016: 2179-2183 - [c49]Kai Zhou, Jian Ren:
Secure outsourcing of scalar multiplication on elliptic curves. ICC 2016: 1-5 - [c48]Kai Zhou, Jian Ren:
LinSOS: Secure outsourcing of linear computations based on affine mapping. ICC 2016: 1-5 - [c47]Kai Zhou, Jian Ren:
Secure Fine-Grained Access Control of Mobile User Data through Untrusted Cloud. ICCCN 2016: 1-9 - [i4]Kai Zhou, M. H. Afifi, Jian Ren:
ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing. CoRR abs/1602.08472 (2016) - 2015
- [j28]Chao Yang, Jianfeng Ma, Jian Ren:
Provable Ownership of Encrypted Files in De-duplication Cloud Storage. Ad Hoc Sens. Wirel. Networks 26(1-4): 43-72 (2015) - [j27]Yong Yu, Man Ho Au, Yi Mu, Shaohua Tang, Jian Ren, Willy Susilo, Liju Dong:
Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage. Int. J. Inf. Sec. 14(4): 307-318 (2015) - [j26]Qilian Liang, Jian Ren, Jing Liang, Baoju Zhang, Yiming Pi, Chenglin Zhao:
Security in big data. Secur. Commun. Networks 8(14): 2383-2385 (2015) - [j25]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of files in deduplication cloud storage. Secur. Commun. Networks 8(14): 2457-2468 (2015) - [j24]Di Tang, Tongtong Li, Jian Ren, Jie Wu:
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 26(4): 960-973 (2015) - [c46]Mai Abdelhakim, Zhaoxi Fang, Jian Ren, Tongtong Li:
Hybrid mobile access coordinated wireless sensor networks - Design and analysis. ChinaSIP 2015: 453-457 - [c45]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Reliable Communications over Multihop Networks under Routing Attacks. GLOBECOM 2015: 1-6 - [c44]Di Tang, Jian Ren:
A delay-aware and secure data forwarding scheme for urban sensing networks. ICC 2015: 3003-3007 - [c43]Jian Li, Tongtong Li, Jian Ren:
Rate-matched regenerating code in hostile networks. ICC 2015: 5728-5732 - [c42]Leron Lightfoot, Jian Ren:
R-STaR destination-location privacy schemes in wireless sensor networks. ICC 2015: 7335-7340 - [i3]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS Bound in Distributed Cloud Storage. CoRR abs/1510.01292 (2015) - [i2]Kai Zhou, Jian Ren:
CASO: Cost-Aware Secure Outsourcing of General Computational Problems. CoRR abs/1511.02375 (2015) - [i1]Jian Li, Tongtong Li, Jian Ren:
Optimal Construction of Regenerating Code through Rate-matching in Hostile Networks. CoRR abs/1511.02378 (2015) - 2014
- [j23]Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li:
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard. IEEE Trans. Inf. Forensics Secur. 9(5): 772-781 (2014) - [j22]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks. IEEE Trans. Parallel Distributed Syst. 25(4): 950-959 (2014) - [j21]Jian Li, Yun Li, Jian Ren, Jie Wu:
Hop-by-Hop Message Authenticationand Source Privacy in WirelessSensor Networks. IEEE Trans. Parallel Distributed Syst. 25(5): 1223-1232 (2014) - [j20]Tongtong Li, Mai Abdelhakim, Jian Ren:
N-Hop networks: a general framework for wireless systems. IEEE Wirel. Commun. 21(2): 98-105 (2014) - [c41]Jian Li, Tongtong Li, Jian Ren:
Secure regenerating code. GLOBECOM 2014: 770-774 - [c40]Tianlong Song, Zhaoxi Fang, Jian Ren, Tongtong Li:
Precoding for OFDM under disguised jamming. GLOBECOM 2014: 3958-3963 - [c39]Mai Abdelhakim, Jian Ren, Tongtong Li:
Throughput analysis and routing security discussions of mobile access coordinated wireless sensor networks. GLOBECOM 2014: 4616-4621 - [c38]Jian Li, Tongtong Li, Jian Ren:
Beyond the MDS bound in distributed cloud storage. INFOCOM 2014: 307-315 - [c37]Yong Yu, Jianbing Ni, Jian Ren, Wei Wu, Lanxiang Chen, Qi Xia:
Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures. ISPEC 2014: 359-372 - 2013
- [j19]Jian Ren, Lein Harn:
An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications. IEEE Trans. Wirel. Commun. 12(3): 1018-1025 (2013) - [c36]Chao Yang, Jian Ren, Jianfeng Ma:
Provable ownership of file in de-duplication cloud storage. GLOBECOM 2013: 695-700 - [c35]Jian Li, Tongtong Li, Jian Ren:
Combating network pollution attacks: A cascaded error-control coding approach. GLOBECOM 2013: 844-848 - [c34]Ahmed Alahmadi, Mai Abdelhakim, Jian Ren, Tongtong Li:
Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard. GLOBECOM 2013: 3229-3234 - [c33]Mai Abdelhakim, Leonard E. Lightfoot, Jian Ren, Tongtong Li:
Architecture design of mobile access coordinated wireless sensor networks. ICC 2013: 1720-1724 - 2012
- [j18]Yun Li, Jian Ren, Jie Wu:
Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(7): 1302-1311 (2012) - [j17]Lei Zhang, Jian Ren, Tongtong Li:
Time-Varying Jamming Modeling and Classification. IEEE Trans. Signal Process. 60(7): 3902-3907 (2012) - [j16]Tongtong Li, Jian Ren, Xiaochen Tang:
Secure wireless monitoring and control systems for smart grid and smart home. IEEE Wirel. Commun. 19(3): 66-73 (2012) - [j15]Tingting Jiang, Tongtong Li, Jian Ren:
Toward secure cognitive communications in wireless networks. IEEE Wirel. Commun. 19(4): 82-88 (2012) - [c32]Jian Li, Chao Yang, Di Tang, Tongtong Li, Jian Ren:
Characterization of linear network coding for pollution detection. GLOBECOM 2012: 1066-1071 - [c31]Mai Abdelhakim, Jian Ren, Tongtong Li:
Reliable OFDM system design under hostile multi-tone jamming. GLOBECOM 2012: 4290-4295 - [c30]Di Tang, Tongtong Li, Jian Ren:
Quantitative security and efficiency analysis of SEAR in wireless sensor networks. ICC 2012: 944-948 - [c29]Yun Li, Jian Li, Jian Ren, Jie Wu:
Providing hop-by-hop authentication and source privacy in wireless sensor networks. INFOCOM 2012: 3071-3075 - [c28]Mai Abdelhakim, Jian Ren, Tongtong Li:
Reliable Cooperative Sensing in Cognitive Networks - (Invited Paper). WASA 2012: 206-217 - 2011
- [j14]Lein Harn, Jian Ren:
Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications. IEEE Trans. Wirel. Commun. 10(7): 2372-2379 (2011) - [c27]Wenbo Qiao, Jian Li, Jian Ren:
An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding. GLOBECOM 2011: 1-5 - [c26]Jian Ren, Di Tang:
Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks. GLOBECOM 2011: 1-5 - [c25]Mai Abdelhakim, Lei Zhang, Jian Ren, Tongtong Li:
Cooperative sensing in cognitive networks under malicious attack. ICASSP 2011: 3004-3007 - 2010
- [j13]Jian Ren, Jie Wu:
Survey on anonymous communications in computer networks. Comput. Commun. 33(4): 420-431 (2010) - [j12]Jian Ren, Yun Li, Tongtong Li:
SPM: Source Privacy for Mobile Ad Hoc Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c24]Leron Lightfoot, Yun Li, Jian Ren:
Preserving Source-Location Privacy in Wireless Sensor Network Using STaR Routing. GLOBECOM 2010: 1-5 - [c23]Di Tang, Tingting Jiang, Jian Ren:
Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks. GLOBECOM 2010: 1-5 - [c22]Huahui Wang, Jian Ren, Tongtong Li:
Resource Allocation with Load Balancing for Cognitive Radio Networks. GLOBECOM 2010: 1-5 - [c21]Yun Li, Jian Ren:
Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks. INFOCOM 2010: 2660-2668 - [c20]Lei Zhang, Jian Ren, Tongtong Li:
A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping. WASA 2010: 235-244
2000 – 2009
- 2009
- [j11]Jian Ren:
A cryptographic watermarking technique for multimedia signals. Adv. Comput. Math. 31(1-3): 267-281 (2009) - [j10]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks. EURASIP J. Adv. Signal Process. 2009 (2009) - [j9]Lein Harn, Jian Ren, Changlu Lin:
Efficient identity-based GQ multisignatures. Int. J. Inf. Sec. 8(3): 205-210 (2009) - [j8]Lein Harn, Jian Ren, Changlu Lin:
Design of DL-based certificateless digital signatures. J. Syst. Softw. 82(5): 789-793 (2009) - [j7]Jian Ren:
An identity-based single-sign-on scheme for computer networks. Secur. Commun. Networks 2(3): 255-258 (2009) - [c19]Yun Li, Leron Lightfoot, Jian Ren:
Routing-based source-location privacy protection in wireless sensor networks. EIT 2009: 29-34 - [c18]Leonard E. Lightfoot, Lei Zhang, Jian Ren, Tongtong Li:
Jamming-resilient subcarrier assignment for OFDMA based space-time coded systems. EIT 2009: 260-265 - [c17]Lei Zhang, Jian Ren, Tongtong Li:
Jamming Mitigation Techniques Based on Message-Driven Frequency Hopping. GLOBECOM 2009: 1-6 - [c16]Jian Ren, Yun Li, Tongtong Li:
Routing-Based Source-Location Privacy in Wireless Sensor Networks. ICC 2009: 1-5 - [c15]Lei Zhang, Jian Ren, Tongtong Li:
Spectrally Efficient Anti-Jamming System Design Using Message-Driven Frequency Hopping. ICC 2009: 1-5 - [c14]Yun Li, Jian Ren:
Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks. ICCCN 2009: 1-6 - [c13]Jian Ren, Yun Li, Tongtong Li:
Providing Source Privacy in Mobile Ad Hoc Networks. MASS 2009: 332-341 - [c12]Yun Li, Jian Ren:
Preserving Source-Location Privacy in Wireless Sensor Networks. SECON 2009: 1-9 - [c11]Yun Li, Jian Ren:
Providing Source-Location Privacy in Wireless Sensor Networks. WASA 2009: 338-347 - 2008
- [j6]Lein Harn, Jian Ren:
Efficient identity-based RSA multisignatures. Comput. Secur. 27(1-2): 12-15 (2008) - [j5]Lein Harn, Jian Ren:
Design of Fully Deniable Authentication Service for E-mail Applications. IEEE Commun. Lett. 12(3): 219-221 (2008) - [j4]Jian Ren, Lein Harn:
Generalized Ring Signatures. IEEE Trans. Dependable Secur. Comput. 5(3): 155-163 (2008) - [c10]Jian Ren, Tongtong Li, Keesook Han:
Anonymous Communication Protocol in Overlay Networks. ICC 2008: 1648-1652 - [c9]Qi Ling, Jian Ren, Tongtong Li:
Spectrally Efficient Spread Spectrum System Design: Message-Driven Frequency Hopping. ICC 2008: 4775-4779 - [c8]Qi Ling, Jian Ren, Tongtong Li:
Message-Driven Frequency Hopping - Design and Analysis. WASA 2008: 373-384 - [c7]Jian Ren:
Privacy-Preserving Communication Algorithms and Network Protocols. WASA 2008: 515-525 - 2007
- [j3]Tongtong Li, Qi Ling, Jian Ren:
Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems. EURASIP J. Wirel. Commun. Netw. 2007 (2007) - [c6]Tongtong Li, Qi Ling, Jian Ren:
A Spectrally Efficient Frequency Hopping System. GLOBECOM 2007: 2997-3001 - 2006
- [c5]Tongtong Li, Huahui Wang, Jian Ren:
Non-uniform Information Transmission for Minimum Distortion in Wireless Networks. WASA 2006: 394-403 - [c4]Jian Ren, Lein Harn:
Ring Signature Based on ElGamal Signature. WASA 2006: 445-456 - 2005
- [c3]Qi Ling, Tongtong Li, Jian Ren:
Physical layer built-in security enhancement of DS-CDMA systems using secure block interleaving. GLOBECOM 2005: 5 - 2004
- [j2]Jian Ren:
Design of Long Period Pseudo-Random Sequences from the Addition of m-Sequences over Fp. EURASIP J. Wirel. Commun. Netw. 2004(1): 12-18 (2004) - [j1]Jian Ren:
On the Structure of Hermitian Codes and Decoding for Burst Errors. IEEE Trans. Inf. Theory 50(11): 2850-2854 (2004) - [c2]Jian Ren, Tongtong Li:
Design of pseudo-random spreading sequences for CDMA systems. GLOBECOM 2004: 775-779 - 2003
- [c1]Jian Ren:
On the structure of Hermitian codes and decoding for burst errors. GLOBECOM 2003: 1613-1617
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint