


default search action
Zhengjun Jing
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Zhengjun Jing, Xiaolong Xu, Chunseng Gu, Yan Zhang, Qiang Shu:
A Security-enhanced Advertising Platform based on Blockchain and Edge Computing in Generative AI. Appl. Artif. Intell. 38(1) (2024) - [j15]Xiangyu Cao
, Zhengjun Jing
, Xiaorong Zhao, Xiaolong Xu:
A security-enhanced equipment predictive maintenance solution for the ETO manufacturing. Int. J. Netw. Manag. 34(6) (2024) - 2021
- [j14]Zhengjun Jing
, Chunsheng Gu, Chunpeng Ge, Peizhong Shi:
Cryptanalysis of a Public Key Cryptosystem Based on Data Complexity under Quantum Environment. Mob. Networks Appl. 26(4): 1609-1615 (2021) - [j13]Pengli Nie, Guangquan Xu, Litao Jiao, Shaoying Liu, Jian Liu, Weizhi Meng, Hongyue Wu, Meiqi Feng, Weizhe Wang
, Zhengjun Jing, Xi Zheng:
Sparse Trust Data Mining. IEEE Trans. Inf. Forensics Secur. 16: 4559-4573 (2021) - [j12]Chenkai Tan
, Shaoyi Bei
, Zhengjun Jing
, Neal N. Xiong
:
An Atomic Cross-Chain Swap-Based Management System in Vehicular Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2021: 6679654:1-6679654:14 (2021) - 2020
- [j11]Zhengjun Jing
, Chunsheng Gu, Yong Li, Mengshi Zhang, Guangquan Xu, Alireza Jolfaei
, Peizhong Shi, Chenkai Tan
, James Xi Zheng
:
Security analysis of indistinguishable obfuscation for internet of medical things applications. Comput. Commun. 161: 202-211 (2020) - [c4]Chenkai Tan, Zhengjun Jing
, Shaoyi Bei:
Atomic Cross-Chain Swap-Based Decentralized Management System in Vehicular Networks. FCS 2020: 243-253 - [c3]Bo Song, Zhengjun Jing
, Y. Jay Guo, Ren Ping Liu, Qian Zhou:
A Novel Measure to Quantify the Robustness of Social Network Under the Virus Attacks. SocialSec 2020: 189-200
2010 – 2019
- 2019
- [j10]Peizhong Shi
, Chunsheng Gu, Chunpeng Ge, Zhengjun Jing
:
QoS Aware Routing Protocol Through Cross-layer Approach in Asynchronous Duty-Cycled WSNs. IEEE Access 7: 57574-57591 (2019) - [j9]Zhengjun Jing
, Chunsheng Gu, Zhimin Yu, Peizhong Shi, Chongzhi Gao:
Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement. Clust. Comput. 22(Suppl 1): 1717-1727 (2019) - 2018
- [j8]Zhimin Yu, Chong-Zhi Gao
, Zhengjun Jing
, Brij Bhooshan Gupta
, Qiu-ru Cai:
A Practical Public Key Encryption Scheme Based on Learning Parity With Noise. IEEE Access 6: 31918-31923 (2018) - [j7]Zhengjun Jing
, Guoping Jiang, Chunsheng Gu:
A novel identity-based anonymous authentication scheme from multilinear maps. Int. J. Inf. Commun. Technol. 12(1/2): 16-30 (2018) - [j6]Zhimin Yu, Chunsheng Gu, Zhengjun Jing
, Qiu-ru Cai, Ye Luo, Yao Wang:
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem: revisited. Multim. Tools Appl. 77(9): 11307-11320 (2018) - 2017
- [j5]Peizhong Shi, Chunsheng Gu, Zhengjun Jing, Zhimin Yu:
A Constraint-Based Forwarding for Multi-hop Broadcasts in Asynchronous Duty-Cycled WSNs. Ad Hoc Sens. Wirel. Networks 37(1-4): 1-34 (2017) - [j4]Zhimin Yu, Zhengjun Jing, Hua Yang, Chunsheng Gu:
ID-based multi-receiver signcryption scheme in the standard model. Int. J. Internet Protoc. Technol. 10(1): 4-12 (2017) - 2016
- [j3]Zhengjun Jing
, Guoping Jiang, Chunsheng Gu, Zhimin Yu, Lingling Xu:
Anonymous authentication for circuits from correlation-relaxed two-to-one recoding. J. Ambient Intell. Humaniz. Comput. 7(2): 153-161 (2016) - 2015
- [j2]Zhimin Yu, Zhengjun Jing, Chunsheng Gu:
基于多线性映射的环签密广播公钥方案 (Ring Signcryption Broadcasting Scheme Based on Multilinear Maps). 计算机科学 42(3): 106-110 (2015) - [j1]Jin Qian, Ping Lv, Xiaodong Yue, Caihui Liu, Zhengjun Jing
:
Hierarchical attribute reduction algorithms for big data using MapReduce. Knowl. Based Syst. 73: 18-31 (2015) - [c2]Chunsheng Gu, Zhimin Yu, Zhengjun Jing
, Peizhong Shi, Jin Qian:
Improvement of GGH Multilinear Map. 3PGCIC 2015: 407-411 - 2014
- [c1]Zhengjun Jing
, Guoping Jiang, Chunsheng Gu:
A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps. 3PGCIC 2014: 151-156
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:54 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint