default search action
Jing Zhan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]Tao Zhao, Xuelei Fu, Yinghong Zhou, Jing Zhan, Kewei Chen, Zhengying Li:
Noncontact Monitoring of Heart Rate Variability Using a Fiber Optic Sensor. IEEE Internet Things J. 10(17): 14988-14994 (2023) - 2022
- [c12]Jing Zhan:
Remote Sharing of National Music Teaching Resources Based on Big Data Analysis. eLEOT (2) 2022: 282-292 - [c11]Jing Zhan:
Assessment and Evaluation System of Preschool Education Curriculum Based on Big Data. eLEOT (2) 2022: 640-653 - 2021
- [j6]Yanhui Liu, Jianbiao Zhang, Jing Zhan:
Privacy protection for fog computing and the internet of things data based on blockchain. Clust. Comput. 24(2): 1331-1345 (2021) - [j5]Junxi Zhuang, Xu Zhao, Bei Gong, Jing Zhan:
A trusted behaviour measurement scheme based on feedback and control in trusted network. Int. J. Wirel. Mob. Comput. 20(2): 99-106 (2021) - [c10]Yajing Luo, Peng Liang, Chong Wang, Mojtaba Shahin, Jing Zhan:
Characteristics and Challenges of Low-Code Development: The Practitioners' Perspective. ESEM 2021: 12:1-12:11 - [i1]Yajing Luo, Peng Liang, Chong Wang, Mojtaba Shahin, Jing Zhan:
Characteristics and Challenges of Low-Code Development: The Practitioners' Perspective. CoRR abs/2107.07482 (2021) - 2020
- [j4]Jing Zhan, Xudong Fan, Jin Han, Yaqi Gao, Xiaoqing Xia, Qian Zhang:
CIADL: cloud insider attack detector and locator on multi-tenant network isolation: an OpenStack case study. J. Ambient Intell. Humaniz. Comput. 11(9): 3473-3495 (2020) - [c9]Jing Zhan, Xue Fan, Yong Zhao:
Automatic Rules Generation for Teaching Strategies Improvement. CSAE 2020: 97:1-97:5
2010 – 2019
- 2016
- [j3]Li Lin, Shuang Li, Bo Li, Jing Zhan, Yong Zhao:
TVGuarder: A Trace-Enable Virtualization Protection Framework against Insider Threats for IaaS Environments. Int. J. Grid High Perform. Comput. 8(4): 1-20 (2016) - [c8]Zhiyong Huang, Biao Xiong, Cao Tian, Jing Zhan, Xiang Fei, Nazaraf Shah:
Dust and Reflection Removal from Videos Captured in Moving Car. ICEBE 2016: 182-187 - 2015
- [c7]Zheng Tao, Jun Hu, Jing Zhan, Mo Li, Chunzi Chen:
An Application-Oriented Efficient Encapsulation System for Trusted Software Development. INTRUST 2015: 153-168 - 2014
- [j2]Zhen-Hu Ning, Wei Jiang, Jing Zhan, Peng Liang:
Property-Based Anonymous Attestation in Trusted Cloud Computing. J. Electr. Comput. Eng. 2014: 687158:1-687158:7 (2014) - 2013
- [c6]Li Wang, Rui Ma, Chen Zhang, Zongyu Dong, Xin Wang, Zitao Shi, Jian Liu, Lin Lin, Hui Zhao, Fei Lu, Qiang Fang, Chen Yang, Jing Zhan, Tianling Ren, Xinxin Li, Ru Huang, Albert Z. Wang:
Heterogeneous integration of nano enabling devices for 3D ICs. ISLPED 2013: 249-254 - 2010
- [j1]Huanguo Zhang, Fei Yan, Jianming Fu, Mingdi Xu, Yang Yang, Fan He, Jing Zhan:
Research on theory and key technology of trusted computing platform security testing and evaluation. Sci. China Inf. Sci. 53(3): 434-453 (2010) - [c5]Zhi-Dong Shen, Xiaoping Wu, Jing Zhan:
Trust management for mobile agent system based on trusted computing platforms. WCNIS 2010: 717-721
2000 – 2009
- 2009
- [c4]René Korthaus, Ahmad-Reza Sadeghi, Christian Stüble, Jing Zhan:
A practical property-based bootstrap architecture. STC 2009: 29-38 - [c3]Luigi Catuogno, Alexandra Dmitrienko, Konrad Eriksson, Dirk Kuhlmann, Gianluca Ramunno, Ahmad-Reza Sadeghi, Steffen Schulz, Matthias Schunter, Marcel Winandy, Jing Zhan:
Trusted Virtual Domains - Design, Implementation and Lessons Learned. INTRUST 2009: 156-179 - 2008
- [c2]Jing Zhan, Huanguo Zhang, Bingyu Zou, Xiaofei Li:
Research on Automated Testing of the Trusted Platform Model. ICYCS 2008: 2335-2339 - 2007
- [c1]Jing Zhan, Huanguo Zhang, Fei Yan:
Building Trusted Sub-domain for the Grid with Trusted Computing. Inscrypt 2007: 463-471
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint