default search action
Jian Xu 0004
Person information
- affiliation (PhD 2013): Northeastern University, Software College, Shenyang, China
Other persons with the same name
- Jian Xu — disambiguation page
- Jian Xu 0001 — Hangzhou Dianzi University, Institute of Computer Application Technology, China (and 1 more)
- Jian Xu 0002 — University of Minnesota Twin Cities, Department of Biomedical Engineering, Minneapolis, MN, USA (and 2 more)
- Jian Xu 0003 — Sun Yat-sen University, School of Information Management, Guangzhou, China
- Jian Xu 0005 — Fudan University, Shanghai Engineering Research Center of AI & Robotics, China (and 2 more)
- Jian Xu 0006 — Microsoft Research Asia, Beijing, China
- Jian Xu 0007 — Hubei University for Nationalities, School of Information Engineering, Enshi, China
- Jian Xu 0008 — German Aerospace Center (DLR), Remote Sensing Technology Institute, Oberpfaffenhofen, Germany
- Jian Xu 0009 — Nanjing University of Science and Technology, School of Computer Science and Engineering, China
- Jian Xu 0010 — Chinese Academy of Sciences, School of Cyber Security, Institute of Information Engineering, Beijing, China
- Jian Xu 0011 — University of Erlangen-Nuremberg, Germany
- Jian Xu 0012 — University of California, San Diego, USA
- Jian Xu 0013 — Stony Brook University, Department of Computer Science, NY, USA
- Jian Xu 0014 — Hong Kong Polytechnic University, Department of Computing
- Jian Xu 0015 — Alibaba Group, Beijing, China (and 3 more)
- Jian Xu 0016 — Tsinghua University, Tsinghua-Berkeley Shenzhen Institute, Tsinghua Shenzhen International Graduate School, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j41]Qiang Wang, Ying Wang, Fucai Zhou, Jian Xu, Changsheng Zhang:
Privacy-preserving fair outsourcing polynomial computation without FHE and FPR. Comput. Stand. Interfaces 91: 103899 (2025) - 2024
- [j40]Fucai Zhou, Qiyu Wu, Pengfei Wu, Jian Xu, Da Feng:
Privacy-preserving and verifiable data aggregation for Internet of Vehicles. Comput. Commun. 218: 198-208 (2024) - [j39]Chen Wang, Jian Xu, Haoran Li, Fucai Zhou, Qiang Wang:
Privacy-preserving and verifiable classifier training in edge-assisted mobile communication systems. Comput. Commun. 220: 65-80 (2024) - [j38]Chen Wang, Jian Xu, Shanru Tan, Long Yin:
Secure decision tree classification with decentralized authorization and access control. Comput. Stand. Interfaces 89: 103818 (2024) - [j37]Bao Li, Fucai Zhou, Qiang Wang, Jian Xu, Da Feng:
SEDCPT: A secure and efficient Dynamic Searchable Encryption scheme with cluster padding assisted by TEE. J. Syst. Archit. 154: 103221 (2024) - 2023
- [j36]Qiyu Wu, Fucai Zhou, Jian Xu, Da Feng:
Lightweight and Verifiable Secure Aggregation for Multi-dimensional Data in Edge-enhanced IoT. Comput. Networks 237: 110079 (2023) - [j35]Long Yin, Jian Xu, Chen Wang, Qiang Wang, Fucai Zhou:
Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system. J. Syst. Archit. 143: 102957 (2023) - 2022
- [j34]Qiyu Wu, Fucai Zhou, Jian Xu, Qiang Wang, Da Feng:
Secure and efficient multifunctional data aggregation without trusted authority in edge-enhanced IoT. J. Inf. Secur. Appl. 69: 103270 (2022) - [j33]Qiang Wang, Fucai Zhou, Jian Xu, Su Peng:
Tag-Based Verifiable Delegated Set Intersection Over Outsourced Private Datasets. IEEE Trans. Cloud Comput. 10(2): 1201-1214 (2022) - [j32]Qiang Wang, Fucai Zhou, Boyang Zhou, Jian Xu, Chunyu Chen, Qi Wang:
Privacy-Preserving Publicly Verifiable Databases. IEEE Trans. Dependable Secur. Comput. 19(3): 1639-1654 (2022) - [c21]Long Yin, Jian Xu, Heqiu Chai, Chen Wang:
A Manipulated Overlapped Voltage Attack Detection Mechanism for Voltage-Based Vehicle Intrusion Detection System. FCS 2022: 413-428 - 2021
- [j31]Qiang Wang, Fucai Zhou, Jian Xu, Zifeng Xu:
Efficient verifiable databases with additional insertion and deletion operations in cloud computing. Future Gener. Comput. Syst. 115: 553-567 (2021) - [j30]Xiaohan Yue, Mengzhe Xi, Bing Chen, Mingchao Gao, Yuan He, Jian Xu:
A Revocable Group Signatures Scheme to Provide Privacy-Preserving Authentications. Mob. Networks Appl. 26(4): 1412-1429 (2021) - [j29]Jian Xu, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou:
Role-Based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem. Mob. Networks Appl. 26(4): 1475-1492 (2021) - [j28]Shiyue Qin, Zhenhua Tan, Fucai Zhou, Jian Xu, Zongye Zhang:
A Verifiable Steganography-Based Secret Image Sharing Scheme in 5G Networks. Secur. Commun. Networks 2021: 6629726:1-6629726:14 (2021) - [j27]Jian Xu, Qingyu Meng, Jun Wu, James Xi Zheng, Xuyun Zhang, Suraj Sharma:
Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems. IEEE Trans. Ind. Informatics 17(6): 4279-4287 (2021) - [c20]Chen Wang, Jian Xu, Long Yin:
A Secure Cloud-Edge Collaborative Logistic Regression Model. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: 244-253 - [c19]Xiaohan Yue, Shuaishuai Zeng, Xibo Wang, Lixin Yang, Jian Xu, Shi Bai, Yuan He:
A Revocable Zone Encryption Scheme with Anonymous Authentication for C-ITS. TrustCom 2021: 232-239 - [c18]Xiaohan Yue, Lixin Yang, Xibo Wang, Shuaishuai Zeng, Jian Xu, Shi Bai, Yuan He:
An Aggregate Anonymous Credential Scheme in C-ITS for Multi-Service with Revocation. TrustCom 2021: 452-459 - 2020
- [j26]Qiang Wang, Fucai Zhou, Jian Xu, Zifeng Xu:
A (Zero-Knowledge) Vector Commitment with Sum Binding and its Applications. Comput. J. 63(4): 633-647 (2020) - [j25]Jian Xu, Laiwen Wei, Wei Wu, Andi Wang, Yu Zhang, Fucai Zhou:
Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system. Future Gener. Comput. Syst. 108: 1287-1296 (2020) - [j24]Jian Xu, Heng Liu, Dexin Wu, Fucai Zhou, Chong-zhi Gao, Linzhi Jiang:
Generating universal adversarial perturbation with ResNet. Inf. Sci. 537: 302-312 (2020) - [j23]Fucai Zhou, Qiang Wang, Jian Xu, Su Peng, Zifeng Xu:
Chameleon accumulator and its applications. J. Inf. Secur. Appl. 50 (2020) - [j22]Chen Wang, Andi Wang, Jian Xu, Qiang Wang, Fucai Zhou:
Outsourced privacy-preserving decision tree classification service over encrypted data. J. Inf. Secur. Appl. 53: 102517 (2020) - [j21]Minghui Gao, Li Ma, Heng Liu, Zhijun Zhang, Zhiyan Ning, Jian Xu:
Malicious Network Traffic Detection Based on Deep Neural Networks and Association Analysis. Sensors 20(5): 1452 (2020) - [j20]Jian Xu, Andi Wang, Jun Wu, Chen Wang, Ruijin Wang, Fucai Zhou:
SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing. IEEE Trans. Comput. Soc. Syst. 7(1): 261-274 (2020) - [j19]Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu:
Privacy-Preserving Graph Operations for Mobile Authentication. Wirel. Commun. Mob. Comput. 2020: 8859213:1-8859213:13 (2020) - [c17]Ying Wu, Zibo Qi, Ling Jiang, Changsheng Zhang, Jian Xu:
A Multi-objective Ant Colony Optimization Algorithm with Local Optimum Avoidance Strategy. ML4CS (2) 2020: 427-435 - [c16]Ying Wu, Zibo Qi, Ling Jiang, Zifeng Dai, Chen Zhang, Changsheng Zhang, Jian Xu:
Weights Optimization Method of Differential Evolution Based on Artificial Bee Colony Algorithm. SimuTools (1) 2020: 626-635 - [c15]Peng Li, Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu:
Privacy-Preserving Graph Operations for Social Network Analysis. SocialSec 2020: 303-317
2010 – 2019
- 2019
- [j18]Jian Xu, Yuanjing Zhang, Kuiyuan Fu, Su Peng:
SGX-Based Secure Indexing System. IEEE Access 7: 77923-77931 (2019) - [j17]Minghui Gao, Bo Li, Chen Wang, Li Ma, Jian Xu:
User Behavior Clustering Scheme With Automatic Tagging Over Encrypted Data. IEEE Access 7: 170648-170657 (2019) - [j16]Qiyu Wu, Fucai Zhou, Jian Xu, Da Feng, Bao Li:
Lightweight Privacy-Preserving Equality Query in Edge Computing. IEEE Access 7: 182588-182599 (2019) - [j15]Qiang Wang, Fucai Zhou, Su Peng, Jian Xu:
Publicly verifiable function secret sharing. Int. J. Comput. Sci. Eng. 20(4): 526-535 (2019) - [j14]Zifeng Xu, Fucai Zhou, Yuxi Li, Jian Xu, Qiang Wang:
Privacy-Preserving Subgraph Matching Protocol for Two Parties. Int. J. Found. Comput. Sci. 30(4): 571-588 (2019) - [j13]Qiyu Wu, Fucai Zhou, Jian Xu, Qiang Wang:
Secure data stream outsourcing with publicly verifiable integrity in cloud storage. J. Inf. Secur. Appl. 49 (2019) - [c14]Chen Wang, Andi Wang, Xinyu Liu, Jian Xu:
Research on K-Means Clustering Algorithm Over Encrypted Data. CSS (2) 2019: 182-191 - [c13]Ying Wu, Jian Xu, Changsheng Zhang:
A Heuristic Scout Search Mechanism for Artificial Bee Colony Algorithm. ICNC-FSKD 2019: 271-278 - 2018
- [j12]Jian Xu, Laiwen Wei, Yu Zhang, Andi Wang, Fucai Zhou, Chong-zhi Gao:
Dynamic Fully Homomorphic encryption-based Merkle Tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107: 113-124 (2018) - [c12]Andy Wang, Chen Wang, Meng Bi, Jian Xu:
A Review of Privacy-Preserving Machine Learning Classification. ICCCS (4) 2018: 671-682 - [c11]Lin Hou, Laiwen Wei, Chen Wang, Andi Wang, Jian Xu:
Research on Two-Factor Identity Authentication System Based on Smart Phone and User Password. ICCCS (5) 2018: 712-723 - 2017
- [j11]Jian Xu, Fuxiang Li, Ke Chen, Fucai Zhou, Junho Choi, Juhyun Shin:
Dynamic Chameleon Authentication Tree for Verifiable Data Streaming in 5G Networks. IEEE Access 5: 26448-26459 (2017) - [j10]Su Peng, Fucai Zhou, Qiang Wang, Zifeng Xu, Jian Xu:
Identity-Based Public Multi-Replica Provable Data Possession. IEEE Access 5: 26990-27001 (2017) - [j9]Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu:
Identity-Based Batch Provable Data Possession with Detailed Analyses. Int. J. Found. Comput. Sci. 28(6): 743-760 (2017) - [j8]Jian Xu, Si-Jia Zhao, Fucai Zhou:
Privacy Protection Model Based on Digital Envelope and Dummies for Location-Based Services. J. Inf. Sci. Eng. 33(4): 965-978 (2017) - [c10]Fucai Zhou, Zifeng Xu, Yuxi Li, Jian Xu, Su Peng:
Private Graph Intersection Protocol. ACISP (2) 2017: 235-248 - [c9]Meng Bi, Andi Wang, Jian Xu, Fucai Zhou:
DDOS Attack Detection System Based on Analysis of Users' Behaviors for Application Layer. CSE/EUC (1) 2017: 596-599 - [c8]Ying Wu, Yongping Zhu, Fang Xu, Jian Xu:
Analysis Model for Fire Accidents of Electric Bicycles Based on Principal Component Analysis. CSE/EUC (1) 2017: 760-762 - [c7]Chenke Luo, Feng Yuan, Qiyuan Gao, Jiateng Yang, Jian Xu:
Anti-Reverse-Engineering Tool of Executable Files on the Windows Platform. CSE/EUC (1) 2017: 797-800 - [c6]Zifeng Xu, Fucai Zhou, Yuxi Li, Jian Xu, Qiang Wang:
Private Subgraph Matching Protocol. ProvSec 2017: 455-470 - 2016
- [j7]Fucai Zhou, Yuxi Li, Qingshi Zhou, Jingwei Miao, Jian Xu:
The electronic cash system based on non-interactive zero-knowledge proofs. Int. J. Comput. Math. 93(2): 239-257 (2016) - [j6]Meng Bi, Jian Xu, Mo Wang, Fucai Zhou:
Anomaly detection model of user behavior based on principal component analysis. J. Ambient Intell. Humaniz. Comput. 7(4): 547-554 (2016) - [j5]Jian Xu, Fucai Zhou, Zhihao Jiang, Rui Xue:
Dynamic proofs of retrievability with square-root oblivious RAM. J. Ambient Intell. Humaniz. Comput. 7(5): 611-621 (2016) - [j4]Jian Xu, Mingjie Li, Fucai Zhou, Rui Xue:
基于用户鼠标行为的身份认证方法 (Identity Authentication Method Based on User's Mouse Behavior). 计算机科学 43(2): 148-154 (2016) - [j3]Su Peng, Fucai Zhou, Jian Xu, Zifeng Xu:
Comments on "Identity-Based Distributed Provable Data Possession in Multicloud Storage". IEEE Trans. Serv. Comput. 9(6): 996-998 (2016) - [c5]Fucai Zhou, Su Peng, Jian Xu, Zifeng Xu:
Identity-Based Batch Provable Data Possession. ProvSec 2016: 112-129 - 2014
- [c4]Jian Xu, Ze Cao, Qiong Xiao, Fucai Zhou:
An Improved Authenticated Skip List for Relational Query Authentication. BWCCA 2014: 229-232 - 2013
- [j2]Jian Xu, Yuxi Li, Jingwei Miao, Fucai Zhou:
The Electronic Cash Protocol Based on Dynamic Group Signature. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 65-79 (2013) - 2011
- [c3]Guang-Ming Yang, Xiao Yang, Zhenhua Tan, Jian Xu:
Research on Embedding Compressed Watermarking Based on Chaotic and Wavelet Algorithm. CSEE (5) 2011: 233-239
2000 – 2009
- 2008
- [j1]Fucai Zhou, Jun Zhang, Jian Xu:
Research on anonymous signatures and group signatures. Comput. Commun. 31(17): 4199-4205 (2008) - [c2]Fucai Zhou, Jian Xu, Long Lin, Haifang Xu:
Multicast Key Management Scheme Based on TOFT. HPCC 2008: 1030-1035 - [c1]Jian Xu, Fucai Zhou, Xinyang Li, Muzhou Yang:
Hierarchical Data Processing Model and Complete Tree Key Management Mechanism. ICYCS 2008: 1606-1612
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-02 23:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint