default search action
Jun Zheng 0007
Person information
- affiliation: Beijing Institute of Technology, School of Cyberspace Science and Technology, China
Other persons with the same name
- Jun Zheng — disambiguation page
- Jun Zheng 0001 — University of California, San Diego, USA
- Jun Zheng 0002 — Southeast University, Nanjing, China (and 2 more)
- Jun Zheng 0003 — New Mexico Institute of Mining and Technology, Socorro, NM, USA
- Jun Zheng 0004 — Southwest Jiaotong University, Chengdu, China
- Jun Zheng 0005 — Swiss Federal Institute of Aquatic Science and Technology, Duebendorf, Switzerland
- Jun Zheng 0006 — China University of Geosciences, Wuhan, China
- Jun Zheng 0008 — Baotou Teachers' College, Baotou, China
- Jun Zheng 0009 — Zhejiang University of Science and Technology, Hangzhou, China
- Jun Zheng 0010 — University of Texas, El Paso, TX, USA
- Jun Zheng 0011 — University of Michigan, Ann Arbor, MI, USA
- Jun Zheng 0012 — Delphi Delco Electronic Systems, Kokomo, IN, USA
- Jun Zheng 0013 — Applied Optoelectronics Inc, Sugar Land, TX, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Yu-an Tan, Quanxin Zhang, Yuanzhang Li:
ATT&CK-based Advanced Persistent Threat attacks risk propagation assessment model for zero trust networks. Comput. Networks 245: 110376 (2024) - [j31]Hui Xie, Jun Zheng, Shengjun Wei, Changzhen Hu:
Blockchain-and-6G-based Ubiquitous UAV Task Security Management Architecture. Comput. Commun. 217: 259-267 (2024) - [j30]Hui Xie, Jun Zheng, Zhengyuan Zhang, Shengjun Wei, Changzhen Hu:
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things. Computing 106(3): 939-960 (2024) - [j29]Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu:
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET. Peer Peer Netw. Appl. 17(2): 569-584 (2024) - 2023
- [j28]Jie Yang, Jun Zheng, Thar Baker, Shuai Tang, Yu-an Tan, Quanxin Zhang:
Clean-label poisoning attacks on federated learning for IoT. Expert Syst. J. Knowl. Eng. 40(5) (2023) - [j27]Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu:
TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing system. Future Gener. Comput. Syst. 140: 321-330 (2023) - [j26]Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Chun Shan, Changzhen Hu:
B-UAVM: A Blockchain-Supported Secure Multi-UAV Task Management Scheme. IEEE Internet Things J. 10(24): 21240-21253 (2023) - [j25]Shengang Hao, Jun Zheng, Jie Yang, Haipeng Sun, Quanxin Zhang, Li Zhang, Nan Jiang, Yuanzhang Li:
Deep reinforce learning for joint optimization of condition-based maintenance and spare ordering. Inf. Sci. 634: 85-100 (2023) - [j24]Haipeng Sun, Yu-an Tan, Liang Zhu, Qikun Zhang, Shan Ai, Jun Zheng:
A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration. J. Ambient Intell. Humaniz. Comput. 14(10): 13661-13672 (2023) - [j23]Jie Yang, Jun Zheng, Haochen Wang, Jiaxing Li, Haipeng Sun, Weifeng Han, Nan Jiang, Yu-An Tan:
Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning. Sensors 23(3): 1052 (2023) - [c12]Shuai Tang, Tianshi Mu, Jun Zheng, Yurong Fu, Quanxin Zhang, Jie Yang:
A Verifiable Dynamic Multi-secret Sharing Obfuscation Scheme Applied to Data LakeHouse. AIS&P (1) 2023: 316-327 - [c11]Rong Huang, Li Chen, Jun Zheng, Quanxin Zhang, Xiao Yu:
Adversarial Attacks Against Object Detection in Remote Sensing Images. AIS&P (1) 2023: 358-367 - 2022
- [j22]Qikun Zhang, Liang Zhu, Yongjiao Li, Zhaorui Ma, Junling Yuan, Jun Zheng, Shan Ai:
A group key agreement protocol for intelligent internet of things system. Int. J. Intell. Syst. 37(1): 699-722 (2022) - [j21]Jie Yang, Jun Zheng, Zheng Zhang, Q. I. Chen, Duncan S. Wong, Yuanzhang Li:
Security of federated learning for cloud-edge intelligence collaborative computing. Int. J. Intell. Syst. 37(11): 9290-9308 (2022) - [j20]Qikun Zhang, Liang Zhu, Ruifang Wang, Jianyong Li, Junling Yuan, Tiancai Liang, Jun Zheng:
Group key agreement protocol among terminals of the intelligent information system for mobile edge computing. Int. J. Intell. Syst. 37(12): 10442-10461 (2022) - [j19]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture. Int. J. Intell. Syst. 37(12): 11167-11187 (2022) - [j18]Shengang Hao, Jun Zheng, Jie Yang, Tiancai Liang, Yujie Liu, Li Zhang:
Reward optimization of spatial crowdsourcing for coalition-based maintenance task. Int. J. Intell. Syst. 37(12): 11382-11406 (2022) - [j17]Zequn Niu, Jingfeng Xue, Dacheng Qu, Yong Wang, Jun Zheng, Hongfei Zhu:
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT. Inf. Sci. 601: 162-174 (2022) - [c10]Shengang Hao, Jun Zheng, Jie Yang, Ziwei Ni, Quanxin Zhang, Li Zhang:
A Multi-agent Deep Reinforcement Learning-Based Collaborative Willingness Network for Automobile Maintenance Service. ACNS Workshops 2022: 84-103 - [c9]Jingci Zhang, Jun Zheng, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li:
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture. ACNS Workshops 2022: 104-123 - 2020
- [j16]Yu-an Tan, Shuo Feng, Xiaochun Cheng, Yuanzhang Li, Jun Zheng:
An Android Inline Hooking Framework for the Securing Transmitted Data. Sensors 20(15): 4201 (2020) - [c8]Yi Zheng, Hongchao Qin, Jun Zheng, Fusheng Jin, Rong-Hua Li:
Butterfly-Based Higher-Order Clustering on Bipartite Networks. KSEM (1) 2020: 485-497
2010 – 2019
- 2019
- [j15]Qikun Zhang, Yongjiao Li, Yong Gan, Chuanyang Zheng, Xiangyang Luo, Jun Zheng:
Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication. IEEE Access 7: 87085-87096 (2019) - [j14]Xiaohui Kuang, Hongyi Liu, Ye Wang, Qikun Zhang, Quanxin Zhang, Jun Zheng:
A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks. IEEE Access 7: 172938-172947 (2019) - 2018
- [j13]Yuan Xue, Yu-an Tan, Chen Liang, Yuanzhang Li, Jun Zheng, Quan-Xin Zhang:
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices. Inf. Sci. 444: 36-50 (2018) - [j12]Xiaosong Zhang, Chen Liang, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng, Yu-an Tan:
Building covert timing channels by packet rearrangement over mobile networks. Inf. Sci. 445-446: 66-78 (2018) - [j11]Yu-an Tan, Yuan Xue, Chen Liang, Jun Zheng, Quan-Xin Zhang, Jiamin Zheng, Yuanzhang Li:
A root privilege management scheme with revocable authorization for Android devices. J. Netw. Comput. Appl. 107: 69-82 (2018) - [j10]Chen Liang, Yu-an Tan, Xiaosong Zhang, Xianmin Wang, Jun Zheng, Quan-Xin Zhang:
Building packet length covert channel over mobile VoIP traffics. J. Netw. Comput. Appl. 118: 144-153 (2018) - [j9]Xiaosong Zhang, Yu-an Tan, Changyou Zhang, Yuan Xue, Yuanzhang Li, Jun Zheng:
A code protection scheme by process memory relocation for android devices. Multim. Tools Appl. 77(9): 11137-11157 (2018) - [j8]Yuan Xue, Yu-an Tan, Chen Liang, Changyou Zhang, Jun Zheng:
An optimized data hiding scheme for Deflate codes. Soft Comput. 22(13): 4445-4455 (2018) - [c7]Lele Guan, Jun Zheng, Chenyang Li, Dianxin Wang:
Research on Data Recovery Technology Based on Flash Memory Device. ICA3PP (2) 2018: 263-271 - 2017
- [j7]Xiaosong Zhang, Yu-an Tan, Yuan Xue, Quan-Xin Zhang, Yuanzhang Li, Can Zhang, Jun Zheng:
Cryptographic key protection against FROST for mobile devices. Clust. Comput. 20(3): 2393-2402 (2017) - [j6]Hongfei Zhu, Yu-an Tan, Xiaosong Zhang, Liehuang Zhu, Changyou Zhang, Jun Zheng:
A round-optimal lattice-based blind signature scheme for cloud services. Future Gener. Comput. Syst. 73: 106-114 (2017) - [c6]Shumin Shi, Heyan Huang, Jun Zheng:
From the perspective of teaching scheme: cultivating and training undergraduates driven by engineering education accreditation. ACM TUR-C 2017: 14:1-14:4 - [c5]Jiamin Zheng, Yu-an Tan, Xiaosong Zhang, Chen Liang, Changyou Zhang, Jun Zheng:
An Anti-Forensics Method against Memory Acquiring for Android Devices. CSE/EUC (1) 2017: 214-218 - 2016
- [j5]Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Yuanzhang Li, Jun Zheng:
Determining image base of firmware for ARM devices by matching literal pools. Digit. Investig. 16: 19-28 (2016) - [j4]Ruijin Zhu, Yu-an Tan, Quan-Xin Zhang, Fei Wu, Jun Zheng, Yuan Xue:
Determining Image Base of Firmware Files for ARM Devices. IEICE Trans. Inf. Syst. 99-D(2): 351-359 (2016) - 2015
- [j3]Li Zhang, Shen-Gang Hao, Jun Zheng, Yu-an Tan, Quan-xin Zhang, Yuan-zhang Li:
Descrambling data on solid-state disks by reverse-engineering the firmware. Digit. Investig. 12: 77-87 (2015) - [c4]Fengxia Li, Dongni Li, Jun Zheng, Sanyuan Zhao:
Virtual experiments for introduction of computing: Using virtual reality technology. FIE 2015: 1-5 - 2013
- [c3]Jun Zheng, Sanchun Xu, Fangfang Zhao, Dianxin Wang, Yuanjun Li:
A novel detective and self-organized certificateless key management scheme in mobile ad hoc networks. GrC 2013: 443-448 - 2011
- [j2]Qikun Zhang, Jun Zheng, Yu-an Tan, Ruifang Wang, Yuanzhang Li:
Cross-domain Authentication Alliance Protocol Based on Isomorphic Groups. J. Comput. 6(4): 650-656 (2011) - [j1]Jun Zheng, Kun Qi Zhang, Wen Shang Zheng, An Yu Tan:
Dynamic Role-Based Access Control Model. J. Softw. 6(6): 1096-1102 (2011) - [c2]Jun Zheng, Yu-an Tan, Qikun Zhang, Xin Sun, Yichun Chen:
An Improved Cross-Domain Role-Based Authorization Management Model. ICAIC (4) 2011: 526-537 - [c1]Jun Zheng, Yu-an Tan, Qikun Zhang, Chunxiao Gao, Siyuan Wang:
A RBAC Model Based on Multi-granularities of Time Constraints. ICAIC (4) 2011: 538-549
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint