Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Zhanbing Wu
Claudia Calabrese
Maria Concetta Palumbo
Ravi Mehta
Huifang Yan
Jhonathan Pinzon
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Home
/
Author
/
JIANFENG CHU
Author Info
Open Visualization
Name
Affiliation
Papers
JIANFENG CHU
Jilin Univ, Dept Comp Sci & Technol, Changchun, Jilin, Peoples R China
24
Collaborators
Citations
PageRank
38
19
8.60
Referers
Referees
References
64
520
187
Search Limit
100
520
Publications (24 rows)
Collaborators (38 rows)
Referers (64 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A Sparse Bayesian Learning Method for Structural Equation Model-Based Gene Regulatory Network Inference.
0
0.34
2020
A Secure Authentication and Key Agreement Scheme for IoT-Based Cloud Computing Environment.
2
0.40
2020
An Authentication Scheme To Defend Against Udp Drdos Attacks In 5g Networks
0
0.34
2019
An Unsupervised Approach For Keyphrase Extraction Using Within-Collection Resources
0
0.34
2019
Updated SSDP Scheme for DDoS Attack Defense.
0
0.34
2018
The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.
0
0.34
2018
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.
0
0.34
2017
The efficiency improved scheme for secure access control of digital video distribution
0
0.34
2016
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.
0
0.34
2015
The Research and Outlook for Keyword-Based Searchable Encryption in Cloud Storage.
0
0.34
2015
Analysis And Improvement Of A Robust User Authentication Framework For Ubiquitous Sensor Networks
2
0.37
2014
Analysis and Improvement for SPINS.
0
0.34
2013
Secure event signature protocol for peer-to-peer massive multiplayer online games using bilinear pairing.
0
0.34
2013
Intrusion Classifier Based On Multiple Attribute Selection Algorithms
0
0.34
2013
A Survey on Green Computing Based on Cloud Environment.
0
0.34
2013
A Survey on Key Management of Identity-based Schemes in Mobile Ad Hoc Networks.
3
0.39
2013
Cryptanalysis And Improvement Of An Id-Based Threshold Signcryption Scheme
3
0.41
2012
A Survey on Data Migration Management in Cloud Environment.
0
0.34
2012
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.
2
0.39
2012
Analysis and Enhancement of Three Identity-based Signcryption Protocols.
3
0.46
2012
Cryptanalysis of Three Event Signature Protocols for Peer-to-peer Massively Multiplayer Online Games.
0
0.34
2012
An Improved Dynamic Password based Group Key Agreement against Dictionary Attack.
2
0.38
2012
Enhancement of an Authenticated 3-round Identity-Based Group Key Agreement Protocol.
0
0.34
2011
Cryptanalysis and Improvement of Selvi et al.'s Identity-Based Threshold Signcryption Scheme.
2
0.40
2011
1