Name
Papers
Collaborators
JIANFENG MA
72
170
Citations 
PageRank 
Referers 
340
40.21
921
Referees 
References 
1166
549
Search Limit
1001000
Title
Citations
PageRank
Year
A Secure Decentralized Spatial Crowdsourcing Scheme for 6G-Enabled Network in Box00.342022
Efficient Data Retrieval Over Encrypted Attribute-Value Type Databases in Cloud-Assisted Ehealth Systems00.342022
An Explainable Diagnostic Method For Autism Spectrum Disorder Using Neural Network00.342021
Optimized Fuzzy Commitment Based Key Agreement Protocol for Wireless Body Area Network10.352021
Privacy-preserving Diverse Keyword Search and Online Pre-diagnosis in Cloud Computing00.342021
(t, k, n) XOR-based visual cryptography scheme with essential shadows00.342020
Research on Remaining Useful Life Prediction of Rolling Element Bearings Based on Time-Varying Kalman Filter20.382020
A Construction Method of (2, 3) Visual Cryptography Scheme10.362020
FEM assessment of the effects of machining parameters in vibration assisted nano impact machining of silicon by loose abrasives.00.342020
Cheating Detection in (k, n) Secret Image Sharing Scheme.00.342019
A Topology Based Differential Privacy Scheme for Average Path Length Query00.342019
一种面向二进制的细粒度控制流完整性方法 (Fine-grained Control Flow Integrity Method on Binaries).00.342019
Detection of GPS Spoofing Attack on Unmanned Aerial Vehicle System.10.342019
Lightweight Security Authentication Mechanism Towards UAV Networks10.352019
Challenges in Covert Wireless Communications with Active Warden on AWGN channels.00.342019
Publicly verifiable database scheme with efficient keyword search.60.422019
Covert Wireless Communications with Active Eavesdropper on AWGN Channels.00.342018
ProactiveCrowd: Modelling Proactive Steering Behaviours for Agent-Based Crowd Simulation.00.342018
The Sound and the Fury: Hiding Communications in Noisy Wireless Networks with Interference Uncertainty.20.372017
Test of Mechanical Failure for Via Holes and Solder Joints of Complex Interconnect Structure.10.382017
Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization.00.342017
An untraceable temporal-credential-based two-factor authentication scheme using ECC for wireless sensor networks.290.752016
Attack gives me power: DoS-defending constant-time privacy-preserving authentication of low-cost devices such as backscattering RFID tags00.342016
An approach to quality assessment for web service selection based on the analytic hierarchy process for cases of incomplete information00.342015
A collaborative self-governing privacy-preserving wireless sensor network architecture based on location optimization for dynamic service discovery in MANET environment00.342015
Numerical investigation of restricted contact cutting tool in machining of AISI 1045 steel00.342015
A Security Quantitative Analysis Method For Access Control Based on Security Entropy.20.442015
Eroca: A Framework for Efficiently Recovering Outsourced Ciphertexts for Autonomous Vehicles.00.342015
基于离散Hermite多项式的图像压缩 (Image Compression Based on Discrete Hermite Polynomials).00.342015
Cryptanalysis of smart-card-based password authenticated key agreement protocol for session initiation protocol of Zhang et al.250.662015
Improvement of robust smart-card-based password authentication scheme240.642015
Robust Two-Factor Authentication and Key Agreement Preserving User Privacy.00.342014
Measurement on the border effect of transboundary water resources: A case study of China's Zhanghe basin00.342014
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing00.342013
Game Optimization for Time-Critical Multicast Data Origin Authentication: Trade Off between Security and Efficiency00.342013
Generalized Secure Transmission Protocol for Flexible Load-Balance Control with Cooperative Relays in Two-Hop Wireless Networks10.382013
Improving security and efficiency for multi-authority access control system in cloud storage.00.342013
Distributed Information Flow Verification Framework For The Composition Of Service Chain In Wireless Sensor Network40.402013
An novel three-party authenticated key exchange protocol using one-time key210.702013
A Trusted Authentication Scheme for Wireless Networks Using Direct Anonymous Attestation00.342012
Mechanism Design Based Nodes Selection Model for Threshold Key Management in MANETs00.342012
Exploring Relay Cooperation Scheme for Load-Balance Control in Two-hop Secure Communication System00.342012
Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.120.702012
Secrecy Transfer.00.342012
AHP-GRAP Based Security Evaluation Method for MILS System within CC Framework20.482011
Cryptanalysis of a Privacy-Preserving Communication Architecture for V2G Networks in Smart Grid.00.342011
Game-theoretic analyses and simulations of adoptions of security policies for DRM in contents sharing scenario10.352011
A New Evaluation Model for Security Protocols.10.372011
Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks00.342010
Efficient and Identity-based Signcryption with Provably-secure00.342010
  • 1
  • 2