CN
Home
Scientific Research
Research Field
论文成果
Patents
Published Books
科研项目
Teaching Research
Teaching Resources
授课信息
Teaching Achievement
Awards and Honours
Enrollment Information
Student Information
My Album
Blog
徐剑
Got
likes Like
Supervisor of Doctorate Candidates
Supervisor of Master's Candidates
Name (Pinyin):
xujian
E-Mail:
b5b7cb8fbfeabe44332c15622aa81913ad0bb6d5f99dd4bbe37ce1a42e91ae14ebe0cb475c2de53ed4aea3c179fcde92467435ecdaa0d7ad8bb66fd72522f1c4b397f903dfdced0d5142d44928f7dfd1ec703430cf5529acabcd960aa9da22435afd37576beac1ad38401efddb9c27cf346cf30a367e6ce57c4cad38dc164c86
Date of Employment:
2001-07-01
Administrative Position:
软件学院副院长
Education Level:
With Certificate of Graduation for Doctorate Study
Business Address:
辽宁省沈阳市浑南区创新路195号
Gender:
Male
Degree:
博士
Status:
Employed
Alma Mater:
东北大学
论文成果
Current position:
Home
>>
Scientific Research
>>
论文成果
[1]王琛,李佳润,徐剑*.基于函数加密的密文卷积神经网络模型[J], 通信学报, 2024, 45(3): 50-65..
[2]Chen Wang, Jian Xu*, Haoren Li, Fucai Zhou, Qiang Wang. Privacy-Preserving and Verifiable Classifier Training in Edge-assisted Mobile Communication Systems[J], Computer Communications, 220(2024), 65-80.(SCI Q1,IF:6).
[3]Chen Wang, Jian Xu*, Shanru Tan, Long Yin. Secure Decision Tree Classification with Decentralized Authorization and Access Control [J], Computer Standards & Interfaces, 89(2024) 103818. (SCI Q1).
[4]Yin Long,Xu Jian*,Wang Chen,Wang Qiang,Zhou Fucai.Long Yin, Jian Xu*, Chen Wang, Qiang Wang, Fucai Zhou. Detecting CAN overlapped voltage attacks with an improved voltage-based in-vehicle intrusion detection system[J], Journal of Systems Architecture, 143 (2023) 102957 (SCI Q1,CCF B ).,143.[JCR 一区]..10.1016/j.sysarc.2023.102957,
[5]Xu Jian, Qingyu Meng, Jun Wu, James Xi Zheng, Xuyun Zhang, Suraj Sharma. Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems[J], IEEE Transaction on Computational Social Systems, IEEE Transactions on Industrial Informatics, 2021, 17(6): 4279-4287. DOI: 10.1109/TII.2020.3008012.(SCI, 中科院-1,IF:9.112).
[6]Xu Jian, Andi Wang,Jun Wu, Qiyu Wu, Chen Wang,Ruijin Wang, Fucai Zhou. SPCSS: Social Network Based Privacy-Preserving Criminal Suspects Sensing[J], IEEE Transaction on Computational Social Systems, 2020,7(1):261-273. DOI: 10.1109/TCSS.2019.2960857..IEEE Transactions on Computational Social Systems,7(1):261-274
[7]Xu Jian, Heng Liu, Dexin Wu, Fucai Zhou, Chongzhi Gao, Linzhi Jiang. Generating Universal Adversarial Perturbation with ResNet[J], Information Sciences,2020, 537: 302-312. https://doi.org/10.1016/j.ins.2020.05.099. (SCI, JCR-1,CCF-B, IF:5.91).
[8]Xu Jian*,Laiwen Wei, Wei Wu, Andi Wang, Fucai Zhou. Privacy-preserving data integrity verification by using lightweight streaming authenticated data structures for healthcare cyber-physical system[J],Future Generation Computer Systems, 2020, 108: 1287-1296. (SCI, JCR-1,CCF-C,IF:5.768 ).
[9]Xu Jian*, Yanbo Yu, Qingyu Meng, Qiyu Wu, Fucai Zhou. Role-based Access Control Model for Cloud Storage Using Identity-Based Cryptosystem [J], Mobile Networks and Applications, 11 January 2020, https://doi.org/10.1007/s11036-019-01484-4. ( SCI, JCR-2,CCF-C,IF:2.39 ).
[10]Chen Wang, Andi Wang,Jian Xu*, Qiang Wang, Fucai Zhou. Outsourced Privacy-preserving Decision Tree Classification Service over Encrypted Data[J], Journal of Information Security and Applications, 53(2020) DOI: 10.1016/j.jisa.2020.102517 ( SCI, JCR-2,CCF-C, IF:1.537 ).
total22 1/3
first
previous
next
last
Page