Jianming Zhu

ORCID: 0000-0003-4923-9939
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Blockchain Technology Applications and Security
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • Data Mining Algorithms and Applications
  • FinTech, Crowdfunding, Digital Finance
  • Network Security and Intrusion Detection
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Privacy, Security, and Data Protection
  • Mobile Crowdsensing and Crowdsourcing
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Advanced Steganography and Watermarking Techniques
  • Cloud Computing and Resource Management
  • Digital Platforms and Economics
  • Rough Sets and Fuzzy Logic
  • Distributed and Parallel Computing Systems
  • Smart Grid Security and Resilience
  • Access Control and Trust
  • Multi-Criteria Decision Making
  • Data Management and Algorithms
  • Spam and Phishing Detection
  • Complex Network Analysis Techniques
  • Mobile Agent-Based Network Management

Central University of Finance and Economics
2016-2025

University of Chinese Academy of Sciences
2024

Singapore University of Technology and Design
2023

Jilin Medical University
2023

Jilin University
2023

Wenzhou Institute of Industrial Science
2022

Nanjing University of Posts and Telecommunications
2022

North China Institute of Science and Technology
2021

Henan University of Engineering
2015

Xidian University
2004-2011

Blockchain with these characteristics of decentralized structure, transparent and credible, time-series immutability, has been considering as a promising technology. Consensus algorithm one the core techniques blockchain directly affects scalability systems. Existing probabilistic finality consensus algorithms such PoW, PoS, suffer from power consumptions low efficiency; while absolute PBFT, HoneyBadgerBFT, could not meet requirement in large-scale network. In this paper, we propose novel...

10.23919/jcc.2019.12.008 article EN China Communications 2019-12-01

Wireless network is susceptible to security attacks because its openness of transmission media. somewhat more concentrated and complex than that wired network. Authentication the most essential procedure ensure service properly used. But limited resource, such as weak power supplies bandwidth, must be taken into account in design schemes. In this paper, we present a new efficient wireless authentication protocol providing user anonymity. Our scheme based on hash function smart cards, mobile...

10.1109/tce.2004.1277867 article EN IEEE Transactions on Consumer Electronics 2004-02-01

In view of the influence information's "incompleteness" and "asymmetry" to supply chain operation efficiency, we make big production enterprise as object apply blockchain its endogenous risk management, research specific mechanism application value. process chain, because asymmetry, fraud problem will produce among business subjects; is a decentralized distributed accounting data storage technology, with can resolve subjects' provide more accurate decision information basis for each section,...

10.1109/access.2019.2895327 article EN cc-by-nc-nd IEEE Access 2019-01-01

Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access control to achieve the secure data sharing. However, most of existing CP-ABE schemes involve intermediary entities, which might suffer from a high trust-building cost, single point failure and so on. Due decentralization transparency blockchain, some blockchain-based are proposed address these problems, but bring new challenges, such as privacy leakage policy or attribute. In this paper, we propose...

10.1109/tvt.2020.2967099 article EN IEEE Transactions on Vehicular Technology 2020-01-16

Deep learning has been successfully applied to infrared and visible image fusion due its powerful ability of feature representation. Existing most deep based methods mainly utilize pure convolution model or transformer model, which leads that the fused cannot preserve long-range dependencies (global context) local features simultaneously. To this end, we propose a convolution-guided framework for (CGTF), aims combine convolutional network dependency produce satisfactory image. In CGTF, are...

10.1109/tim.2022.3175055 article EN IEEE Transactions on Instrumentation and Measurement 2022-01-01

With the popularity of Android applications, malware has an exponential growth trend. In order to detect effectively, this paper proposes a novel lightweight static detection model, TinyDroid , using instruction simplification and machine learning technique. First, symbol-based method is proposed abstract opcode sequence decompiled from Dalvik Executable files. Then, N-gram employed extract features simplified sequence, classifier trained for classification tasks. To improve efficiency...

10.1155/2018/4157156 article EN cc-by Mobile Information Systems 2018-10-17

Aiming at the current problems of security threats and privacy leak risks in operation process related data intelligent logistics system, system lacking supervision traceability, this paper proposes to use blockchain technology resolve these problems. A scheme on applying is proposed, including principle, consensus authentication mechanism, storage access mechanism. By introducing analyzing big improving scientific, rationality, intelligence decision. The basic characteristic traceability....

10.1109/access.2019.2945078 article EN cc-by IEEE Access 2019-01-01

Blockchain-based product traceability systems are receiving increasing attention from both industry and academia. Existing make full use of the non-modification characteristics blockchain technology realize openness transparency information in entire supply chain. However, existing do not consider government regulation, cannot protect enterprise sensitive private data effectively, have performance bottlenecks. To address these problems, this paper proposes a scheme based on permissioned...

10.1109/access.2019.2962274 article EN cc-by IEEE Access 2019-12-25

Efficient transportation is essential for regional economic development. Currently, the Pearl River Delta urban agglomeration accelerating construction of intercity railways in region to strengthen links between cities. To provide a more detailed account, this study examined data spanning years 2010–2021 across nine key cities Delta. Employing spatial Durbin model, we sought uncover specific patterns associated with railways, particularly their pronounced impact on neighboring Our...

10.3390/su16020738 article EN Sustainability 2024-01-15

The blockchain is an emerging technology. Because of its efficiency and functionality, it widely considered to have revolutionary application prospects. As a supporting part the data structure, hash function important for ensuring availability security blockchain. To evaluate technology analyze several criteria functions used in This paper focuses on two criteria-hiding puzzle-friendliness-that should satisfy proposed by Narayanan et al. (Narayanan A, Bonneau J, Felten E, Bitcoin...

10.1145/3205230.3205238 article EN 2018-05-22

The existing data sharing models have some issues such as poor transparency of transactions, without security assurance and lacking effective tracking methods. This paper proposed a brand-new scheme based on blockchain technology. Firstly, double-chain structure about was introduced, one chain used to store the original another transaction generated by transactions. separated storage Secondly, combined with proxy re-encryption technology, safe reliable were achieved. Finally, new design...

10.1109/liss.2018.8593225 article EN 2018-08-01

Federated learning is a distributed machine framework that enables model training with local datasets, which can effectively protect the data privacy of workers (i.e., intelligent edge nodes). The majority federated algorithms assume are trusted and voluntarily participate in cooperative process. However, situation practical application not consistent this. There many challenges such as worker selection schemes for participating workers, hamper widespread adoption learning. existing research...

10.1109/wcncw49093.2021.9420026 article EN 2021-03-29

Worker selection in crowdsensing plays an important role the quality control of sensing services. The majority existing studies on worker were largely dependent a trusted centralized server, which might suffer from single point failure, lack transparency and so on. Some works recently proposed blockchain-based crowdsensing, utilized reputation values stored blockchains to select workers. However, enables attackers effectively infer private information about workers by disclosure their...

10.1109/tsc.2021.3103938 article EN IEEE Transactions on Services Computing 2021-08-10

It is very important to improve the operation and management efficiency of data network for construction smart cities. The current trust infrastructure in cities shows obvious shortcomings, accordingly, this paper proposed idea applying blockchain city systems as their infrastructure. research method is: firstly, architecture were proposed, database was classified a shared database, authorized access or private database. Secondly, overall model system constructed, public blockchain,...

10.1080/09613218.2020.1784703 article EN Building Research & Information 2020-07-01

Traditional identity authentication solutions mostly rely on a trusted central entity, so they cannot handle single points of failure well. In addition, most these traditional schemes need to store large amount or public key information, which makes the difficult expand and use in distributed situations. user prefers protect privacy their information during verification process. Due open decentralized nature blockchain, existing are apply well blockchain. To solve this problem, article, we...

10.1155/2021/9992353 article EN cc-by Security and Communication Networks 2021-06-03

Federated learning (FL) is essentially a distributed machine paradigm that enables the joint training of global model by aggregating gradients from participating clients without exchanging raw data. However, malicious aggregation server may deliberately return designed results any operation to save computation overhead, or even launch privacy inference attacks using crafted gradients. There are only few schemes focusing on verifiable FL, and yet they cannot achieve collusion-resistant...

10.1109/tifs.2023.3271268 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Searchable encryption (SE) has emerged as a cryptographic primitive that allows data users to search on encrypted data. Most existing SE schemes usually delegate operations an intermediary such cloud server, which would inevitably result in single-point failure, privacy leakage, and even untrustworthy results. Several blockchain-based have been proposed alleviate these issues; however, they suffer from some issues, the support for multi-keyword multi-owner model, query storage availability....

10.1109/tcc.2022.3196712 article EN IEEE Transactions on Cloud Computing 2022-08-05
Coming Soon ...