Jing Xu

ORCID: 0000-0002-0432-6206
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Blockchain Technology Applications and Security
  • Service-Oriented Architecture and Web Services
  • Cryptographic Implementations and Security
  • Distributed systems and fault tolerance
  • Cloud Data Security Solutions
  • Complexity and Algorithms in Graphs
  • Privacy-Preserving Technologies in Data
  • Cloud Computing and Resource Management
  • Biometric Identification and Security
  • Cryptography and Residue Arithmetic
  • Software System Performance and Reliability
  • IPv6, Mobility, Handover, Networks, Security
  • Traffic control and management
  • Security in Wireless Sensor Networks
  • Elevator Systems and Control
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • Data Quality and Management
  • Energy Efficient Wireless Sensor Networks
  • Business Process Modeling and Analysis
  • Security and Verification in Computing

Chinese Academy of Sciences
2015-2025

Institute of Software
2015-2025

Heilongjiang Bayi Agricultural University
2009-2024

University of Chinese Academy of Sciences
2020-2023

Xiamen University of Technology
2022

State Key Laboratory of Cryptology
2022

Huaian First People’s Hospital
2022

Northeast Normal University
2021

IBM Research (China)
2003-2017

Shanghai Institute of Microsystem and Information Technology
2016

HoneyBadgerBFT, proposed by Miller et al. [34] as the first practical asynchronous atomic broadcast protocol, demonstrated impressive performance. The core of HoneyBadgerBFT (HB-BFT) is to achieve batching consensus using common subset protocol (ACS) Ben-Or al., constituted with n reliable (RBC) have each node propose its input, followed binary agreement (ABA) make a decision for value (n total number nodes).

10.1145/3372297.3417262 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2020-10-30

Despite recent progresses of practical asynchronous Byzantine-fault tolerant (BFT) consensus, the state-of-the-art designs still suffer from suboptimal performance. Particularly, to obtain maximum throughput, most existing protocols \rev with guaranteed linear amortized communication complexity require each participating node broadcast a huge batch transactions, which dramatically sacrifices latency. Worse still, ƒ slowest nodes' broadcasts might never be agreed output and thus can censored...

10.1145/3548606.3559379 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

This paper presents the design of dual heuristic programming (DHP) for optimal coordination ramp metering in freeway systems. Specifically, we implement DHP method to solve both recurrent and nonrecurrent congestions with queuing consideration. A coordinated neural network controller is achieved by traffic models. Then, it used verifications different scenarios. Simulation studies performed on a hypothetical indicate that maintains good control performance when compared classical algorithm...

10.1109/tits.2011.2122257 article EN IEEE Transactions on Intelligent Transportation Systems 2011-03-29

Proxy re-encryption (PRE) provides a promising solution for encrypted data sharing in public cloud. When owner Alice is going to share her with consumer Bob, generates key and sends it the cloud server (proxy); by using it, proxy can transform Alice's ciphertexts into Bob's without learning anything about underlying plaintexts. Despite that existing PRE schemes prevent from recovering secret collusion attacks due inherent functionality of PRE, inevitable Bob together are capable gain...

10.1109/tdsc.2018.2877601 article EN IEEE Transactions on Dependable and Secure Computing 2018-10-24

With the rapid evolution of blockchain technologies, interoperability different systems is emerging as one essential features blockchains. Sidechains, a mechanism providing communications between blockchains, have been heralded crucial factor interoperability. However, there are still issues that need to be addressed in terms security and feasibility. In this article, for proof-of-stake (PoS) proof-of-work (PoW) we propose efficient sidechain constructions with fast cross-chain transfers...

10.1109/tdsc.2021.3114151 article EN IEEE Transactions on Dependable and Secure Computing 2021-09-21

Abstract Cold is a factor affecting health in humans and animals. The liver, major metabolic center, highly susceptible to ambient air temperature. Recent studies have shown that endoplasmic reticulum (ER) stress associated with the regulates occurrence development of liver injury autophagy. However, mechanism underlying relationship between cold exposure ER not well understood. In this study, we investigated effect on autophagy its under exposure. AML12 cells were treated Tg construct an...

10.1002/jcp.30856 article EN Journal of Cellular Physiology 2022-08-08

Blockchain technologies have drawn a lot of attentions, and its immutability is paramount to applications requiring persistent records. However, tremendous real-world incidents exposed the harm strict immutability, such as illicit data stored on Bitcoin loss millions dollars in vulnerable smart contracts. Moreover, “Right be Forgotten” has been imposed new General Data Protection Regulation (GDPR) European Union, which incompatible with blockchain's immutability. Therefore, it imperative...

10.1109/tdsc.2022.3212601 article EN IEEE Transactions on Dependable and Secure Computing 2022-10-10

Ambient air temperature is a key factor affecting human health. Long-term exposure to cold environment can cause various diseases, while the impact on intestine, organ which has largest contact area with external environment, cannot be ignored. In this study, we investigated effect of chronic colon and its preliminary mechanism action. Mice were exposed 4°C for 3 hours day 10 days. We found that damaged morphology structure colon, destroyed tight junctions colonic epithelial tissue, promoted...

10.3389/fphys.2022.822348 article EN cc-by Frontiers in Physiology 2022-04-20

Efficient asynchronous Byzantine agreement (BA) protocols were mostly studied with private setups, e.g., pre-setup threshold cryptosystem. Challenges remain to reduce the large communication in absence of such setups. Recently, Abraham et al. (PODC'21) presented first validated BA (VBA) expected $\mathcal{O}$(n <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">3</sup> ) messages and $\mathcal{O}$ (1) rounds, relying on only public key...

10.1109/icdcs54860.2022.00032 article EN 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS) 2022-07-01

As the wide adoption of in-cloud services (e.g., software-as-a-service), some major identity related issues are brought up. For enterprises, it usually introduces additional cost and risk to manage identities in services. service providers, typical pairwise federation solutions not scalable support single sign-on, composition, etc. among for large environment like cloud. This paper proposes an broker that a trusted third party as trust simplify management user centric manner. With this...

10.1109/icss.2010.46 article EN International Conference on Service Sciences 2010-01-01

10.1109/tifs.2025.3573205 article EN IEEE Transactions on Information Forensics and Security 2025-01-01

Many business services are now being delivered over the Web. This method of delivery is attracting attention both small- and medium-sized businesses providers application-based because its easier access, more affordable fees, greater efficiency in delivering to massive numbers receivers. However, it requires resolution several key technical challenges. Data security top priority for most users their data reside on remote servers whose resources shared among tenants. In addition, such a...

10.1147/jrd.2010.2065891 article EN IBM Journal of Research and Development 2010-11-01

The Transport Layer Security (TLS) protocol is by far the most widely deployed for securing communications and Internet Engineering Task Force (IETF) currently developing TLS 1.3 as next-generation protocol. standard features multiple modes of handshake protocols supports many combinational running successive handshakes over connections. Although each mode now well-understood in isolation, their composition 1.2 remains problematic, yet it critical to obtain practical security guarantees TLS....

10.1109/sp.2016.36 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2016-05-01

Proof-of-stake blockchain protocols are becoming one of the most promising alternatives to energy-consuming proof-of-work protocols. However, particularly critical threat in PoS setting is well-known long-range attacks caused by secret key leakage (LRSL attack). Specifically, an adversary can attempt control/compromise accounts possessing substantial stake at some past moment such that double-spend or erase transactions, violating fundamental persistence property blockchain. Puncturable...

10.1109/tifs.2020.3001738 article EN IEEE Transactions on Information Forensics and Security 2020-01-01
Coming Soon ...