主要論文
在《中國通信》、《Computer Communications》、《計算機學報》、《電子學報》等期刊和國際會議上發(fā)表論文30余篇。
Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du, Kun He, Lina Wang, Zhiyong Peng. Game-Theory-Based Batch Identification of Invalid Signatures in Wireless Mobile Networks. In proc. of International Conference on Computer Communications (INFOCOM 2015). 2015 (CCF A類)
Jing Chen, Kun He, Ruiying Du, Yang Xiang. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks. IEEE Transactions on Parallel and Distributed System. 2014 (CCF A類)
Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking(SECON). 2015 (CCF B類)
Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang. A Multi-objective Optimization Model Based on Immune Algorithm in Wireless Mesh Networks. International Journal of Communication Systems. 2014 (SCI收錄)
張宇,陳晶,杜瑞穎,周慶,鄭明輝. 適于車載網通信的高效簽密方案. 2015, 43(3):512-517 (權威期刊, corresponding author) Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electronic Commerce Research. 2014 (SSCI收錄,corresponding author) Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C類)
Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C類, corresponding author)
Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks. China Communication. 2012,9(10): 23-32 (SCI收錄)
Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C類, corresponding author) Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network. China Communication. 2011,8(4): 125-131 (SCI收錄)
Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C類, corresponding author)
Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on Reputation for Spectrum Allocation in Wireless Networks. Computer Communications. 2010, 33(14): 1623-1631 (SCI收錄)
陳晶, 杜瑞穎, 王麗娜, 田在榮. 網絡環(huán)境下一種基于概率密度的信任博弈模型. 電子學報.2010,38(2): 427-433 (權威期刊)
沙樂天,傅建明,陳晶,黃詩勇. 一種面向敏感信息處理的敏感度度量方法 [J]. 計算機研究與發(fā)展, 2014, 51(5): 1050-1060. (權威期刊) 李拴保,傅建明,張煥國,陳晶,王晶,任必軍. 云環(huán)境下基于環(huán)簽密的用戶身份屬性保護方案. 通信學報. 2014, 35(9): 99-111 (權威期刊) Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications. 2014 (SCI收錄) Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters. Journal of Network and Computer Applications. 2013. (SCI收錄)
Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair UC-Secure Protocol for Two-Party Computation, Security and Communication Networks. 2013 (SCI收錄)
Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing. 2011.71(9): 1249-1260. (CCF B類)
Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution scheme using network coding for mobile ad hoc network. Security and Communication Networks. 2011.3 (SCI收錄)
徐鵬, 崔國華, 陳晶. 標準模型下一種實用的和可證明安全的IBE方案. 計算機學報. 2010.2(33): 335-344 (權威期刊) Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit Authenticated Key Agreement Protocol. In proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom). 2012: 1299-1303 (CCF C類)