[1] Jing Chen, Shixiong Yao, Quan Yuan, Shouling Ji, Ruiying Du. CertChain: Public and Efficient Certificate Audit Based on Blockchain for TLS Connections. INFOCOM. 2018: 2060-2068(CCF A类, Best Paper Runner-up)
[2] Meng Jia, Kun He, Jing Chen, Ruiying Du, Weihang Chen, Zhihong Tian, Shouling Ji. PROCESS: Privacy-Preserving On-Chain Certificate Status Service. INFOCOM 2021. (CCF A类, Best Paper Runner-up)
[3] Cong Wu, Jing Chen, Kun He, Ziming Zhao, Ruiying Du. EchoHand: High Accuracy and Presentation Attack Resistant Hand Authentication on Commodity Mobile Devices. ACM CCS 2022. (CCF A类)
[4] Cong Wu, Kun He, Jing Chen, Ziming Zhao, Ruiying Du. Liveness is Not Enough: Enhancing Fingerprint Authentication with Behavioral Biometrics to Defeat Puppet Attacks. USENIX Security 2020 (CCF A类)
[5] Mei Wang, Kun He, Jing Chen, Zengpeng Li, Ruiying Du. Biometrics-Authenticated Key Exchange for Secure Messaging. ACM CCS 2021. (CCF A类)
[6] Jing Chen, Kun He, Ruiying Du, Yang Xiang. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks. IEEE Transactions on Parallel and Distributed Systems. 2015,26(2):423-433 (SCI收录, CCF A类)
[7] Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du. Game-Theory-Based Batch Identification of Invalid Signatures in Wireless Mobile Networks. In proc. of International Conference on Computer Communications (INFOCOM 2015). 2015: 262 - 270 (CCF A类)
[8] Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Transactions on Computers. 2016. 65(12): 3631 - 3645 (SCI收录, CCF A类)
[9] Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang. Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Transactions on Mobile Computing. 2017, 16(6): 1530-1543 (CCF A类)
[10] Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue. Checks and Balances: A Tripartite Public Key Infrastructure for Secure Web-based Connections. In proc. of International Conference on Computer Communications (INFOCOM 2017). 2017 (CCF A类)
[11] Jing Chen, Kun He, Lan Deng, Ruiying Du, Quan Yuan, Yang Xiang, Jie Wu. EliMFS: Achieving Efficient, Leakage-resilient, and Multi-keyword Fuzzy Search on Encrypted Cloud Data. IEEE Transactions on Services Computing. 2020, 13(6): 1072 - 1085 (SCI收录,CCF B类)
[12] Jing Chen, Chiheng Wang, Ziming Zhao, Kai Chen, Ruiying Du, Gail-Joon Ahn. Uncovering the Face of Android Ransomware: Characterization and Real-time Detection. IEEE Transactions on Information Forensic & Security. 2018, 13(5): 1286- 1300(CCF A类)
[13] Jing Chen, Kun He, Quan Yuan, Min Chen, Ruiying Du, and Yang Xiang. Blind Filtering at Third Parties: An Efficient Privacy-Preserving Framework for Location-Based Services. IEEE Transactions on Mobile Computing. 2018, 17(11): 2524 - 2535(CCF A类)
[14] Jing Chen, Chiheng Wang, Kun He, Ziming Zhao, Min Chen, Ruiying Du, Gail-Joon Ahn. Semantics-Aware Privacy Risk Assessment Using Self-Learning Weight Assignment for Mobile Apps. IEEE Transactions on Dependable and Secure Computing. 2021, 18(1): 15-29 (CCF A类)
[15] He, Kun; Chen, Jing; Yuan, Quan; Ji, Shouling; He, Debiao; Du, Ruiying. Dynamic Group-Oriented Provable Data Possession in the Cloud. IEEE Transactions on Dependable and Secure Computing. 2020 (CCF A类)
[16] Cong Wu, Kun He, Jing Chen, Ruiying Du, Yang Xiang. CAIAUTH: Context-aware Implicit Authentication When the Screen is Awake. IEEE Internet of Things Journal. 2020,7(12): 11420 - 11430 (SCI 一区)
[17] Kun He, Jing Chen, Qinxi Zhou, Ruiying Du. Secure Dynamic Searchable Symmetric Encryption with Constant Client Storage Cost. IEEE Transactions on Information Forensics & Security. 2021, 10(16): 1538 - 1549 (CCF A类)
[18] Jing Chen, Xin Chen, Kun He, Ruiying Du, Weihang Chen, Yang Xiang. DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel. IEEE Transactions on Dependable and Secure Computing. (CCF A类)
[19] Jing Chen, Zeyi Zhan, Kun He, Ruiying Du, Donghui Wang, Fei Liu. XAuth: Efficient Privacy-preserving Cross-domain Authentication. IEEE Transactions on Dependable and Secure Computing. (CCF A类)
[20] Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, and Ting Wang, De-Health: All Your Online Health Information Are Belong to Us, ICDE 2020.(CCF A类)
[21] Xiao Wang, Zheng Wang, Wu Liu, Xin Xu, Jing Chen, Chia-Wen Lin. Consistency-Constancy Bi-Knowledge Learning for Pedestrian Detection in Night Surveillance. ACM Multimedia 2021(CCF A类)
[22] Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang. Backdoor Pre-trained Models Can Transfer to All. ACM CCS 2021. (CCF A类)
[23] Run Wang, Haoxuan Li, Lingzhou Mu, Jixing Ren, Shangwei Guo, Li Liu, Liming Fang, Jing Chen, Lina Wang. Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations? the 30th ACM International Conference on Multimedia (ACM Multimedia),Lisbon ,acceptance rate: 27.9%(CCF A类)
[24] Run Wang, Ziheng Huang, Zhikai Chen, Li Liu, Jing Chen, Lina Wang. Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations. Proceedings of the 31st International Joint Conference on Artificial Intelligence (IJCAI’22) , Vienna, Austria. acceptance rate: 15%(CCF A类)
[25] Quan Yuan, Ionut Cardei, Jing Chen, Jie Wu. Multi-copy Routing with Trajectory Prediction in Social Delay-Tolerant Networks. In proceeding of 2015 IEEE Global Communications Conference. GLOBECOM 2015
[26] Min Chen, Yongfeng Qian, Jing Chen, Kai Hwang, Shiwen Mao, Long Hu. Privacy Protection and Intrusion Avoidance for Cloudlet-based Medical Data Sharing. IEEE Transactions on Cloud Computing. 2018
[27] Shungan Zhou, Ruiying Du, Jing Chen, Debiao He, Hua Deng. ESDR: an Efficient and Secure Data Repairing Paradigm in Cloud Storage. Security and Communication Networks. 2016, 9(16): 3646-3657
[28] Long Hu, Yongfeng Qian, Jing Chen, Xiaobo Shi, Jing Zhang, Shiwen Mao. Photo crowdsourcing based privacy-protected healthcare. IEEE Transactions on Sustainable Computing. 2019, 4(2): 168-177
[29] Yongfeng Qian, M. Chen, J. Chen, M.S. Hossain, A. Alamri “Secure Enforcement in Cognitive Internet of Vehicles”, IEEE Internet of Things Journal, to appear, 2018, 5(2): 1242-1250. (JCR一区期刊,影响因子7.96)
[30] Li, Jiping; Zhang, Ning; Ni, Jianbing; Chen, Jing; Du, Ruiying. Secure and Lightweight Authentication with Key Agreement for Smart Wearable Systems. IEEE Internet of Things Journal. 2020( SCI一区)
[31] Yongfeng Qian, Yujun Ma, Jing Chen, Di Wu, Daxin Tian, Kai Hwang. Optimal Location Privacy Preserving and Services Quality Guaranteed in Vehicle-based Crowdsensing Networks. IEEE Intelligent Transportation Systems Transactions (TITS). 2021
[32] Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proceeding of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Beijing, China, 2014 (EI收录, ,通讯作者)
[33] Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proceeding of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Beijing, China, 2014:328-335 (EI收录, 通讯作者)
[34] Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proceeding of the 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-14). Beijing, China, 2014: 252-259 (EI收录, ,通讯作者)
[35] Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking. 2015: 310-318 (CCF B类)
[36] Jing Chen, Yulin Peng, Ruiying Du, Quan Yuan and Minghui Zheng. Regenerating-Codes-based Efficient Remote Data Checking and Repairing in Cloud Storage. TrustCom 2015. 143-150 (CCF C类)
[37] Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi. Secure Independent-update Concise-expression Access Control for Video on Demand in Cloud. Information Science, 2017,387: 75-89 (SCI收录, CCF B类)
[38] Jing Chen, Kun He, Quan Yuan, Ruiying Du, Jie Wu. Distributed Greedy Coding-Aware Deterministic Routing for Multi-flow in Wireless Networks. Computer Networks. 2016, 105: 194-206 (SCI收录,CCF B类)
[39] Jing Chen, Lihong Zhang, Kun He, Ruiying Du. Lina Wang. Message-Locked Proof of Ownership and Retrievability with Remote Repairing in Cloud. Security and Communication Networks. 2016,9(16): 3452-3466 (SCI收录, CCF C类)
[40] Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du. A r-Strawman privacy-preserving scheme in weighted social networks. Security and Communication Networks. 2016, 9(18): 5625-5638 (SCI收录, CCF C类)
[41] Jing Chen, Yingying Fang, Kun He, Ruiying Du. Charge-depleting of the batteries makes smartphones recognizable. In proc. of International Conference on Parallel and Distributed Systems (ICPADS 2017). 2017: 33-40 (CCF C类)
[42] LIU Dong, CHEN Jing, DU Ruiying,ZHANG Huanguo. Enhancing Security of the Reduced-Operation Two-Factor Authentication by Using Ambient WiFi. Chinese Journal of Electronics. 2018, 27(3): 625-633
[43] Cong Wu, Kun He, Jing Chen, Ruiying Du. ICAuth: Implicit and Continuous Authentication When the Screen Is Awake. IEEE International Conference on Communications (ICC 2019). 2019
[44] Jing Chen; Jiong Chen; Kun He; Ruiying Du; SeCrowd: Efficient Secure Interactive Crowdsourcing via Permission Based Signatures, Future Generation Computer Systems. 2020 (SCI 一区)
[45] Jiong Chen; Kun He*; Jing Chen; Yingying Fang; Ruiying Du; PowerPrint: Identifying Smartphones through Power Consumption of the Battery, Security and Communication Networks, 2020 (CCF C类)
[46] Jing Chen, Peidong Jiang, Kun He, Cheng Zeng, Ruiying Du. HIAWare: Speculate Handwriting on Mobile Devices with Built-in Sensors. ICICS 2021. (CCF C类)
[47] Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications. 2014
[48] Zhou Shungan, Du Ruiying, Chen Jing, Deng Hua, Shen Jian, Zhang Huanguo. SSEM: Secure Scalable and Efficient Multi-owner Data Sharing in Clouds. China Communications. 2016: 231-243
[49] Zhou Shungan, Du Ruiying, Chen Jing, Shen Jian, Deng Hua, Zhang Huanguo. FACOR: Flexible Access Control with Outsourceable Revocation in Mobile Clouds. China Communications. 2016: 136-150
[50] Yongfeng Qian, Long Hu, Jing Chen, Xin Guan, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi. Privacy-aware Service Placement for Mobile Edge Computing via Federated Learning. Information Sciences.2019