[1] Jing Chen, Shixiong Yao, Quan Yuan, Ruiying Du, Guoliang Xue. Checks and Balances: A Tripartite Public Key Infrastructure for Secure Web-based Connections. In proc. of International Conference on Computer Communications (INFOCOM 2017). 2017 (CCF A类)
[2] Jing Chen, Kun He, Quan Yuan, Guoliang Xue, Ruiying Du, Lina Wang. Batch Identification Game Model for Invalid Signatures in Wireless Mobile Networks. IEEE Transactions on Mobile Computing. 2016. DOI: 10.1109/TMC.2016.2604820 (CCF A类)
[3] Kun He, Jing Chen, Ruiying Du, Qianhong Wu, Guoliang Xue, Xiang Zhang. DeyPoS: Deduplicatable Dynamic Proof of Storage for Multi-User Environments. IEEE Transactions on Computers. 2016. DOI: 10.1109/TC.2016.2560812 (SCI收录, CCF A类)
[4] Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du, Kun He, Lina Wang, Zhiyong Peng. Game-Theory-Based Batch Identification of Invalid Signatures in Wireless Mobile Networks. In proc. of International Conference on Computer Communications (INFOCOM 2015). 2015 (CCF A类)
[5] Jing Chen, Kun He, Ruiying Du, Yang Xiang. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks. IEEE Transactions on Parallel and Distributed System. 2014 (CCF A类)
[6] Jing Chen, Kun He, Lan Deng, Ruiying Du, Quan Yuan, Yang Xiang, Jie Wu. EliMFS: Achieving Efficient, Leakage-resilient, and Multi-keyword Fuzzy Search on Encrypted Cloud Data.IEEE Transactions on Services Computing. 2017 (SCI收录,CCF B类)
[7] Jing Chen, Kun He, Quan Yuan, Ruiying Du, Jie Wu. Distributed Greedy Coding-Aware Deterministic Routing for Multi-flow in Wireless Networks. Computer Networks. 2016. DOI: 10.1016/j.comnet.2016.05.027 (SCI收录,CCF B类)
[8] Kun He, Jing Chen, Yu Zhang, Ruiying Du, Yang Xiang, Mohammad Mehedi Hassan, Abdulhameed Alelaiwi. Secure Independent-update Concise-expression Access Control for Video on Demand in Cloud. Information Science, 2016. DOI: 10.1016/j.ins.2016.08.018 (SCI收录, CCF B类)
[9] Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking(SECON 2015). 2015 (CCF B类)
[10] Jing Chen, Lihong Zhang, Kun He, Ruiying Du. Lina Wang. Message-Locked Proof of Ownership and Retrievability with Remote Repairing in Cloud. Security and Communication Networks. 2016 (SCI收录, CCF C类)
[11] Jing Chen, Bowen Zhang, Min Chen, Quan Yuan, Ruiying Du. A r-Strawman privacy-preserving scheme in weighted social networks. Security and Communication Networks. 2016 (SCI收录, CCF C类)
[12] Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C类)
[13] Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类)
[14] Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks. China Communications. 2012,9(10): 23-32 (SCI收录)
[15] Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类)
[16] Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network. China Communication. 2011,8(4): 125-131 (SCI收录)
[17] 张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. 2015, 43(3):512-517 (权威期刊)
[18] Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
[19] Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on Reputation for Spectrum Allocation in Wireless Networks. Computer Communications. 2010, 33(14): 1623-1631 (SCI收录)
[20] 陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.2010,38(2): 427-433 (权威期刊)
[21] Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution scheme using network coding for mobile ad hoc network. Security and Communication Networks. 2011.3 (SCI收录)
[22] 张宇, 陈晶, 杜瑞颖,等. 适于车载网安全通信的高效签密方案[J]. 电子学报, 2015, 第3期(03):512-517. (权威期刊)
[23] 张宇, 杜瑞颖, 陈晶等.对一个基于身份签密方案的分析与改进[J].通信学报,2015,第11期,36(11):174-179. (权威期刊)
[24] Zhou Shungan, Du Ruiying, Chen Jing, Deng Hua, Shen Jian, Zhang Huanguo. SSEM: Secure Scalable and Efficient Multi-owner Data Sharing in Clouds. China Communications. 2016: 231-243
[25] Zhou Shungan, Du Ruiying, Chen Jing, Shen Jian, Deng Hua, Zhang Huanguo. FACOR: Flexible Access Control with Outsourceable Revocation in Mobile Clouds. China Communications. 2016: 136-150
[26] Shungan Zhou, Ruiying Du, Jing Chen, Debiao He, Hua Deng. ESDR: an Efficient and Secure Data Repairing Paradigm in Cloud Storage. Security and Communication Networks. 2016. DOI: 10.1002/sec.1571