主要论文
在《中国通信》、《Computer Communications》、《计算机学报》、《电子学报》等期刊和国际会议上发表论文30余篇。
Jing Chen, Quan Yuan, Guoliang Xue, Ruiying Du, Kun He, Lina Wang, Zhiyong Peng. Game-Theory-Based Batch Identification of Invalid Signatures in Wireless Mobile Networks. In proc. of International Conference on Computer Communications (INFOCOM 2015). 2015 (CCF A类)
Jing Chen, Kun He, Ruiying Du, Yang Xiang. Dominating Set and Network Coding-based Routing in Wireless Mesh Networks. IEEE Transactions on Parallel and Distributed System. 2014 (CCF A类)
Jing Chen, Quan Yuan, Ruiying Du, Jie Wu. MuCAR: A Greedy Multi-flow-based Coding-Aware Routing in Wireless Networks. In proc. of IEEE International Conference on Sensing, Communication, and Networking(SECON). 2015 (CCF B类)
Jing Chen, Kun He, Ruiying Du, Fajiang Yu, Quan Yuan, Lina Wang. A Multi-objective Optimization Model Based on Immune Algorithm in Wireless Mesh Networks. International Journal of Communication Systems. 2014 (SCI收录)
张宇,陈晶,杜瑞颖,周庆,郑明辉. 适于车载网通信的高效签密方案. 2015, 43(3):512-517 (权威期刊, corresponding author) Yu Fajiang, Chen Jing, Xiang Yang, Zhu Jiacheng, Zhao Yangdi. An efficient anonymous remote attestation scheme for trusted computing based on improved CPK. Electronic Commerce Research. 2014 (SSCI收录,corresponding author) Jing Chen, Ruiying Du, Qian Wang, Shixiong Yao. Secure Routing Based on Network Coding in Wireless Sensor Networks. In Proceeding of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-13). Melbourne, Australia, 2013:58-64 (CCF,C类)
Yu Zhang, Jing Chen, Ruiying Du, Yang Xiang, Qing Zhou. FEACS: A Flexible and Efficient Access Control Scheme for Cloud Computing. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
Jing Chen, Ruiying Du, Huanguo Zhang. Intrusion Detection Model Based on Incomplete Information Game in Wireless Mesh Networks. China Communication. 2012,9(10): 23-32 (SCI收录)
Ruiying Du, Lan Deng, Jing Chen, Kun He, Minghui Zheng. Proofs of Ownership and Retrievability in Cloud Storage. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author) Jing Chen, Tong Li, Ruiying Du. Efficient Reliable Opportunistic Network Coding Based on Hybrid Flow in Wireless Network. China Communication. 2011,8(4): 125-131 (SCI收录)
Shixiong Yao, Jing Chen, Ruiying Du, Chiheng Wang. A Survey of Security Network Coding toward Various Attacks. In Proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-14). Beijing, China, 2014 (CCF C类, corresponding author)
Jing Chen, Shiguo Lian, Ruiying Du. A Hybrid Game Model Based on Reputation for Spectrum Allocation in Wireless Networks. Computer Communications. 2010, 33(14): 1623-1631 (SCI收录)
陈晶, 杜瑞颖, 王丽娜, 田在荣. 网络环境下一种基于概率密度的信任博弈模型. 电子学报.2010,38(2): 427-433 (权威期刊)
沙乐天,傅建明,陈晶,黄诗勇. 一种面向敏感信息处理的敏感度度量方法 [J]. 计算机研究与发展, 2014, 51(5): 1050-1060. (权威期刊) 李拴保,傅建明,张焕国,陈晶,王晶,任必军. 云环境下基于环签密的用户身份属性保护方案. 通信学报. 2014, 35(9): 99-111 (权威期刊) Liping Zhang, Shanyu Tang, Jing Chen, Shaohui Zhu. Two-Factor Remote Authentication Protocol with User Anonymity Based on Elliptic Curve Cryptography. Wireless Personal Communications. 2014 (SCI收录) Wei Liu, Wei Du, Jing Chen, Wei Wang, Guosun Zeng. Adaptive energy-efficient scheduling algorithm for parallel tasks on homogeneous clusters. Journal of Network and Computer Applications. 2013. (SCI收录)
Ou Ruan, Jing Chen, Jing Zhou, Yongquan Cui. An Efficient Fair UC-Secure Protocol for Two-Party Computation, Security and Communication Networks. 2013 (SCI收录)
Fu Cai, Gao Xiang, Chen Jing etc. GRAP: Grey Risk Assessment based on Projection in Ad Hoc networks. Journal of Parallel and Distributed Computing. 2011.71(9): 1249-1260. (CCF B类)
Jianwei Liu, Ruiying Du, Jing Chen and Kun He. A key distribution scheme using network coding for mobile ad hoc network. Security and Communication Networks. 2011.3 (SCI收录)
徐鹏, 崔国华, 陈晶. 标准模型下一种实用的和可证明安全的IBE方案. 计算机学报. 2010.2(33): 335-344 (权威期刊) Minghui Zheng, Jing Chen. Provably Secure Two-party Explicit Authenticated Key Agreement Protocol. In proc. of IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom). 2012: 1299-1303 (CCF C类)