教育背景
2003.09-2007.08:南京信息工程大学,电子科学与技术专业,学士;
2007.09-2009.08:韩国Chosun University,情报与通信专业,硕士;
2009.09-2012.08:韩国Chosun University,情报与通信专业,博士。
工作经历
2012.12-至今:南京信息工程大学,计算机与软件学院,教授;
2015.05-2017.12:南京信息工程大学,计算机与软件学院,副院长;
2015.05-至今:南京信息工程大学,计算机与软件学院,博导,学术带头人;
2017.12-至今:南京信息工程大学,研究生院,副院长。
项目课题经历
2020.01-2022.12,主持国家优秀青年科学基金项目,云计算安全2) 2019.01-2021.12, 主持国家自然科学联合基金项目,面向通用数据库的数据安全保护关键技术研究3) 2017.01-2020.12,主持国家自然科学基金面上项目,无线体域网中安全和可靠通信协议研究4) 2015.01-2018.12,参与国家自然科学基金海峡两岸科技重点项目,云数据安全审计理论模型与新方法5) 2014.01-2016.12,主持国家自然科学基金青年项目,基于区组设计和身份的容错性密钥协商协议研究6) 2018.01-2021.12, 江苏省自然科学基金项目,基于区组设计和身份的容错性密钥协商协议研究7) 2018.01-2021.12,江苏高校青蓝工程中青年学术带头人项目8) 2018.01-2020.12,江苏省科协青年科技人才托举工程资助项目9) 2018.01-2020.12,密码科学技术国家重点实验室开放课题资助项目10) 2017.01 -2018.12,信息安全国家重点实验室开放课题11) 2015.01-2017.12,江苏省“双创计划”-双创博士项目12) 2015.01-2017.12, 江苏省“六大人才高峰”资助项目13) 2015.04-2016.04,指导江苏省大学生实践创新重点项目(国家级项目),基于轻质RFID标签技术的安全定位系统的研究14) 2014.01-2016.04, 指导江苏省大学生实践创新重点项目(国家级项目),基于位置和方向的Ad hoc网络路由协议设计与性能对比研究15) 2014.01-2014.12,主持中国气象局气象软科学项目,大数据时代气象信息化研究16) 2014.01-2015.12,主持气象传感网技术工程中心开放课题,设施农业传感网气象灾害加密监测及智能预警17) 2013.01-2015.12,主持水利行业专项子课题,多源土石坝安全监测数据可视化平台研究与开发19) 2013.09-2014.09,主持南京市留学回国人员科技活动项目优秀项目,人体局域网中基于ECC和哈希链的密钥管理协议的研究19) 2013.06-2014.06,主持企事业委托项目,奇智奇才电子商务系统安全平台研发20) 2013.04-2015.03,主持南京信息工程大学人才启动项目,容错性密钥协商协议关键技术研究21) 2009.06-2012.06, 主持韩国BK21研究项目,基于身份的密钥协商协议研究22) 2009.06-2012.06,主持韩国BK21研究项目,RFID轻质认证协议的安全性和私密性研究23) 2009.06-2011.06, 主研韩国BK21研究项目,BAN中密钥管理协议的研究24) 2009.06-2011.06, 主研韩国BK21研究项目,数字签名可验证加密算法的研究25) 2007.12-2009.06, 主持韩国BK21研究项目,容迟网络(DTN)路由协议的研究26) 2007.12-2009.06, 主研韩国BK21研究项目,自组网络定向天线系统的研究27) 2007.12-2009.06, 主研韩国BK21研究项目
论文、成果、著作等
期刊论文:[1]Jian Shen, Tianqi Zhou, Xiaofeng Chen, Jin Li, Willy Susilo, “Anonymous and Traceable Group Data Sharing in Cloud Computing,”IEEE Transactions on Information Forensics and Security, vol. 13, no. 4, pp. 912-925, 2018.(SCI)[2]Jian Shen, Tianqi Zhou, Debiao He, Yuexin Zhang, Xingming Sun, Yang Xiang, “Block Design-based Key Agreement for Group Data Sharing in Cloud Computing,”IEEE Transactions on Dependable and Secure Computing, 2017, DOI: 10.1109/TDSC.2017.2725953.(SCI)[3]Jian Shen, Jun Shen, Xiaofeng Chen, Xinyi Huang, and Willy Susilo, “An Efficient Public Auditing Protocol with Novel Dynamic Structure for Cloud Data,”IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2402-2415, 2017.(SCI)[4]Jian Shen, Tianqi Zhou, Xingang Liu, Yao-Chung Chang, “A Novel Latin Square-based Secret Sharing for M2M Communications,”IEEE Transactions on Industrial Informatics, vol. 14, no. 8, pp. 3659-3668, 2018.(SCI)[5]Jian Shen, Chen Wang, Anxi Wang, Sai Ji, Yan Zhang, “A Searchable and Verifiable Data Protection Scheme for Scholarly Big Data,”IEEE Transactions on Emerging Topics in Computing, 2018, DOI: 10.1109 /TETC.2018.2830368.(SCI)[6]Jian Shen, Dengzhi Liu, Md Zakirul Alam Bhuiyan, Jun Shen, Xingming Sun, and Aniello Castiglione, “Secure Verifiable Database Supporting Efficient Dynamic Operations in Cloud Computing,”IEEE Transactions on Emerging Topics in Computing,2017, DOI: 10.1109/TETC.2017. 2776402.(SCI)[7]Jian Shen,Anxi Wang, Chen Wang, Jiguo Li, and Yan Zhang, “Content-centric Group User Authentication for Secure Social Networks,”IEEE Transactions on Emerging Topics in Computing,2017, DOI: 10.1109/TETC.2017.2779163.(SCI)[8]Jian Shen, Dengzhi Liu, Debiao He, Xinyi Huang, Yang Xiang, “Algebraic Signatures-based Data Integrity Auditing for Efficient Data Dynamics in Cloud Computing,”IEEE Transactions on Sustainable Computing, 2017, DOI: 10.1109/TSUSC.2017.2781232.(SCI)[9]Jian Shen, Dengzhi Liu, Qi Liu, Xingming Sun, Yan Zhang, “Secure Authentication in Cloud Big Data with Hierarchical Attribute Authorization Structure,”IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2705048.(SCI)[10]Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito, “Trustworthiness Evaluation-based Routing Protocol for Incompletely Predictable Vehicular Ad hoc Networks,”IEEE Transactions on Big Data, 2017, DOI: 10.1109/TBDATA.2017.2710347.(SCI)[11]Jian Shen,Chen Wang, Sai Ji, Tianqi Zhou, and Huijie Yang, “Secure Emergent Data Protection Scheme for a Space-Terrestrial Integrated Network,”IEEE Network,2019, DOI: 10.1109/MNET.2018.1800177.(SCI)[12]Jian Shen, Tianqi Zhou, Kun Wang, Xin Peng, and Li Pan, “Artificial Intelligence Inspired Multi-Dimensional Traffic Control for Heterogeneous Networks,”IEEE Network, 2017, DOI: 10.1109/ MNET.2018.1800120.(SCI)[13]Jian Shen, Tianqi Zhou, Fushan Wei, Xingming Sun, Yang Xiang, “Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things,”IEEE Internet of Things Journal,vol. 5, no. 4, pp. 2526-2536, 2018.(SCI)[14]Jian Shen, Dengzhi Liu, Xingming Sun, Fushan Wei, Yang Xiang, “Efficient cloud-aided verifiable secret sharing scheme with batch verification for smart cities,”Future Generation Computer Systems,2018, DOI: /10.1016/j.future.2018.10.049. (SCI)[15]Jian Shen, Huijie Yang, Anxi Wang, Tianqi Zhou, and Chen Wang, “Lightweight Authentication and Matrix-Based Key Agreement Scheme for Healthcare in Fog Computing,”Peer-to-Peer Networking and Applications, 2018, DOI: 10.1007/s12083-018-0696-3.(SCI)[16]Jian Shen, Chen Wang, Tong Li, Xiaofeng Chen, Xinyi Huang, Zhi-Hui Zhan, “Secure Data Uploading Scheme for a Smart Home System,”Information Sciences, vol. 453, pp: 186-197, 2018.(SCI)[17]Jian Shen, Chen Wang, Anxi Wang, “Intelligent agent-based region division scheme for mobile sensor networks,”Soft Computing, 2018, DOI: 10.1007/s00500-018-3149-2.(SCI)[18]Jian Shen, Jun Shen, Chin-Feng Lai, Qi Liu, Tianqi Zhou, “Cloud Based Data Protection in Anonymously Controlled SDN,”Security and Communication Networks, 2018, DOI: 10.1155/2018/9845426.(SCI)[19]Jian Shen, Ziyuan Gui, Sai Ji, Jun Shen, Haowen Tan, Yi Tang, “Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks,”Journal of Network and Computer Applications, vol. 106, pp. 117-123, 2018.(SCI)[20]Jian Shen, Shaohua Chang, Qi Liu, Jun Shen, Yongjun Ren, " Implicit Authentication Protocol and Self-healing Key Management for WBANs,"Multimedia Tools and Applications, vol. 77, no. 9, pp. 11381-11401, 2018.(SCI)[21]Jian Shen, Chen Wang, Anxi Wang, Qi Liu, Yang Xiang, “Moving Centroid Based Routing Protocol for Incompletely Predictable Cyber Devices in Cyber-Physical-Social Distributed Systems,”Future Generation Computer Systems, 2017, DOI: 10.1016/j.future.2017.10.024.(SCI)[22]Jian Shen, Xinzhao Jiang, Youngju Cho, Dengzhi Liu and Tianqi Zhou, “Two-Factor-Based Public Data Protection Scheme in Smart Ocean Management,”Sensors, 2018, DOI:10.3390/s19010129.(SCI)[23]Jian Shen, Dengzhi Liu, Chin-Feng Lai, Yongjun Ren, Jin Wang, Xingming Sun, “A Secure Identity-based Dynamic Group Data Sharing Scheme for cloud computing,”Journal of Internet Technology, vol. 18, no. 4, pp. 833-842, 2017.(SCI)[24]Jian Shen, Dengzhi Liu, Qi Liu, Debiao He, Xingming Sun, “An Enhanced Cloud Data Storage Auditing Protocol Providing Strong Security and Efficiency for Smart City,”Journal of Information Science and Engineering, vol. 33, no. 4, pp. 923-938, 2017.(SCI)[25]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, Jiguo Li, “Outsourced Data Modification Algorithm with Assistance of Multi-Assistants in Cloud Computing,”International Journal of Sensor Networks, vol. 24, no.1, pp. 62-73, 2017.(SCI)[26]Jian Shen, Dengzhi Liu, Jun Shen, Qi Liu, Xingming Sun, “A Secure Cloud-assisted Urban Data Sharing Framework for Ubiquitous-cities,”Pervasive and Mobile Computing, vol. 2017, no. 41, pp. 219-230, 2017.(SCI)[27]Jian Shen, Anxi Wang, Chen Wang, Patrick Hung, Chin-Feng Lai,“An Efficient Centroid-Based Routing Protocol for Energy Management in WSN-Assisted IoT,”IEEE Access, vol. 5, pp. 18469-18479, 2017.(SCI)[28]Jian Shen, Anxi Wang, Chen Wang, Neal Xiong, “A RFID Based Localization Algorithm Applying Trilateration for Wireless Sensor Networks,”Journal of Internet Technology, vol. 17, no. 3, pp. 1167-1175.(SCI)[29]Jian Shen, Haowen Tan, Yan Zhang, Xingming Sun, Yang Xiang, “A New Lightweight RFID Grouping Authentication Protocol for Multiple Tags in Mobile Environment,”Multimedia Tools and Applications, vol. 76, no. 21, pp. 22761–22783, 2017.(SCI)[30]Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, Xiong Li, “Hierarchical Trust Level Evaluation for Pervasive Social Networking,”IEEE Access, vol. 5, pp. 1178-1187, 2016.(SCI)[31]Jian Shen, Shaohua Chang, Jun Shen, Qi Liu, Xingming Sun, “A lightweight multi-layer authentication protocol for wireless body area networks,”Future Generation Computer Systems, vol. 78, no. 3, pp. 956-963, 2016.(SCI)[32]Jian Shen, Chen Wang, Chin-Feng Lai, Anxi Wang, Han-Chieh Chao, “Direction Density-based Secure Routing Protocol for Healthcare Data in Incompletely Predictable Networks,”IEEE Access, vol. 4, pp. 9163-9173, 2016.(SCI)[33]Jian Shen, Chen Wang, Anxi Wang, Xingming Sun, Sangman Moh, Patrick C.K. Hung, “Organized topology based routing protocol in incompletely predictable ad-hoc networks,”Computer Communications, vol. 99, no. 1, pp. 107-118, 2017.(SCI)[34]Jian Shen, Haowen Tan, Sangman Moh, Ilyong Chung, and Jin Wang, “An Efficient RFID Authentication Protocol Providing Strong Privacy and Security,”Journal of Internet Technology, vol. 17, no. 3, pp. 443-455, 2016.(SCI)[35]Jian Shen, Haowen Tan, Sangman Moh, and Ilyong Chung, “Enhanced Secure Sensor Association and Key Management in Wireless Body Area Networks,”Journal of Communications and Networks, vol. 17, no. 5, pp. 453-462, 2015.(SCI)[36]Jian Shen, Haowen Tan, Jin Wang, Jinwei Wang, and Sungyoung Lee, “A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks.”Journal of Internet Technology, vol. 16, no. 1, pp. 171-178, 2015.(SCI)[37]Jian Shen, Sangman Moh, Ilyong Chung, and Xingming Sun, “Buffer Scheme Optimization of Epidemic Routing in Delay Tolerant Networks,”Journal of Communications and Networks, vol. 16, no. 6, pp. 656-666, 2014.(SCI)[38]Jian Shen, Wenying Zheng, Jin Wang, Yuhui Zheng, and Xingming Sun, “An Efficient Verifiably Encrypted Signature from Weil Pairing,”Journal of Internet Technology, vol. 14, no. 6, pp. 947-952, 2013.(SCI)[39]Jian Shen, Sangman Moh, and Ilyong Chung, “Identity-Based Key Agreement Protocol Employing a Symmetric Balanced Incomplete Block Design,”Journal of Communications and Networks, vol. 14, no. 6, pp. 682-691, 2012.(SCI)[40]Jian Shen, Sangman Moh, and Ilyong Chung, “Comment: Enhanced Novel Access Control Protocol over Wireless Sensor Networks,”IEEE Transactions on Consumer Electronics, vol. 56, no. 3, pp. 2019-2021, 2010.(SCI)[41]Jian Shen, Sangman Moh, and Ilyong Chung, “A Priority Routing Protocol Based on Location and Moving Direction in Delay Tolerant Networks,”IEICE Transaction on Information and Systems, vol. 93, no. 10, pp. 2763-2775, 2010.(SCI)[42]Chen Wang, Lu Xiao,Jian Shen,and Rui Huang, “Neighborhood Trustworthiness based Vehicle-to-Vehicle Authentication Scheme for Vehicular Ad hoc Networks,”Concurrency and Computation: Practice and Experience,2018, DOI: 10.1002/cpe.4643.(SCI)[43]Chen Wang,Jian Shen,Qi Liu, Yongjun Ren and Tong Li, “A Novel Security Scheme based on Instant Encrypted Transmission for Internet-of-Things,” Security and Communication Networks, 2018, DOI: 10.1155/2018/3680851.(SCI)[44]Dengzhi Liu,Jian Shen, Anxi Wang, and Chen Wang, “Lightweight and Practical Node Clustering Authentication Protocol for Hierarchical Wireless Sensor Networks,”International Journal of Sensor Networks, vol. 27, no. 2, pp. 95-102, 2018.(SCI)[45]Tianqi Zhou,Jian Shen, Xiong Li, Chen Wang, Haowen Tan, “Logarithmic Encryption Scheme for Cyber Physical Systems Employing Fibonacci Q-matrix,”Future Generation Computer Systems, 2018. DOI: 10.1016/j.future.2018.04.008.(SCI)[46]Tianqi Zhou,Jian Shen, Xiong Li, Chen Wang, Jun Shen, “Quantum cryptography for the Future Internet and the Security Analysis,”Security and Communication Networks, 2018, DOI: 10.1155/2018/8214619.(SCI)[47]Jun Shen,Jian Shen, Dengzhi Liu, Chin-Feng Lai, and Shaohua Chang, “Location and Direction Based Two-Hop Routing Protocol in Delay Tolerant Networks,”Journal of Internet Technology, vol. 18, no. 3, pp. 625-636, 2017.(SCI)[48]Tong Li, Chongzhi Gao, Liaoliang Jiang, Witold Pedeycz, andJian Shen, “Publicly verifiable privacy-preserving aggregation and its application in IOT,”Journal of Network and Computer Application, 2018, DOI: 10.1016/j.jnca.2018.09.018.(SCI)[49]Yongjun Ren,Jian Shen, Dengzhi Liu, Jin Wang, and Jeong-Uk Kim, “Evidential Quality Preserving of Electronic Record in Cloud Storage,”Journal of Internet Technology,vol. 17, no. 6, pp. 1125-1132, 2017.(SCI)[50]Sai Ji, Yajie Sun, andJian Shen, “A Method of Data Recovery Based on Compressive Sensing in Wireless Structural Health Monitoring,”Mathematical Problems in Engineering, vol. 2014, no. 1, pp. 1-9, 2014.(SCI)[51]Jin Wang, Liwu Zuo,Jian Shen, Bin Li, and Sungyoung Lee, “Multiple Mobile Sinks based Routing Algorithm for Data Dissemination in Wireless Sensor Networks,”Concurrency and Computation: Practice and Experience, vol. 27, no. 10, pp. 2656-2667, 2015.(SCI)[52]Jian Shen, Shaohua Chang, Haowen Tan, Sai Ji, and Jin Wang, “An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection,”Journal of Computers, vol. 274, pp. 2070-2079, 2015.(EI)[53]Jian Shen, Haowen Tan, Yang Wang, Sai Ji, and Jin Wang, “An Enhanced Grouping Proof for Multiple RFID Readers and Tag Groups,”International Journal of Control and Automation,vol. 7, no. 12, pp. 239-246, 2014.(EI)[54]Jian Shen, Wenying Zheng, Jin Wang, Yuhui Zheng, and Yuan Mei, “An Improved Buffer Scheme in Delay Tolerant Networks,”International Journal of Future Generation Communication and Networking, vol. 6, no. 4, pp. 263-272, 2013.(EI)[55]Jian Shen, Wenying Zheng, Jin Wang, Zhihua Xia, and Zhangjie Fu, “Routing Protocols using Directional Antennas in Ad Hoc Networks: A Comparative Review,”International Journal of Grid and Distributed Computing, vol. 6, no. 5, pp. 39-50, 2013.(EI)[56]Jian Shen, Wenying Zheng, Jin Wang, Zhihua Xia, and Zhangjie Fu, “Study of the Privacy Models in RFID Authentication Protocols,”International Journal of Security and Its Applications, vol. 7, no. 6, pp. 345-354, 2013.(EI)[57]Sai Ji, Rui Huang,Jian Shen, Xin Jin, and Youngju Cho, "A certificateless signcryption scheme for smart home networks,"Concurrency and Computation: Practice and Experience,2018, DOI:10.1002/cpe.508. (SCI)[58]Fayu Wan, Qi Liu,Jian Shen, Jin Wang, Nigel Linge, “Investigation of a 0 Ohm Substitution Current Probe and its Application,”International Journal of Signal Processing, Image Processing and Pattern Recognition, vol. 7, no. 1, pp. 77-86, 2014.(EI)[59]Sai Ji, Liping Huang, Jin Wang, Jinwei Wang,Jian Shen,“The Application of Wavelet Threshold on Compressive Sensing in Wireless Sensor Networks,”International Journal of Hybrid Information Technology, vol. 7, no. 1, pp. 225-232, 2014.(EI)[60]Sai Ji, Liping Huang, Jin Wang,Jian Shen, “An Improved Reconstruction method of Compressive Sensing Data Recovery in Wireless Sensor Networks,”International Journal of Security and Its Applications, vol. 8, no.1, pp. 1-8, 2014.(EI)[61]Li Ma, Bo Li, Jie Du,Jian Shen, “Research on short-term wind farm output power prediction model based on meteorological data collected by WSN,”International Journal of Hybrid Information Technology, vol. 6, no. 5, pp. 219-226, 2013.(EI)[62]Fayu Wan, Qi Liu,Jian Shen, Jin Wang, Nigel Linge, “Radiated emission measurement of a cell phone processor module using TEM cell,”Advanced Science and Technology Letters, vol. 28, no. 9, pp. 48-53, 2013.[63]Fayu Wan, Qi Liu,Jian Shen, Jin Wang, Nigel Linge, “An Ohm substitution current probe is used to measure the emission in the power supply of an integrated circuit,”Advanced Science and Technology Letters, vol. 28, no. 8, pp. 28-33, 2013.2、会议论文:[1]Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, and Mingwu Zhang, “Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing,”23rd Australasian Conference on Information Security and Privacy (ACISP 2018), pp. 417-430, 2018.[2]Jian Shen, Dengzhi Liu, Qi Liu, Zhihua Xia, and Tianqi Zhou, “A Novel Authentication Protocol with Tree-based Signature for Green Cloud Computing,”Proceeding of the International Conference on Computing, Networking and Communications (ICNC 2018), pp. 843-848, 2017.[3]Jian Shen, Tiantian Miao, Qi Liu, Sai Ji, Chen Wang, and Dengzhi Liu, “S-SurF: An Enhanced Secure Bulk Data Dissemination in Wireless Sensor Networks”,Proceedings of International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage, pp. 395-408, 2017.[4]Jian Shen, Meng Feng, Dengzhi Liu, Chen Wang, Jiacheng Jiang, and Xingming Sun, “Enhanced Remote Password-Authenticated Key Agreement Based on Smart Card Supporting Password Changing”,Proceedings of International Conference on Information Security Practice and Experience, pp. 454-467, 2017.[5]Jian Shen, Jun Shen, Chen Wang, and Anxi Wang, “A Fibonacci Based Batch Auditing Protocol for Cloud Data”,Proceedings of International Symposium on Cyberspace Safety and Security, pp. 215-222, 2017.[6]Jian Shen, Chen Wang, Aniello Castiglione, Dengzhi Liu, Christian Esposito, “Greedy probability-based routing protocol for incompletely predictable vehicular ad-hoc network,”Proceedings of Security, Privacy and Anonymity in Computation, Communication and Storage (SpaCCS 2016), 2016(EI)[7]Jian Shen, Haowen Tan, Yongjun Ren, Qi Liu, and Baowei Wang, “A practical RFID grouping authentication protocol in multiple-tag arrangement with adequate security assurance”,Proceedings of International Conference on Advanced Communication Technology, pp. 693-699, 2016.[8]Jian Shen, Dengzhi Liu, Qi Liu, Baowei Wang, Zhangjie Fu, “An Authorized Identity Authentication-based Data Access Control Scheme in Cloud”,Proceedings of the 18th International Conference on Advanced Communications Technology (ICACT 2016), pp. 56-60, South Korea, 2016.(EI)[9]Shaohua Chang, Sai Ji,Jian Shen, Dengzhi Liu, and Haowen Tan, “A Survey on Key Management for Body Sensor Network.”Proceedings of First International Conference on Computational Intelligence Theory, Systems and Applications, pp. 217-221, 2016.[10]Jian Shen, and Shaohua Chang, “Certificateless Authentication Protocol for Wireless Body Area Network,”Proceedings of International Conference on Genetic and Evolutionary Computing, pp. 29-35, 2016.[11]Jian Shen, Anxi Wang, Chen Wang, Yongjun Ren, and Jin Wang, “Performance Comparison of Typical and Improved LEACH Protocols in Wireless Sensor Network.”Proceedings of International Conference on Computational Intelligence Theory (CCITSA), pp. 187-192, 2015. (EI)[12]Dengzhi Liu,Jian Shen, Yuling Chen, Chen Wang, Tianqi Zhou, and Anxi Wang, “Privacy-preserving Data Outsourcing with Integrity Auditing for Lightweight Devices in Cloud Computing,”The 14th International Conference on Information Security and Cryptology (Inscrypt 2018), pp. 223-239, 2019. (EI)[13]Tianqi Zhou, Lina Chen,Jian Shen, “Movie Recommendation System Employing the User-based CF in Cloud Computing,”Proceedings ofIEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 46-50, 2017.[14]Anxi Wang, Shuzhen Pan, Chen Wang,Jian Shen, and Dengzhi Liu, “A Novel Clustering Solution for Wireless Sensor Networks,”Proceedings of International Conference on Green, Pervasive, and Cloud Computing, pp. 313-322, 2017.[15]Jian Shen, Dengzhi Liu, Shaohua Chang, Jun Shen, and Debiao He, “A Lightweight Mutual Authentication Scheme for User and Server in Cloud.”Proceedings of International Conference on Computational Intelligence Theory (CCITSA), pp. 183-186, 2015. (EI)[16]Jian Shen, Dengzhi Liu, Jun Shen, Haowen Tan, and Debiao He, “Privacy Preserving Search Schemes over Encrypted Cloud Data: A Comparative Survey.”Proceedings of International Conference on Computational Intelligence Theory (CCITSA), pp. 197-202, 2015. (EI)[17]Jun Shen, Sai Ji,Jian Shen, Zhangjie Fu, and Jin Wang, “Auditing Protocols for Cloud Storage: A Survey.”Proceedings of International Conference on Computational Intelligence Theory (CCITSA), pp. 222-227, 2015. (EI)[18]Jian Shen, Anxi Wang, Chen Wang, Yongjun Ren, and Xingming Sun,“A RFID Based Localization Algorithm for Wireless Sensor Networks,”Proceedings of International Conference on Cloud Computing and Security,pp. 275-285, 2016.[19]Jian Shen, Jun Shen, Xiong Li, Fushan Wei, and Jiguo Li,“Outsourced Data Modification Algorithm with Assistance of Multi-assistants in Cloud Computing,”Proceedings of International Conference on Cloud Computing and Security ,pp. 389-408, 2016.[20]Jian Shen, Jin Chen, Dengzhi Liu, “A Survey on the Research of Indoor RFID Positioning System,”Proceedings of International Conference on Cloud Computing and Security, pp. 264-274, 2016.[21]Jian Shen, Dengzhi Liu, Jun Shen, Sai Ji, “A Novel Sensors-Based and Multiple Warning Early Fatigue Detection System Architecture,”Proceedings of First International Conference on Computational Intelligence Theory, Systems and Applications, 193-196, 2015.[22]Jian Shen, Haowen Tan, Shaohua Chang, Yongjun Ren, ang Qi Liu, “A Lightweight and Practical RFID Grouping Authentication Protocol in Multiple-Tag Arrangements,”Proceedings of the 17thInternational Conference on Advanced Communications Technology (ICACT 2015), pp. 681-686, South Korea, 2015.(EI)[23]Sai Ji, Dengzhi Liu,Jian Shen, “Localization Technology in Wireless Sensor Networks Using RSSI and LQI: A Survey,”Proceedings of the International Conference on Computer Science & Its Applications, pp. 342-351, 2016.(EI)[24]Sai Ji, Dengzhi Liu,Jian Shen, “Exploiting Group Signature to Implement User Authentication in Cloud Computing,”Proceedings of the International Conference on Computer Science & Its Applications, pp. 323-331, 2016.(EI)[25]Qi Liu, Weidong Cai,Jian Shen*, Baowei Wang, Zhangjie Fu, and Nigel Linge, “An Extreme Learning Approach to Fast Prediction in the Reduce Phase of a Cloud Platform,” ICCCS 2015.(EI)[26]Jian Shen, Dengzhi Liu, Yongjun Ren, Sai Ji, Jin Wang, and Dongmin Choi, “A Mobile-sink Based Energy Efficiency Clustering Routing Algorithm for WSNs in Coal Mine,” CBD, pp. 267-274, 2015.(EI)[27]Jian Shen, Chen Wang, Anxi Wang, Lei Li, Yu Yang, and Jin Wang, “Performance comparison of typical routing protocols in ad-hoc networks,”Proceedings of the International Computer Symposium, ICS 2014, pp. 463-473, Dec. 2014.(EI)[28]Jian Shen, Haowen Tan, Yuhui Zheng, Sai Ji, and Jin Wang, “An enhanced ID-updating hash-based RFID authentication protocol with strong privacy protection,”Proceedings of the International Computer Symposium, ICS 2014, pp. 2070-2079, Dec. 2014.(EI)[29]Jian Shen, Haowen Tan, Yongjun Ren, Yuhui Zheng, and Jin Wang, “A novel hash-based RFID grouping authentication protocol on tag groups and multiple readers,”Proceedings of the International Computer Symposium, ICS 2014, pp. 2162-2171, Dec. 2014.(EI)[30]Jian Shen, Haowen Tan, Sai Ji, Yongjun Ren, and Jin Wang, “A comparative survey on RFID grouping authentication protocols,”Proceedings of the International Computer Symposium, ICS 2014, pp. 982-993, Dec. 2014.(EI)[31]Jian Shen, Jin Wang, Yongjun Ren, Jianwei Zhang, Shunfeng Wang, “Efficient Key Management Scheme for SCADA System,”Proceedings of HumanCom and EMC 2013 (LNEE), pp. 619-625, 2014.(EI)[32]Jian Shen, Jin Wang, Jinwei Wang, Jianwei Zhang, Shunfeng Wang, “Location-Aware Routing Protocol for Underwater Sensor Networks,”Proceedings of HumanCom and EMC 2013 (LNEE), pp. 609-617, 2014.(EI)[33]Jian Shen, Jin Wang, Yuhui Zheng, Jianwei Zhang, “A Novel Verifiably Encrypted Signature from Weil Pairing,”Proceedings of HumanCom and EMC 2013 (LNEE), pp. 605-615, 2014.(EI)[34]Jian Shen, Jin Wang, Jianwei Zhang, Shunfeng Wang, “A Comparative Study on Routing Protocols in Underwater Sensor Networks,”Proceedings of HumanCom and EMC 2014 (LNEE), pp. 593~602, 2013.(EI)[35]Jian Shen, Faliu, Yi, Sangman Moh, and Ilyong Chung, “Energy Efficiency of MAC Protocols in Wireless Sensor Networks,”Proceedings of 2011 International Conference on Information Science and Applications (ICISA 2011), Jeju Island, South Korea, pp. 1-10, 2011.(EI)[36]Jian Shen, Dongmin Choi, Sangman Moh, and Ilyong Chung, “A Novel Anonymous RFID Authentication Protocol Providing Strong Privacy and Security,”Proceedings of the Second International Conference on Multimedia Information Networking & Security (MINES 2010), Nanjing, China, pp. 584-588, Nov. 2010.(EI)[37]Qi Liu, Hongwei Qian, Baowei Wang,Jian Shen, Nigel Linge, “An Enhanced Routing Algorithm for Congestion Control in A Home Energy Management System,”Proceedings of 2013 IEEE 2nd Global Conference on Consumer Electronics (GCCE), pp. 438~439, 2013.(EI)[38]Qi Liu, Jianwei Su, Baowei Wang,Jian Shen, Nigel Linge, “An MSB Embedding Approach to Data Integrity Protection in a Ubiquitous Environment”,Proceedings of the International Conference on the Innovative Computing Technology (INTECH 2013), pp. 97-100, 2013.(EI)[39]Jin Wang, Zhongqi Zhang,Jian Shen, Feng Xia, Sungyoung Lee, “An Improved Stable Election based Routing Protocol with Mobile Sink for Wireless Sensor Networks,”Proceedings of the IEEE International Conference on Cyber, Physical and Social Computing, pp. 945 – 950, 2013.(EI)[40]Jin Wang, Xiaoqin Yang,Jian Shen, Ping Guo, Feng Xia, “Mobile-sink Routing Algorithm based on Energy and Distance for Wireless Sensor Networks,”Proceedings of the IEEE International Conference on Internet of Things, pp. 951 – 956, 2013.(EI)[41]Dongmin Choi,Jian Shen, Sangman Moh, and Ilyong Chung, “Virtual Cluster Routing Protocol for Wireless Sensor Networks,”Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks (PDCN 2009), Innsbruck, Austria, pp. 30-25, 2009.(EI)[42]Jian Shen, Haowen Tan, Yang Wang, Sai Ji, and Jin Wang, “A Novel RFID Authentication Protocol for Multiple Readers and Tag Groups,”Proceedings of the 3rd International Conference on Computer Science and Technology (CST 2014), Batam, Indonesia, pp. 55-61, 2014.[43]Jian Shen, Jin Wang, Yuan Mei, Ilyong Chung, “Privacy Models for RFID Authentication Protocols,”Proceedings of Advances in Information Technology and Computer Science, pp. 25-34, 2013.[44]Jian Shen, Jin Wang, Li Ma, Ilyong Chung, “Improvement of Buffer Scheme for Delay Tolerant Networks,”Proceedings of Advances in Information Technology and Computer Science, pp. 35-44, 2013.[45]Jian Shen, Jin Wang, Jinwei Wang, Ilyong Chung, “A Comparative Study on Routing Protocols Using Directional Antennas in Ad Hoc Networks,”Proceedings of Advances in Information Technology and Computer Science, pp. 45-56, 2013.[46]Jian Shen, Sangman Moh, and Ilyong Chung, “A Novel Key Management Protocol in Body Area Networks,”Proceedings of the Seventh International Conference on Networking and Services (ICNS 2011), Venice/Mestre, Italy, pp. 246-251, 2011.[47]Jian Shen, Sangman Moh, and Ilyong Chung, “Comparative Analysis on Location in Wireless Sensor Networks,”Proceedings of the 24rd International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2009), Jeju Island, Korea, pp.1533-1536, 2009.[48]Jian Shen, Sangman Moh, and Ilyong Chung, “Routing Protocols in Delay Tolerant Networks: A Comparative Survey,”Proceedings of the 23rd International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC 2008), Shimonoseki City, Japan, pp.1577-1580, 2008.[49]Jin Wang, Bo Tang, Zhongqi Zhang,Jian Shen, “An Energy Efficient Data Dissemination Algorithm for Wireless Sensor Networks,”Proceedings of the 2nd International Conference on Computer, Information and Application, Clark, Philippines, pp. 135-140, 2014.[50]Dongmin Choi,Jian Shen, Ilyong Chung, “Toward Ideal Clustering Scheme: Comparative Analysis of Clustering Schemes for Wireless Sensor Networks,”Proceedings of the 8thInternational Conference on Multimedia Information Technology and Applications (MITA 2012),Beijing, China, pp. 1-2, 2012.[51]Sangman Moh,Jian Shen, and Ilyong Chung, “Using a Mobile Terminal to Help Visually Impaired People,”Proceedings of IADIS International Conference e-society 2009, Barcelona, Spain, pp. 185-188, 2009.授权发明专利[1].沈剑,刘登志,刘琦,王保卫,付章杰.面向车载网中感知层面的疲劳检测与处理方法,2015.11,中国,进入实审.[2].沈剑,刘登志,沈珺,常少华,任勇军.基于车辆速度和距离的交叉路口碰撞可能性的评估方法,2015.11,中国,进入实审.[3].沈剑,王晨,王安喜,李雷,孙星明.一种DTN环境下基于位置和方向的优先级路由方法,2015.01,中国,进入实审.[4].沈剑,郑文英,孙星明,谭皓文.体域网中加强的传感器安全附着和密钥管理方法,2013.11,中国,已授权.[5].沈剑,郑文英,孙星明,任勇军,夏志华.一种基于区组设计的容错性密钥协商方法,2013.11,中国,进入实审.[6].任勇军,沈剑,韩进.基于MLE的可公开验证云存储数据持有性的方法,2015.01,中国,已授权.[7].刘琦,蔡卫东,肖博,沈剑,付章杰.一种基于云平台的室内交互式引导实现方案,2015.10,中国,进入实审.[8].刘琦,蔡卫东,肖博,沈剑,付章杰.一种智能车窗控制系统及其控制方法,2015.10,中国,已授权.[9].刘琦,陈雪东,付章杰,沈剑,王保卫.一种用于大田监控的移动传感器网络低功耗路由方法,2015.10,中国,进入实审.[10].刘琦,肖博,沈剑,任万春.一种设施农业气象预警轻量地理分 析方法,2014.02,中国,进入实审.[11].任勇军,沈剑,成亚萍.基于多功能数字水印的云存储图像数据持 有性证明方法,2013.12,中国,已授权.
专利、著作版权等
软件著作权[1].沈剑,王安喜(学生),王晨(学生),杨雨(学生),李雷(学生).Ad-hoc路由协议性能分析软件,2015SR044698[2].沈剑,谭皓文(学生),任勇军,常少华(学生).基于人脸检测识别的验证防伪系统,2015SR083877[3].沈剑,王晨(学生),王安喜(学生),李雷(学生) . 网络路由协议性能对比分析软件,2015SR157694[4].沈剑,刘登志(学生),刘琦,王保卫,沈珺(学生).基于BS的超市管理系统,2015SR172596[5].沈剑,刘登志(学生),常少华(学生),沈珺(学生),谭皓文(学生).高校开放实验室信息管理系统,2015SR179084[6].黄睿(学生),沈剑,季赛,金鑫(学生),郑慧瑶(学生).高校科研管理系统,2018SR511705[7].王晨(学生),沈剑,黄睿(学生).移动目标入侵检测及报警系统,2018SR511700[8].姜心肇(学生),沈剑,孔伟(学生),杨惠杰(学生).网上订餐系统,2018SR715091[9].桂梓原(学生),沈剑.网上家居购物系统,2018SR1030522指导学生情况培养博士生4名,硕士生16名,学生中有校研究生标兵1名,校优秀研究生干部4名,校三好研究生7名,指导优秀本科生毕业论文7人,指导优秀研 究生毕业论文2人。1名研究生获全额奖学金赴韩国朝鲜大学攻读博士学位、1名研究生赴西安电子科技大学攻读博士学位; 2名研究生受邀参加IEEE EUC 2017、GPC 2017等国际学术会议,并作大会报告; 1名博士在读期间被硅湖职业技术学院聘为计算机科学与技术学院兼职教师,促进了校校合作,提高了该校计算机学科毕业生的行业竞争力; 1名博士参加“百名博士邳州行”科技实践服务活动,并被选为博士生代表接受电视台的采访,为高新企业的发展建言献策,加强校地合作,推动产业创新发展。
声明:本站专家信息来源于各高校官网。