default search action
Jie Lin 0002
Person information
- affiliation: Xian Jiaotong University, School of Electronic and Information Engineering, China
Other persons with the same name
- Jie Lin — disambiguation page
- Jie Lin 0001 — Institute for Infocomm Research, Singapore (and 2 more)
- Jie Lin 0003 (aka: Jane Lin 0001) — University of Illinois at Chicago, Department of Civil and Materials Engineering, USA
- Jie Lin 0004 — AMD Inc., Sunnyvale, CA, USA (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Benxin Yin, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
PVFL: Verifiable federated learning and prediction with privacy-preserving. Comput. Secur. 139: 103700 (2024) - [j39]Guangshang Jiang, Hanlin Zhang, Jie Lin, Fanyu Kong, Leyun Yu:
Optimized verifiable delegated private set intersection on outsourced private datasets. Comput. Secur. 141: 103822 (2024) - [j38]Yongjie Li, Hanlin Zhang, Jie Lin, Fan Liang, Hansong Xu, Xing Liu, Leyun Yu:
Secure Edge-Aided Singular Value Decomposition in Internet of Things. IEEE Internet Things J. 11(13): 23207-23221 (2024) - [j37]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Peng Zhao:
Improving query efficiency of black-box attacks via the preference of deep learning models. Inf. Sci. 678: 121013 (2024) - [c21]Guangmao Gao, Hanlin Zhang, Jie Lin, Hansong Xu, Fanyu Kong, Leyun Yu:
Privacy-preserving Deep Learning for Autism Spectrum Disorder Classification. SmartCloud 2024: 13-18 - 2023
- [j36]Jing Huang, Peng Zhao, Guiqin Wang, Shusen Yang, Jie Lin:
Self-attention-based long temporal sequence modeling method for temporal action detection. Neurocomputing 554: 126617 (2023) - [j35]Jie Lin, Siqi Huang, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A Deep-Reinforcement-Learning-Based Computation Offloading With Mobile Vehicles in Vehicular Edge Computing. IEEE Internet Things J. 10(17): 15501-15514 (2023) - [j34]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Improving the transferability of adversarial examples via direction tuning. Inf. Sci. 647: 119491 (2023) - [j33]Fei Gao, Hanlin Zhang, Jie Lin, Hansong Xu, Fanyu Kong, Guoqiang Yang:
A verifiable and privacy-preserving framework for federated recommendation system. J. Ambient Intell. Humaniz. Comput. 14(4): 4273-4287 (2023) - [j32]Jie Lin, Zekun Mu, Tianqing Zhao, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Action density based frame sampling for human action recognition in videos. J. Vis. Commun. Image Represent. 90: 103740 (2023) - [j31]Jie Lin, Siqi Huang, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A novel coalition game based distributed cooperative content caching in mobile edge networks. Veh. Commun. 44: 100689 (2023) - [i10]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Fuzziness-tuned: Improving the Transferability of Adversarial Examples. CoRR abs/2303.10078 (2023) - [i9]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Improving the Transferability of Adversarial Examples via Direction Tuning. CoRR abs/2303.15109 (2023) - 2022
- [j30]Jie Lin, Lin Huang, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A Novel Lyapunov based Dynamic Resource Allocation for UAVs-assisted Edge Computing. Comput. Networks 205: 108710 (2022) - [j29]Haiyang Liu, Hanlin Zhang, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving cloud-Aided broad learning system. Comput. Secur. 112: 102503 (2022) - [j28]Hanlin Zhang, Jia Yu, Mohammad S. Obaidat, Pandi Vijayakumar, Linqiang Ge, Jie Lin, Jianxi Fan, Rong Hao:
Secure Edge-Aided Computations for Social Internet-of-Things Systems. IEEE Trans. Comput. Soc. Syst. 9(1): 76-87 (2022) - [j27]Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong:
Machine Learning on Cloud With Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. IEEE Trans. Netw. Sci. Eng. 9(6): 3956-3967 (2022) - [j26]Peng Zhao, Wei Yu, Xinyu Yang, Duolun Meng, Li Wang, Shusen Yang, Jie Lin:
Context-Aware Multi-Criteria Handover at the Software Defined Network Edge for Service Differentiation in Next Generation Wireless Networks. IEEE Trans. Serv. Comput. 15(4): 2032-2046 (2022) - [i8]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Enhancing the Transferability of Adversarial Examples via a Few Queries. CoRR abs/2205.09518 (2022) - [i7]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
Mask-Guided Divergence Loss Improves the Generalization and Robustness of Deep Neural Network. CoRR abs/2206.00913 (2022) - [i6]Xiangyuan Yang, Jie Lin, Hanlin Zhang, Xinyu Yang, Peng Zhao:
FACM: Correct the Output of Deep Neural Network with Middle Layers Features against Adversarial Samples. CoRR abs/2206.00924 (2022) - 2021
- [j25]Jie Lin, Lin Huang, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A novel Latency-Guaranteed based Resource Double Auction for market-oriented edge computing. Comput. Networks 189: 107873 (2021) - [j24]Peng Gao, Hanlin Zhang, Jia Yu, Jie Lin, Xiaopeng Wang, Ming Yang, Fanyu Kong:
Secure Cloud-Aided Object Recognition on Hyperspectral Remote Sensing Images. IEEE Internet Things J. 8(5): 3287-3299 (2021) - [j23]Hanlin Zhang, Le Tong, Jia Yu, Jie Lin:
Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. IEEE Internet Things J. 8(20): 15596-15607 (2021) - [i5]Hanlin Zhang, Peng Gao, Jia Yu, Jie Lin, Neal N. Xiong:
Machine Learning on Cloud with Blockchain: A Secure, Verifiable and Fair Approach to Outsource the Linear Regression. CoRR abs/2101.02334 (2021) - [i4]Hanlin Zhang, Le Tong, Jia Yu, Jie Lin:
Blockchain Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices. CoRR abs/2101.02341 (2021) - [i3]Haiyang Liu, Hanlin Zhang, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving Cloud-Aided Broad Learning System. CoRR abs/2101.02826 (2021) - 2020
- [j22]Peng Zhao, Peizhe Wang, Xinyu Yang, Jie Lin:
Towards Cost-Efficient Edge Intelligent Computing With Elastic Deployment of Container-Based Microservices. IEEE Access 8: 102947-102957 (2020) - [j21]Jie Lin, Biao Xiao, Hanlin Zhang, Xinyu Yang, Peng Zhao:
A novel multitype-users welfare equilibrium based real-time pricing in smart grid. Future Gener. Comput. Syst. 108: 145-160 (2020) - [j20]Hanlin Zhang, Jia Yu, Chengliang Tian, Guobin Xu, Peng Gao, Jie Lin:
Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things. IEEE Internet Things J. 7(4): 2968-2981 (2020) - [j19]Hanlin Zhang, Jia Yu, Chengliang Tian, Le Tong, Jie Lin, Linqiang Ge, Huaqun Wang:
Efficient and Secure Outsourcing Scheme for RSA Decryption in Internet of Things. IEEE Internet Things J. 7(8): 6868-6881 (2020) - [j18]Jie Lin, Wei Yu, Xinyu Yang, Peng Zhao, Hanlin Zhang, Wei Zhao:
An Edge Computing Based Public Vehicle System for Smart Transportation. IEEE Trans. Veh. Technol. 69(11): 12635-12651 (2020)
2010 – 2019
- 2019
- [j17]Xialei Zhang, Liang Guo, Hanlin Zhang, Lifeng Guo, Kai Feng, Jie Lin:
An Energy Scheduling Strategy With Priority Within Islanded Microgrids. IEEE Access 7: 135896-135908 (2019) - [j16]Peng Zhao, Xinyu Yang, Jie Lin, Shusen Yang, Wei Yu:
Energy-Efficient Analytics for Geographically Distributed Big Data. IEEE Internet Comput. 23(3): 18-29 (2019) - 2018
- [j15]Wei Yu, Fan Liang, Xiaofei He, William G. Hatcher, Chao Lu, Jie Lin, Xinyu Yang:
A Survey on the Edge Computing for the Internet of Things. IEEE Access 6: 6900-6919 (2018) - [j14]Hanlin Zhang, Jia Yu, Chengliang Tian, Pu Zhao, Guobin Xu, Jie Lin:
Cloud Storage for Electronic Health Records Based on Secret Sharing With Verifiable Reconstruction Outsourcing. IEEE Access 6: 40713-40722 (2018) - [j13]Xiaofei He, Xinyu Yang, Wei Yu, Jie Lin, Qingyu Yang:
Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems. Sensors 18(2): 674 (2018) - [j12]Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Linqiang Ge:
Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense. IEEE Trans. Veh. Technol. 67(9): 8738-8753 (2018) - [c20]Peng Zhao, Xinyu Yang, Wei Yu, Jie Lin, Duolun Meng:
Context-Aware Multi-Criteria Handover with Fuzzy Inference in Software Defined 5G HetNets. ICC 2018: 1-6 - [c19]Xiaofei He, Wei Yu, Hansong Xu, Jie Lin, Xinyu Yang, Chao Lu, Xinwen Fu:
Towards 3D Deployment of UAV Base Stations in Uneven Terrain. ICCCN 2018: 1-9 - 2017
- [j11]Peng Zhao, Wei Yu, Shusen Yang, Xinyu Yang, Jie Lin:
On Minimizing Energy Cost in Internet-Scale Systems With Dynamic Data. IEEE Access 5: 20068-20082 (2017) - [j10]Xinyu Yang, Peng Zhao, Xialei Zhang, Jie Lin, Wei Yu:
Toward a Gaussian-Mixture Model-Based Detection Scheme Against Data Integrity Attacks in the Smart Grid. IEEE Internet Things J. 4(1): 147-161 (2017) - [j9]Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Hanlin Zhang, Wei Zhao:
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications. IEEE Internet Things J. 4(5): 1125-1142 (2017) - [j8]Qingyu Yang, Dongheng Li, Wei Yu, Yuanke Liu, Dou An, Xinyu Yang, Jie Lin:
Toward Data Integrity Attacks Against Optimal Power Flow in Smart Grid. IEEE Internet Things J. 4(5): 1726-1738 (2017) - [j7]Xialei Zhang, Xinyu Yang, Jie Lin, Guobin Xu, Wei Yu:
On Data Integrity Attacks Against Real-Time Pricing in Energy-Based Cyber-Physical Systems. IEEE Trans. Parallel Distributed Syst. 28(1): 170-187 (2017) - [j6]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Real-Time En-Route Route Guidance Decision Scheme for Transportation-Based Cyberphysical Systems. IEEE Trans. Veh. Technol. 66(3): 2551-2566 (2017) - [c18]Jie Lin, Wei Yu, Nan Zhang, Xinyu Yang, Linqiang Ge:
On data integrity attacks against route guidance in transportation-based cyber-physical systems. CCNC 2017: 313-318 - [c17]Cong Zhao, Xinyu Yang, Wei Yu, Xianghua Yao, Jie Lin, Xin Li:
Cheating-resilient incentive scheme for mobile crowdsensing systems. CCNC 2017: 377-382 - [c16]Qingyu Yang, Yuanke Liu, Wei Yu, Dou An, Xinyu Yang, Jie Lin:
On data integrity attacks against optimal power flow in power grid systems. CCNC 2017: 1008-1009 - [i2]Cong Zhao, Xinyu Yang, Wei Yu, Xianghua Yao, Jie Lin, Xin Li:
Cheating-Resilient Incentive Scheme for Mobile Crowdsensing Systems. CoRR abs/1701.01928 (2017) - [i1]Peng Zhao, Shusen Yang, Xinyu Yang, Wei Yu, Jie Lin:
Energy-efficient Analytics for Geographically Distributed Big Data. CoRR abs/1708.03184 (2017) - 2016
- [j5]Jie Lin, Wei Yu, Xinyu Yang:
Towards Multistep Electricity Prices in Smart Grid Electricity Markets. IEEE Trans. Parallel Distributed Syst. 27(1): 286-302 (2016) - [j4]Xinyu Yang, Xuebin Ren, Jie Lin, Wei Yu:
On Binary Decomposition Based Privacy-Preserving Aggregation Schemes in Real-Time Monitoring Systems. IEEE Trans. Parallel Distributed Syst. 27(10): 2967-2983 (2016) - [c15]Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Peng Zhao:
A Gaussian-Mixture Model Based Detection Scheme against Data Integrity Attacks in the Smart Grid. ICCCN 2016: 1-9 - [c14]Xinyu Yang, Xialei Zhang, Jie Lin, Wei Yu, Xinwen Fu, Wei Zhao:
Data integrity attacks against the distributed real-time pricing in the smart grid. IPCCC 2016: 1-8 - [c13]Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang:
A novel microgrid based resilient Demand Response scheme in smart grid. SNPD 2016: 337-342 - [c12]Xinyu Yang, Xiaofei He, Jie Lin, Wei Yu, Qingyu Yang:
A Game-Theoretic Model on Coalitional Attacks in Smart Grid. Trustcom/BigDataSE/ISPA 2016: 435-442 - 2015
- [j3]Po-Yu Chen, Shusen Yang, Julie A. McCann, Jie Lin, Xinyu Yang:
Detection of false data injection attacks in smart-grid systems. IEEE Commun. Mag. 53(2): 206-213 (2015) - [j2]Xinyu Yang, Xiaofei He, Wei Yu, Jie Lin, Rui Li, Qingyu Yang, Houbing Song:
Towards a Low-Cost Remote Memory Attestation for the Smart Grid. Sensors 15(8): 20799-20824 (2015) - [j1]Xinyu Yang, Jie Lin, Wei Yu, Paul-Marie Moulema, Xinwen Fu, Wei Zhao:
A Novel En-Route Filtering Scheme Against False Data Injection Attacks in Cyber-Physical Networked Systems. IEEE Trans. Computers 64(1): 4-18 (2015) - [c11]Xialei Zhang, Xinyu Yang, Jie Lin, Guobin Xu, Wei Yu:
Towards Efficient and Secured Real-Time Pricing in the Smart Grid. GLOBECOM 2015: 1-6 - [c10]Xuebin Ren, Xinyu Yang, Jie Lin, Wei Yu:
On binary decomposition based privacy-preserving aggregation schemes in real-time monitoring systems. ICC 2015: 7083-7088 - [c9]Xialei Zhang, Xinyu Yang, Jie Lin, Wei Yu:
On false data injection attacks against the dynamic microgrid partition in the smart grid. ICC 2015: 7222-7227 - [c8]Jie Lin, Wei Yu, Xinyu Yang, Qingyu Yang, Xinwen Fu, Wei Zhao:
A Novel Dynamic En-Route Decision Real-Time Route Guidance Scheme in Intelligent Transportation Systems. ICDCS 2015: 61-72 - [c7]Xiaofei He, Xinyu Yang, Jie Lin, Linqiang Ge, Wei Yu, Qingyu Yang:
Defending against Energy Dispatching Data integrity attacks in smart grid. IPCCC 2015: 1-8 - 2013
- [c6]Jie Lin, Wei Yu, Xinyu Yang:
On false data injection attack against Multistep Electricity Price in electricity market in smart grid. GLOBECOM 2013: 760-765 - [c5]Jie Lin, Wei Yu, Xinyu Yang, Cong Zhao, Qingyu Yang:
On effectiveness of integrating intermittent resources and electricity vehicles in the smart grid. ICC 2013: 4266-4270 - [c4]Xuebin Ren, Xinyu Yang, Jie Lin, Qingyu Yang, Wei Yu:
On Scaling Perturbation Based Privacy-Preserving Schemes in Smart Metering Systems. ICCCN 2013: 1-7 - 2012
- [c3]Jie Lin, Wei Yu, Xinyu Yang, Guobin Xu, Wei Zhao:
On False Data Injection Attacks against Distributed Energy Routing in Smart Grid. ICCPS 2012: 183-192 - [c2]Xinyu Yang, Jie Lin, Paul Moulema, Wei Yu, Xinwen Fu, Wei Zhao:
A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems. ICDCS 2012: 92-101 - 2011
- [c1]Jie Lin, Xinyu Yang, Wei Yu, Xinwen Fu:
Towards Effective En-Route Filtering against Injected False Data in Wireless Sensor Networks. GLOBECOM 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint