Follow
Jinchuan Tang
Jinchuan Tang
Professor of Big Data, Guizhou University
Verified email at gzu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Secrecy performance analysis of wireless communications in the presence of UAV jammer and randomly located UAV eavesdroppers
J Tang, G Chen, JP Coon
IEEE Transactions on Information Forensics and Security 14 (11), 3026-3041, 2019
1252019
Optimal routing for multihop social-based D2D communications in the Internet of Things
G Chen, J Tang, JP Coon
IEEE Internet of Things Journal 5 (3), 1880-1889, 2018
982018
Distance distributions for Matérn cluster processes with application to network performance analysis
J Tang, G Chen, JP Coon, DE Simmons
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
282017
Meta distribution of the secrecy rate in the presence of randomly located eavesdroppers
J Tang, G Chen, JP Coon
IEEE Wireless Communications Letters 7 (4), 630-633, 2018
252018
Machine-learning-empowered passive beamforming and routing design for multi-RIS-assisted multihop networks
C Huang, G Chen, J Tang, P Xiao, Z Han
IEEE Internet of Things Journal 9 (24), 25673-25684, 2022
242022
Route selection based on connectivity-delay-trust in public safety networks
J Tang, G Chen, JP Coon
IEEE Systems Journal 13 (2), 1558-1567, 2018
222018
A novel local differential privacy federated learning under multi-privacy regimes
C Liu, Y Tian, J Tang, S Dang, G Chen
Expert Systems with Applications 227, 120266, 2023
132023
Joint coverage enhancement by power allocation in Poisson clustered out-of-band D2D networks
J Tang, G Chen, JP Coon
IEEE Transactions on Vehicular Technology 67 (12), 11537-11548, 2018
132018
Multi-distribution mixture generative adversarial networks for fitting diverse data sets
M Yang, J Tang, S Dang, G Chen, JA Chambers
Expert Systems with Applications 248, 123450, 2024
42024
Blockchain-Assisted Reputation Mechanism for Distributed Cloud Storage
Q Dong, J Tang, S Dang, G Chen, JA Chambers
IEEE Systems Journal 17 (4), 6334-6345, 2023
42023
Data privacy and utility trade-off based on mutual information neural estimator
Q Wu, J Tang, S Dang, G Chen
Expert Systems with Applications 207, 118012, 2022
42022
Optimal cross-tier power allocation for D2D multi-cell networks
J Tang, JP Coon, G Chen
2016 IEEE Global Communications Conference (GLOBECOM), 1-6, 2016
32016
Privacy Protection and Utility Trade-Off for Social Graph Embedding
L Cai, J Tang, S Dang, G Chen
Information Sciences, 120866, 2024
12024
Distributed cyclic delay diversity for cooperative infrastructure-to-vehicle systems
KJ Kim, J Guo, J Tang, PV Orlik
2019 IEEE Global Communications Conference (GLOBECOM), 1-6, 2019
12019
Weight decay regularized adversarial training for attacking angle imbalance
G Wang, J Tang, Z Ding, S Dang, G Chen
Expert Systems with Applications 265, 125858, 2025
2025
Priority-Based Blockchain Packing for Dependent Industrial IoT Transactions
C Lin, J Tang, S Dang, G Chen
IEEE Transactions on Network and Service Management, 2025
2025
Membership inference attacks via spatial projection-based relative information loss in MLaaS
Z Ding, Y Tian, G Wang, J Xiong, J Tang, J Ma
Information Processing & Management 62 (1), 103947, 2025
2025
Privacy and distribution preserving generative adversarial networks with sample balancing
H Sun, J Tang, S Dang, G Chen
Expert Systems with Applications 258, 125181, 2024
2024
A Lightweight Trust Mechanism with Attack Detection for IoT
X Zhou, J Tang, S Dang, G Chen
Entropy 25 (8), 1198, 2023
2023
System-level analysis and design for reliability and security in wireless networks
J Tang
University of Oxford, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20