Publications

Publication bib file

Book Chapters

  1. J. Ren, Computer Network Management, Handbook Computer Networks, Volume 3, John Wiley & Sons, Inc., 4 January, 2012.
  2. J. Ren and T. Li, Network Management, Handbook of Technology Management, John Wiley & Sons, Inc., January 2010.
  3. J. Ren and T. Li, Enterprise Security Architecture, Handbook of Technology Management, John Wiley & Sons, Inc., January 2010.
  4. J. Ren, Managing a Network Environment, Handbook of Information Security, Volume 3, John Wiley & Sons, Inc., 13 March 2006.

Journal Papers

  1. Z. Yu, X. Wu, H. Wang, A. Katsaggelos and J. Ren, Automated Adaptive Cinematography For User Interaction in Open World, IEEE Transactions on Multimedia, accepted, to appear.
  2. J. Deng, B. Sun, N. Scheel, A. Renli, D. Zhu, D. Zhu, J. Ren, T. Li and R. Zhang, Causalized convergencent cross mapping and its approximate equivalence with directed information in causality analysis, PNAN Nexus, December 7, 2023.
  3. Z. Yu, H. Wang, A. Katsaggelos and J. Ren, A Novel Automatic Content Generation And Optimization Framewor, IEEE Internet of Things Journal, vol. 10, no. 14, 15 July 2023, pp: 12338-12351.
  4. E. Zaghloul, T. Li and J. Ren, d-EMR: Secure and Distributed Electronic Medical Record Management, High-Confidence Computing (Elsevier), vol. 3, 2023, https://doi.org/10.1016/j.hcc.2022.100101.
  5. T. Li, J. Deng and J. Ren, Security and Energy Efficiency: Breaking the Barriers of High Peak-to-Average Power Ratio and Disguised Jamming in NextG IoT System Design, IEEE Internet of Things Journal, vol. 10, no. 3, 1 February 2023, pp:2658-2666.
  6. T. Li, Y. Zheng, Z. Wang, D.C. Zhu, J. Ren, T. Liu and K. Friston, Brain Information Processing Capacity Modeling, Scientific Repports (Nature Portfolio), (2022) 12:2174.
  7. J. Ren, J. Li, T. Li and M. Mutka, Feasible Region of Secure and Distributed Data Storage in Adversarial Networks, IEEE Internet of Things Journal, Vol. 9, No. 11, pp: 8980-8988, 2022.
  8. E. Zaghloul, T. Li, M. Mutka and J. Ren, d-MABE: Distributed Multilevel Attribute-Based EMR Management and Applications, IEEE Transactions on Services Computing, vol. 15, no. 3, pp. 1592-1605, 2022.
  9. Z. Yu, H. Wang and J. Ren, RealPRNet: A Real-time Phoneme Recognized Network for "Believable" Speech Animation, IEEE Internet of Things Journal, vol. 9, Issue 7, pages: 5357-5367, 2022.
  10. E. Zaghloul, T. Li and J. Ren, d-BAME: Distributed Blockchain-based Anonymous Mobile Electronic Voting, IEEE Internet of Things Journal, vol: 8. Issue: 22, pages: 16585-16597, Nov. 15, 2021.
  11. K. Zhou and J. Ren, CASO: Cost-Aware Secure Outsourcing of General Computational Problems, IEEE Transactions on Services Computing, vol. 14, no. 2, pages: 386-399, March/April 2021.
  12. E. Zaghloul, K. Zhou and J. Ren, P-MOD: Secure Privilege-Based Multilevel Organizational Data-Sharing in Cloud Computing, IEEE Transactions on Big Data, vol. 6, no. 4, pages: 804-815, December, 2020.
  13. E. Zaghloul, T. Li, M. Mutka and J. Ren, Bitcoin and Blockchain: Security and Privacy, IEEE Internet of Things Journal, Vol. 7, No, 10, October 2020, pages: 10288-10313.
  14. J. Li, T. Li and J. Ren, Beyond the MDS Bound in Distributed Storage, IEEE Transactions on Information Theory, vol. 66, No. 7, July 2020, pages: 3957-3975.
  15. E. Zaghloul, T. Li and J. Ren, Bitcoin Double-Spending Profitability Analysis, IEEE Blockchain Technical Briefs, January 2020.
  16. Y. Liang, J. Ren and T. Li, Secure OFDM System Design and Capacity Analysis under Disguised Jamming, IEEE Transactions on Information Forensics and Security, vol. 15, pages: 738-752, 2020.
  17. J. Li, T. Li, J. Ren and H.-C. Chao, Enjoy the Benefit of Network Coding: Combat Pollution Attacks in 5G Multihop Networks, Wireless Communications and Mobile Computing, Vol. 2018, Article ID 3473910.
  18. M.H. Afifi, K. Zhou and J. Ren, Privacy Characterization and Quantification in Data Publication, IEEE Transactions on Knowledge and Data Engineering, Vol. 30, No. 8, pages: 1656-1769, 2018.
  19. M.H. Afifi, L. Zhou, S. Chakrabartty and J. Ren, Dynamic Authentication Protocol Using Self-powered Timers for Passive Internet of Things, IEEE Internet of Things Journal, Vol. 5, No. 4, pages: 2927-2935, 2018.
  20. K. Zhou and J. Ren, PassBio: Privacy-Preserving User-Centric Biometric Authentication, IEEE Transactions on Information Forensics and Security, vol. 13, No. 12, 2018, pages: 3050-3063.
  21. J. Li, Y. Li, Z. Zhang, J. Ren and N. Zhao, Towards Green IoT Networking: Performance Optimization of Network Coding Based Communication and Reliable Storage, IEEE Access, Vol. 5, No. 1, pp: 8780-8791, June 2017.
  22. K. Zhou, M.H. Afifi and J. Ren, ExpSOS: Secure and Verifiable Outsourcing of Exponentiation Operations for Mobile Cloud Computing, IEEE Transactions on Information Forensics & Security, Vol. 12, No. 11, November 2017, pages: 2518-2531.
  23. J. Li, T. Li and J. Ren, Optimal Construction of Regenerating Code through Rate-Matching in Hostile Networks, IEEE Transactions on Information Theory, Vol. 63, No. 7, July 2017, pages: 4414-4429.
  24. C. Yang, M. Zhang, Q. J.g, J. Zhang, D. Li, J.F. Ma and J. Ren, Zero Knowledge Based Client Side Deduplication for Encrypted Files of Secure Cloud Storage in Smart Cities, Pervasive and Mobile Computing, Vol. 41, October 2017, pages: 243-258.
  25. D. Tang, T. Li and J. Ren, Congestion-Aware Routing Scheme Based on Traffic Information in Sensor Networks, Ad Hoc & Sensor Wireless Networks, Vol. 35, No. 3-4, 2017, pages: 281-300.
  26. D. Tang and J. Ren, A Novel Delay-Aware and Privacy-Preserving (DAPP) Data Forward Scheme for Urban Sensing Network, IEEE Transactions on Vehicular Technology, April 2016, pages: 2578-2588.
  27. L. Lightfoot, Y. Li and J. Ren, STaR: Design and Quantitative Measurement of Source-Location Privacy for Wireless Sensor Networks, Security and Communication Networks, Vol. 9, Issue 3, 2016, pages-220-228.
  28. J. Ren, Y. Li, T. Jang and T. Li, Anonymous Communication in Overlay Networks, Security and Communication Networks, Vol. 9, Issue 3, 2016, pages: 229-240.
  29. D. Tang, T. Li, J. Ren and J. Wu, Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 26, No. 4, April 2015. This paper has been both LEVEL ONE plagiarized and LEVEL TWO plagiarized.
  30. C. Yang, J. Ren and J.F. Ma, Provable Ownership of Files in De-Duplication Cloud Storage, Security and Communication Networks, Vol. 8, Issue 14, pages: 2457-2468, 2015.
  31. Q. Liang, J. Ren, J. Liang, Y. Pi and C. Zhao, Security in Big Data, Security and Communication Networks, vol. 8, Issue 14, pages: 2383-2385.
  32. C. Yang and J. Ren, Provable Ownership of Encrypted Files in De-duplication Cloud Storage, Ad Hoc & Sensor Wireless Networks, Vol 26, No. 1-4, 2015, pages: 43-72.
  33. T. Li, M. Abdelhakim and J. Ren, N-Hop Networks -- A General Framework for Wireless System, IEEE Wireless Communications, April 2014, pages: 98-105.
  34. Y. Yu, M. H. Au, Y. Mu, S. Tang, J. Ren, W. Susilo and L. Dong, Enhanced Privacy of a Remote Data Integrity-checking Protocol for Secure Cloud Storage, International Journal of Information Security, Springer, August 2014.
  35. M. Abdelhakim, L. Lightfoot, J. Ren and T. Li, Distributed Detection in Mobile Access Wireless Sensor Networks Under Byzantine Attacks, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 4, April 2014, pages: 950-959.
  36. J. Li, Y. Li, J. Ren and J. Wu, Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 25, No. 5, May 2014, pages: 1223-1232.
  37. A. Alahmadi, M. Abdelhak, J. Ren and T. Li, Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard, IEEE Transactions on Information Forensics & Security, Vol. 9, No. 5, May 2014, pages: 772-781.
  38. J. Ren and L. Harn, An Efficient Threshold Anonymous Authentication Scheme for Privacy-Preserving Communications, IEEE Transactions on Wireless Communications, Vol. 12, No. 3, March 2013, pages: 1018-1025.
  39. T. Li, J. Ren and X. Tang, Secure Wireless Monitoring and Control Systems for Smart Grid and Smart Home, IEEE Wireless Communications, Vol. 19, Issue: 3, June 2012, pages: 66-75.
  40. L. Zhang, J. Ren and T. Li, Time-Varying Jamming Modeling and Classification, IEEE Transactions on Signal Processing, Vol. 60, No. 7, July 2012, pages: 3902-3907.
  41. T. Jang, T. Li and J. Ren, Towards Secure Cognitive Communications in Wireless Networks, IEEE Wireless Communications, Vol. 19, Issue: 4, August 2012. pages: 82-88.
  42. Y. Li, J. Ren and J. Wu, Quantitative Measurement and Design of Source-Location Privacy Schemes for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 7, July 2012, pages: 1302-1311.
  43. L. Harn and J. Ren, Generalized Digital Certificate for User Authentication and Key Establishment for Secure Communications, IEEE Transactions on Wireless Communications, Vol. 10, No. 7, July 2011, pages: 2372-2379.
  44. J. Ren and J. Wu, Survey on Anonymous Communications in Computer Networks, Computer Communications., Vol. 33, Issue 4, March 2010, Pages: 420-431.
  45. J. Ren, Y. Li and T. Li, SPM: Source Privacy for Mobile Ad Hoc Networks, EURASIP Journal on Wireless Communications and Networking, Vol. 2010 (2010), Article ID 534712, 10 pages, doi: 10.1155/2010/534712.
  46. L. Lightfoot, L. Zhang, J. Ren and T. Li, Secure Collision-Free Frequency Hopping for OFDMA Based Wireless Networks, EURASIP Journal on Advances in Signal Processing, Vol. 2009 (2009), doi: 10.1155/2009/361063.
  47. J. Ren, An Identity Based Single-Sign-On Scheme for Computer Networks, Security and Computer Networks, Vol. 2, pages: 255-258, 2009.
  48. J. Ren, Cryptographic Watermarking Techniques for Multimedia Signals, Advances in Computational Mathematics, Vol. 31, Numbers 1-3/October, pages: 267-281, 2009.
  49. L. Harn, J. Ren and C. Lin, Efficient Identity-Based GQ Multisignatures, International Journal of Information Security, Vol. 8, Issue 3, page 205-210, 2009.
  50. L. Harn, J. Ren and C. Lin, Design of DL-Based Certificateless Digital Signatures, Journal of Systems and Software, Vol. 82, pp. 789-793, 2009.
  51. J. Ren and L. Harn, Generalized Ring Signatures, IEEE Transactions on Dependable and Secure Computing, Vol. 5, No. 4, October-December, 2008.
  52. L. Harn and J. Ren, Efficient Identity-Based RSA Multisignatures, Computer and Security, Vol. 27, pages: 12-15, 2008.
  53. L. Harn and J. Ren, Design of Deniable Authentication Service for E-mail Applications, IEEE Communications Letters, Vol. 12, No. 3, pp: 219-221, March 2008.
  54. T. Li, Q. Ling and J. Ren, Physical layer built-in security analysis and enhancement algorithm for CDMA systems, EURASIP Journal on Wireless Communications and Networking, Vol. 2007 (2007), doi: 10.1155/2007/83589.
  55. J. Ren, Design of long period pseudo-random sequences from the addition of M-sequences over GF(p), EURASIP Journal on Wireless Communications and Networking, Vol. 2004, No. 1, pp: 12-18.
  56. J. Ren, On the structure of Hermitian codes and decoding for burst errors, IEEE Transactions on Information Theory, Vol. 50, No. 11, Nov. 2004, pp: 2850-2854.
  57. J. Ren, Decoding of geometrically generalized RS codes, Acta Electronica Sinica, Vol 24, No. 4, 1996: 105-108.
  58. J. Ren, X. Wang and G. Xiao, Decoding of algebraic-geometric codes based on matrix factorization, Journal of China Institute of Communications, Vol. 17, No. 2, March 1996: 27-32.
  59. J. Ren and G. Xiao, A modified decoding algorithm for algebraic geometric codes based on FIA, Journal of Electronics, 1996.
  60. J. Ren and G. Xiao, Decoding of algebraic geometric codes based on FIA, Journal of Electronics, 1996.
  61. D. Feng, J. Ren and G. Xiao, Some Cryptology Properties of Multi-output Functions, Bulletin of Science and Technology, No. 6, 1995.
  62. J. Ren and G. Xiao, On the minimum distance of geometric Gappa codes, Journal of Xidian University, Vol. 22. No. 1, 1995: 27-31.
  63. J. Ren, D. Feng and G. Xiao, Majority logic decoding of algebraic-geometric codes, Journal of Xidian University, Vol. 21, No. 5, 1994: 14-21.
  64. J. Ren, Ultranets characterizations of three kinds of L-fuzzy compactness, Journal of Shaanxi Normal University, Vol. 19. No. 2, 1991: 19-21.

Conference Papers

  1. J. Ren, E. Zaghloul and T. Li, d-BAEV: Distributed Blockchain-Based Anonymous Electronic Voting, IEEE MASS 2023, Sept. 25-27, 2023, Toronto, Canada.
  2. Y. Zheng, D. Zhu, J. Ren, T. Liu, K. Friston and T. Li, A Mathematical Model for Neural Activity and Brain Information Processing Capacity, IEEE ICASSP 2023, Jun. 4-10, 2023, Rhodes Island, Greece.
  3. J. Ren, J. Li and T. Li, Optimal Codes for Distributed Storage, IEEE ICNC 2023 Conference, Feb. 20-22, Honolulu, Hawaii, USA.
  4. T. Li, J. Deng and J. Ren, Can we Have a Better System than OFDM? IEEE ICNC 2023 Conference, Feb. 20-22, Honolulu, Hawaii, USA.
  5. Z. Yu, C. Yu, H. Wang and J. Ren, Enabling Automatic Cinematography with Reinforcement Learning, IEEE MIPR 2022, Aug. 2-4, 2022, Virtual Conference. (Acceptance Rate: 18.75%)
  6. Z. Yu, E. Guo, H. Wang and J. Ren, Bridging Script and Animation Utilizing a New Automatic Cinematography Model, IEEE MIPR 2022, Aug. 2-4, 2022, Virtual Conference. (Acceptance Rate: 18.75%)
  7. Y. Zhu, Y. Lai, K. Zhao, X. Luo, M. Yuan, J. Ren and K. Zhou, BinarizedAttack: Structural Poisoning Attacks to Graph-based Anomaly Detection, 38th IEEE International Conference on Data Engineering (ICDE 2022), Kuala Lumpur, Malaysia. (Acceptance Rate: 211/780=27%)
  8. E. Zaghloul, T. Li and J. Ren, Anonymous and Coercion-Resistant Distributed Electronic Voting, IEEE ICNC 2020, Feb. 17-20, 2020, Big Island, Hawaii, USA. (Acceptance Rate: 119/481=24.7%)
  9. T. Li, Y. Zheng, Z Wang, D.C. Zhu, J. Ren, T. Liu and K. Friston, Brain Information Processing Capacity Modeling, The 6th Edition of International Conference on Neurology and Brain Disorders, October 24-26, 2022, Orlando, Florida, USA.
  10. Y. Lang, J. Ren and T. Li, Secure and Efficient OFDM System Design under Disguished Jamming, IEEE ICNC 2020, Feb. 17-20, 2020, Big Island, Hawaii, USA. (Acceptance Rate: 119/481=24.7%).
  11. Z. Yu, H. Wang and J. Ren, A Hybrid Temporal Modeling Phoneme Recognized Network for Real-time Speech Animation, IEEE IEEE International Conference on Multimedia Information Processing and Retrieval (MIPR) 2020, April 9-11, 2020, Shenzhen, China.
  12. Y. Liang, Y. Liu, J. Ren and T. Li, Malicious Link Detection in Multi-Hop Wireless Sensor Networks, IEEE Globecom 9-13 December, 2019, Waikoloa, HI, USA. (Acceptance Rate: 973/2560=38%)
  13. E. Zaghloul, T. Li and J. Ren, Security and Privacy of Electronic Health Records: Decentralized and Hierarchical Data Sharing using Smart Contracts, IEEE ICNC 2019, 18-21 February, 2019, Honolulu, Hawaii, USA. (Acceptance Rate: 118/418=28.2%)
  14. A. Alahmadi, Y. Liang, R. Tian, J. Ren and T. Li, Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry, IEEE ICNC 2019, 18-21 Februaryi, 2019, Honolulu, Hawaii, USA. (Acceptance Rate: 118/418=28.2%)
  15. Y. Liang, J. Ren and T. Li, The Worst Jamming Distribution for Securely Precoded OFDM, IEEE Globecom, 9-13 December, 2018, Abu Dhabi, UAE. (Acceptance Rate: 999/2562=38.9%)
  16. E. Zaghloul, T. Li and J. Ren, An Attribute-Based Distributed Data Sharing Scheme, IEEE Globecom, 9-13 December, 2018, Abu Dhabi, UAE. (Acceptance Rate: 999/2562=38.9%)
  17. M.H. Afifi, E. Zaghloul, T. Li and J. Ren, UBNB-PPDP: Utility-Boosting Negotiation-Based Privacy Preserving Data Publishing, IEEE Globecom, 9-13 December, 2018, Abu Dhabi, UAE. (Acceptance Rate: 999/2562=38.9%)
  18. Z. Wang, Y. Zheng, M. Jigo, T. Liu, J. Ren, Z. Tian and T. Li, Decoding Behavioral Accuracy in an Attention Task Using Brain fMRI Data, IEEE Globecom, 9-13 December, 2018, Abu Dhabi, UAE. (Acceptance Rate: 999/2562=38.9%)
  19. K. Zhou, T. Li and J. Ren, Security and Privacy Enhancement for Outsourced Biometric Identification, IEEE Globecom, 9-13 December, 2018, 2018, Abu Dhabi, UAE. (Acceptance Rate: 999/2562=38.9%)
  20. Y. Liang, Yu Zheng, J. Ren and T. Li, End-to-End Delay in Multi-Hop Wireless Networks with Random Relay Deployment, IEEE ICNC, March 5-8, 2018, Maui, Hawaii. (Acceptance Rate: 115/427=26.9%)
  21. M.H. Afifi, Liang Zhou, S. Chakrabarty and J. Ren, HPMAP: A Hash-Based Privacy-Preserving Mutual Authentication Protocol for Passive IoT Devices Using Self-Powered Timers, IEEE ICC, 20-24 May 2018, Kansan City, USA. (Acceptance rate: 39.99%)
  22. M. Liu, C. Yang, Q. Jiang, X. Chen, J.F. Ma and J. Ren, Updatable Block-Level Deduplication with Dynamic Ownership Management on Encrypted Data, IEEE ICC, 20-24 May 2018, Kansan City, USA. (Acceptance rate: 39.99%)
  23. D. Li, C. Yang, C. Li, Q. Jiang, X. Chen, J.F. Ma and J. Ren, A Client-based Secure Deduplication of Multimedia Data, IEEE ICC 2017, 21-25 May 2017, Parisi, France. (Acceptance Rate: 1172/3074=38.1%)
  24. Y. Liang, J. Ren and T. Li, End-to-End Throughput Analysis of Multi-Hop Wireless Networks using Stochastic Geometry, 10th EAI International Conference on Mobile Multimedia Communications, July 13-14, 2017, Chongqing, China.
  25. K. Zhou and J. Ren, LinSOS: Secure Outsourcing of Linear Computations Based on Affine Mapping, IEEE ICC 2016, 23-27 May, 2016, Kuala Lumpur, Malaysia. (Acceptance Rate: 960/2469=38.9%)
  26. K. Zhou and J. Ren, Secure Outsourcing of Scalar Multiplication on Elliptic Curves, IEEE ICC 2016, 23-27 May, 2016, Kuala Lumpar, Malaysia. (Acceptance Rate: 960/2469=38.9%)
  27. K. Zhou and J. Ren, Secure fine-grained access control of mobile user data through untrusted cloud, IEEE ICCCN 2016, Aug. 1-4, Waikoloa, Big Island, Hawaii, USA.
  28. K. Zhou, T. Song, J. Ren and T. Li, Robust CDMA Receiver Design under Disguised Jamming, IEEE ICASSP 2016, 20-25 March, 2016, Shanghai, China.
  29. M. Abdelhakim L. Lightfoot, J. Ren and T. Li, Reliable Communications over Multihop Networks under Routing Attacks, IEEE Globecom 2015, 6-10 December, 2015, San Diego.
  30. J. Li, K. Zhou and J. Ren, Security and Efficiency Trade-offs for Cloud Computing and Storage, 2nd National Symposium on Resilient Critical Infrastructure, August 18-20, Pihladelphia, PA.
  31. J. Li, T. Li and J. Ren, Rate-Matched Regenerating Code in Hostile Networks, IEEE ICC 2015, 8-12 June, 2015, London, UK. (Acceptance Rate: 38%)
  32. D. Tang and J. Ren, A Delay-Aware and Secure Data Forwarding Scheme for Urban Sensing Networks, IEEE ICC 2015, 8-12 June, 2015 London, UK. (Acceptance Rate: 38%)
  33. L. Lightfoot and J. Ren, R-STaR Destination-Location Privacy Schemes in Wireless Sensor Networks, IEEE ICC 2015, 8-12 June, 2015 London, UK. (Acceptance Rate: 38%)
  34. M. Abdelhakim, Z. Fang, J. Ren and T. Li, Hybrid Mobile Access Coordinated Wireless Sensor Networks - Design and Analysis, IEEE China Summit and International Conference on Signal and Information Processing, 12-15 July, 2015: pages: 453-457, Chengdu, China.
  35. J. Li, T. Li and J. Ren, Secure Regenerating Code, IEEE Globecom 2014, 8-12 December, 2014, Austin, TX. (Acceptance Rate: 867/2171=39.3%)
  36. T. Song, Z. Fang, J. Ren and T. Li, Precoding of OFDM under Disguised Jamming, IEEE Globecom 2014, 8-12 December, 2014 Austin, TX. (Acceptance Rate: 867/2171=39.3%)
  37. M. Abdelhakim, J. Ren and T. Li, Throughput Analysis and Routing Security Discussions of Mobile Access Coordinated Wireless Sensor Networks, IEEE Globecom 2014, 8-12 December, 2014, Austin, TX. (Acceptance Rate: 867/2171=39.3%)
  38. J. Li, T. Li and J. Ren, Beyond the MDS Bound in Distributed Cloud Storage, IEEE INFOCOM 2014, April 27 - May 2, 2014, Toronto, CA. (Acceptance Rate: 320/1645=19.4%)
  39. Y. Yu, J. Ni, J. Ren, W. Wu, L. Chen and Q. Xia, Improvement of a Remote Data Possession Checking Protocol from Algebraic Signatures, The 10th International Conference on Information Security Practice and Experience (IPSEC 2014), 5-8 May 2014, Fuzhou, China. (Acceptance Rate: 36/158=22.8%)
  40. J. Li, T. Li and J. Ren, Combating Network Pollution Attacks: A Cascaded Error-Control Coding Approach, IEEE Globecom 2013, 9-13 December, 2013, Atlanta, GA, USA. (Acceptance Rate: 37.0%)
  41. C. Yang, J. Ren and J.F. Ma, Provable Ownership of Files in De-Duplication Cloud Storage, IEEE Globecom 2013, 9-13 December 2013, Atlanta, GA, USA. (Acceptance Rate: 37.0%)
  42. M. Abdelhakim, J. Ren and T. Li, Mobile Access Coordinated Wireless Sensor Networks - Topology Design and Throughput Analysis, IEEE Globecom 2013, 9-13 December 2013, Atlanta, GA, USA. (Acceptance Rate: 37.0%)
  43. A. Alahmadi, M. Abdelhakim, J. Ren and T. Li, Mitigating Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard, IEEE Globecom 2013, 9-13 December 2013, Atlanta, GA, USA. (Acceptance Rate: 37.0%)
  44. M. Abdelhakim, L. Lightfoot, J. Ren and T. Li, Architecture Design of Mobile Coordinated Wireless Sensor Networks, IEEE ICC 2013, 9-13 June, Budapest, Hungary. (Acceptance Rate: 948/2422=39.1%)
  45. L. Lightfoot and J. Ren, Providing Destination-Location Privacy in Wireless Sensor Networks using Bubble Routing, CSPS 2012, Springer LNEE: 202, October 16-18, 2012, Beijing, China.
  46. H. Li, J. Ren and T. Li, Some Recent Results on the Physical Layer Security of Frequency Hopping Systems, CSPS 2012, Springer LNEE: 202, October 16-18, 2012, Beijing, China.
  47. J. Li, C. Yang, D. Tang, T. Li and J. Ren, Characterization of Linear Network Coding for Pollution Detection, IEEE Globecom 2012, December 3-7, Anaheim, California, USA. (Acceptance Rate: 37.7%)
  48. M. Abdelhakim, J. Ren and T. Li, Reliable OFDM System Design under Hostile Multi-tone Jamming, IEEE Globecom 2012, December 3-7, Anaheim, California, USA. (Acceptance Rate: 37.7%)
  49. D. Tang, T. Li and J. Ren, Quantitative Security and Efficiency Analysis of SEAR in Wireless Sensor Networks, IEEE ICC 2012, June 10-15, Ottawa, Canada. (Acceptance Rate: 1043/2819=37.0%)
  50. M. Abdelhakim, J. Ren and T. Li, Reliable Cooperative Sensing in Cognitive Networks, WASA 2012, August 8-10, Yellow Mountains, China.
  51. Y. Li, J. Li, J. Ren and J. Wu, Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks, IEEE INFOCOM 2012 Mini-Conference, March 25-30, 2012, Orlando, Florida, USA. (Acceptance Rate: 378/1547=24.4%)
  52. J. Ren and D. Tang, Combining Source-Location Privacy and Routing Efficiency in Wireless Sensor Networks, IEEE Globecom 2011, 5-9 December, 2011, Houston, Texas, USA. (Acceptance Rate: 36.6%)
  53. W. Qiao, J. Li and J. Ren, An Efficient Error-Detection and Error-Correction (EDEC) Scheme for Network Coding, IEEE Globecom 2011, 5-9 December, 2011, Houston, Texas, USA. (Acceptance Rate: 36.6%)
  54. M. Abdelhakim, L. Zhang, J. Ren and T. Li, Cooperative Sensing in Cognitive Networks Under Malicious Attack, IEEE ICASSP 2011, May 22-27, 2011, Prague, Czech Republic.
  55. D. Tang, T. Jang and J. Ren, Secure and Energy Aware Routing (SEAR) in Wireless Sensor Networks, IEEE Globecom 2010, 6-10 December, Miami, Florida, USA. (Acceptance Ratio: 1313/3688=35.6%).
  56. L. Lightfoot, Y. Li and J. Ren, Preserving Source-Location Privacy in Wireless Sensor Network using STaR Routing, IEEE Globecom 2010, 6-10 December, Miami, Florida, USA. (Acceptance Ratio: 1313/3688=35.6%).
  57. H. Wang, J. Ren and T. Li, Resource Allocation with Load Balancing for Cognitive Radio Networks, IEEE Globecom 2010, 6-10 December, Miami, Florida, USA. (Acceptance Ratio: 1313/3688=35.6%).
  58. L. Zhang and J. Ren and T. Li, A Spectrally Efficient Anti-Jamming Technique Based on Message Driven Frequency Hopping, WASA', Invited paper, August 15-17, 2010, Beijing, China.
  59. Y. Li and J. Ren, Source-Location Privacy through Dynamic Routing in Wireless Sensor Networks, IEEE INFOCOM 2010, March 15-19, 2010, San Diego, USA. (Acceptance Ratio: 276/1575=17.5%)
  60. L. Zhang, J. Ren and T. Li, Jamming Mitigation Techniques based on Message-Driven Frequency Hopping, IEEE Globecom 2009, Nov. 30-Dec. 4, 2009, Honolulu, Hawaii, USA. (Acceptance Ratio: 1104/3200=34.5%)
  61. J. Ren, Y. Li and T. Li, Providing Source Privacy in Mobile Ad Hoc Networks, IEEE MASS 2009, Oct. 12-15, Macau SAR, P.R.China. (Acceptance Ratio: 62/245=25.3%)
  62. Y. Li and J. Ren, Preserving Source-Location Privacy in Wireless Sensor Networks, IEEE SECON 2009, June 22-26, 2009, Rome, Italy. (Acceptance Ratio: 81/431=18.8%)
  63. Y. Li and J. Ren, Mixing Ring-Based Source-Location Privacy in Wireless Sensor Networks, IEEE ICCCN 2009, August 2-6, San Francisco, USA. (Acceptance Ratio: 29.5%)
  64. Y. Li and J. Ren, Providing Source-Location Privacy in Wireless Sensor Networks, WASA 2009, August 16-18, 2009, Boston, USA.
  65. J. Ren, Y. Li and T. Li, Routing-Based Source-Location Privacy in Wireless Sensor Networks, IEEE ICC 2009, June 14-18, 2009, Dresden, Germany. (Acceptance Ratio: 34.9%)
  66. L. Zhang, J. Ren and T. Li, Spectrally Efficient Anti-Jamming System Design using Message-Driven Frequency Hopping, IEEE ICC 2009, June 14-18, 2009, Dresden, Germany. (Acceptance Ratio: 34.9%)
  67. Y. Li, L. Lightfoot and J. Ren, Routing-Based Source-Location Privacy Protection in Wireless Sensor Networks, IEEE EIT 2009, June 7-9, Windsor, Ontario, Canada.
  68. L. Lightfoot, L. Zhang, J. Ren and T. Li, Jamming-Resistant Subcarrier Assignment for OFDMA Based Space-Time Coded Systems, IEEE EIT 2009, June 7-9, Windsor, Ontario, Canada.
  69. J. Ren, L. Harn and T. Li, How to Leak a Secret from Multiple Sources, IEEE Milcom 2008, Nov. 17-19, 2008, San Diego.
  70. J. Ren, T. Li and Y. Li, Anonymous Communications in Overlay Networks, IEEE Milcom 2008, Nov. 17-19, 2008, San Diego.
  71. J. Ren, Privacy-Preserving Communications and Network Protocols, WASA 2008, October 26-28, Dallas, TX.
  72. Q. Ling, J. Ren and T. Li, Message-Driven Frequency Hopping -- Design and Analysis, WASA 2008. October 26-28, Dallas, TX.
  73. J. Ren, T. Li and K. Han, Anonymous Communication Protocol in Overlay Networks, IEEE ICC 2008, May 19-23, 2008, Beijing. (Acceptance Ratio: 1102/3135=35%)
  74. Q. Ling, J. Ren and T. Li, Spectrally Efficient Spread Spectrum System Design: Message-Driven Frequency Hopping, IEEE ICC 2008, May 19-23, 2008, Beijing. (Acceptance Ratio: 1102/31354=35%)
  75. J. Ren and L. Harn, Generalized Anonymous Information Sharing, IEEE SAFE 2007, 11-13 April 2007, Washington D.C., USA.
  76. J. Ren, An Identity Based Single-Sign-On Scheme for Computer Networks, IEEE SAFE 2007, 11-13 April 2007, Washington D.C., USA.
  77. H. Li and J. Ren, A Syntax Aware Error-Tolerant Encryption for Secure Multimedia Communications, IEEE SAFE 2007, 11-13 April 2007, Washington D.C., USA.
  78. J. Ren, L. Harn and T. Li, Novel Provably Secure Anonymous Communication (PSAC) Scheme, WASA'07, August 1-3, 2007, Chicago, USA. (Acceptance Ratio: 22%)
  79. T. Li, Q. Ling and J. Ren, Spectrally Efficient Frequency Hopping System Design for Wireless Networks, WASA'07, August 1-3, 2007, Chicago, USA. (Acceptance Ratio: 22%)
  80. T. Li, Q. Ling and J. Ren, A Spectrally Efficient Frequency Hopping System, IEEE Globecom 2007, 26-30 November, 2007. Washington, DC. USA. (Acceptance Rate: 1018/2576=39.5%)
  81. L. Lighfoot, J. Ren and T. Li, An Energy Efficient Link-Layer Security Protocol for Wireless Sensor Networks, IEEE EIT 2007, May 17-20, 2007, Chicago, USA.
  82. J. Ren and L. Harn, Ring Signatures Based on ElGamal Signature, WASA'06, LNCS 4138, 2006, pp: 445-456.
  83. T. Li, H. Wang and J. Ren, Non-Uniform Information Transmission for Minimum Distortion in Wireless Networks, WASA'06, LNCS 4138, 2006.
  84. J. Ren, T. Li and D. Aslam, A Power Efficient Link-Layer Security Protocol (LLSP) for Wireless Sensor Networks, IEEE Milcom 2005, Oct. 17-20, 2005, Atlantic City, NJ.
  85. J. Ren and T. Li, A Cryptographically Secure Image Watermarking Scheme, IEEE Milcom 2005, Oct. 17-20, 2005, Atlantic City, NJ.
  86. T. Li, J. Ren, Q. Ling and A. Jain, Physical Layer Built-in Security Analysis and Enhancement of CDMA Systems, IEEE Milcom 2005, Oct. 17-20, 2005, Atlantic City, NJ.
  87. Q. Ling, T. Li, J. Ren and A. Jain, Secure Interleaving: Physical Layer Built-in Security Enhancement of CDMA Systems, IEEE Milcom 2005, Oct. 17-20, 2005, Atlantic City, NJ.
  88. Q. Ling, T. Li and J. Ren, Physical Layer Built-in Security Enhancement of CDMA Systems Using Secure Block Interleaving, IEEE Globecom 2005, Nov. 28 - Dec. 2, 2005. St. Louis, MO.
  89. J. Ren and T. Li, Design of Pseudo-Random Spreading Sequences for CDMA Systems, IEEE Globecom 2004, Nov. 29 - Dec. 3, 2004. Dallas Texas.
  90. J. Ren, T. Li and M. Nadooshan, A Cryptographic Watermark Embedding Technique, Asilomar Conference on Signals, Systems, and Computers 2004, Nov. 7-10, 2004, Pacific Grove, CA.
  91. Q. Ling, T. Li and J. Ren, Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving, Asilomar Conference on Signals, Systems, and Computers, 2004, Nov. 7-10, 2004, Pacific Grove, CA.
  92. T. Li, J. Ren and W. Liang, A generalized framework - periodically scrambled CDMA, IEEE ICSP'04, Aug. 31-Sept. 4, 2004, Beijing, China.
  93. T. Li, J. Ren, Q. Ling and W. Liang, Physical Layer Built-in Security Analysis and Enhancement of CDMA Systems, CISS 2004, University of Princeton, Princeton, NJ, March 2004.
  94. J. Ren and T. Li, CDMA physical layer built-in security enhancement, (IEEE identified this paper was plagiarized by another group!), IEEE VTC2003-Fall, October 6-9, 2003, Orlando, Florida, USA.
  95. J. Ren, On the Structure of Hermitian codes and its Decoding for Burst Errors, IEEE Globecom 2003, 1-5 December, San Francisco, USA.
  96. J. Ren, Simultaneous Identity Verification and Membership Proof, 45th IEEE MWSCAS Conference, August 4-7, Tulsa, Oklahoma, 2002.
  97. J. Ren and G. Xiao, Decoding of Hermitian codes for burst errors, IEEE Symposium on Information Theory, 1994, Trondheim, Norway.
  98. J. Ren and G. Xiao, A modified decoding algorithm for algebraic geometric codes, Asia-Pacific Conferences on Communications, Aug. 1993, Taejon, Korea.
  99. J. Ren and G. Xiao, Hermitian codes and its decoding, Symposium on Information and Communication Theory, Yichang, China, Oct. 1993.

Technical Reports and White Papers

  1. J. Ren, Secure eServices Connectivity LAN Security Architecture, Avaya Inc., Compas #: 80888.
  2. J. Ren, Whitepaper: Blueshift Security Architecture, Avaya Inc., Compas #: 74687.
  3. J. Ren, Whitepaper: Avaya Enhanced Secure Remote Access Services - A Gateway Service Delivery Model, Avaya Inc., Compas #: 89212.

Patents

  1. T. Li, Y. Liang and J. Ren, Secure and Efficient Orthogonal Frequency Division Multiplexing Transmission System with Disguised Jamming, US Patent: 10,911,290, February 2, 2021.
  2. J. Ren and K. Zhou, Cost-aware Secure Outsourcing, US Patents, 10,901,693, January 26, 2021.
  3. J. Li, J. Ren and T. Li, Optimal Constructure of Regeneration Code through Rate-Matching, US Patent: 10,637,508, Apr. 28, 2020.
  4. A. Alahmad, M. Abdelhakim, J. Ren and T. Li, Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption, US Patent: 9,608,803, March 28, 2017.
  5. J. Ren and M. Nadooshan, Method For Secure Key Management Using Multi-threshold Secret Sharing, US Patent: 8,259,950, September 4, 2012.
  6. J. Ren and M. Madooshan, Method and Apparatus for Secure Key Management Using Multi-threshold Secret Sharing, US Patent: 7,787,619, August 31, 2010. EP Patent: 1,472,814, November 3, 2004.
  7. J. Ren and S. Erfani, Multiple-use smart card with security features and method, US Patent: 6,708,893, March 23, 2004.