近期论文
查看导师新发文章
(温馨提示:请注意重名现象,建议点开原文通过作者单位确认)
1. Y. Gao, J. Tao *, H. Wang, W. Sun, C. Song. Towards Personalized Privacy-Preserving Content Caching with Edge Cooperation [J]. IEEE Transactions on Service Computing , 2025. (accepted) (CCF A, JCR Q1)
2. Y. Luo, J. Tao* , L. Yu, Y. Zhu. Together May Be B etter: A Novel Framework and High-Consistency Feature for Proxy Traffic Analysis [J]. Computer Networks, 2025. (accepted) (CCF B, JCR Q1)
3. K. Li, J. Tao* , H. Yu, C. Guo, H. Liu. Mining Frequent Sequential Patterns in Fully Dynamic Database: A Support Approximation Method [J]. Information Sciences , 2025. (accepted)(CCF B, JCR Q1)
4. H. Wang, J. Tao* , Y. Gao, D. Chi, Y. Zhu. A Two-Way Auction Approach Toward Data Quality Incentive Mechanisms for Mobile Crowdsensing [J]. IEEE Transactions on Network and System Management , 2025.(accepted)(CCF C, JCR Q1)
5. H. Li, J. Tao* , L. Yu, Y. Luo, Z. Wang. GSPB: A Global-Statistic and Packet-Byte Fusion Framework for Encrypted Traffic Classification [J]. Cybersecurity , 2025. (accepted) (CCF C, JCR Q1 )
6. J. Tao* , K. Chen, R. Chen, Y. Gao, Z. Wang. Towards Securing UAV-Assisted Edge Computing: A Trust-Based Intrusion Detection Framework With Multi-Source Feedback [J]. Security and Privacy , 2025. (accepted) (JCR Q3)
7. J. Tao , H. Zou. Social-Aware and Quality-Driven Incentives for Mobile Crowd-Sensing with Two-Stage Game [C]. International Conference on Information and Communications Security (ICICS 2025) (accepted)(CCF C)
8. X. Tang, J. Tao , Y. Luo. Attention-Guided Multi-View Feature Fusion for Proxy Traffic Classification [C]. International Conference on Neural Information Processi ng ( ICONIP 2025) , Springer, 2025. (accepted) (CCF C).
9. Y. Gao, J. Tao , H. Wang. Dynamic Service Placement and Computation Resource Allocation for Cloud-Edge Computing: A Reinforcement Learning Approach [C]. IEEE SMC 2025 . (accepted) (CCF C)
10. H. Wang, J. Tao , Y. Gao, W. Sun. An Incentive Mechanism with Two-way Auction in Privacy-Preserving Mobile Crowdsensing [C]. IEEE HPCC 2025 . (accepted) (CCF C)
11. Y. Gao, J. Tao , Y. Xu, Z. Wang, Y. Gao, Meiling Wang. Improving User QoE via Joint Trajectory and Resource Optimization in Multi-UAV Assisted MEC [J]. IEEE Transactions on Services Computing (TSC) , 2025. (accepted) (CCF A, JCR Q1)
12. H. Wu, Y. Tang, Z. Shen, J. Tao , C. Lin, Z. Peng. TELEX: Two-Level Learned Index for Rich Queries on Enclave-based Blockchain Systems [J]. IEEE Transactions on Knowledge and Data Engineering , 2025. (CCF A, JCR Q1) (DOI: 10.1109/TKDE.20 ( 25.3564905)
13. D. Zou, J. Tao* , Z. Wang. Semantics-aware Location Privacy Preserving: A Differential Privacy Approach [J]. Computers & Security , 2025. (CCF B, JCR Q1)
14. L. Yu, J. Tao* , Y. Xu, H. Wang. CloudRGK: Towards Private Similarity Measurement between Graphs on the Cloud [J]. IEEE Transactions on Knowledge and Data Engineering , 2025. (accepted) (CCF A, JCR Q1)
15. Y. Gao, J. Tao*, Y. Xu, R. Chen. Efficient Privacy-Preserving Routing in OppNets with Probability Model and Discrete Optimization [J]. IEEE Transactions on Dependable and Secure Computing , 2024. (accepted)(CCF A, JCR Q1)
16. D. Chi, J. Tao* ,H. Wang, Y. Xu. Trade-off between Capacity and Cost: Maximizing User Recruitment through Collaboration in Mobile Crowdsensing [J]. IEEE Transactions on Computational Social Systems , 2024. (DOI: 10.1109/TCSS.2024.3)(CCF C, JCR Q1)
17. Y. Shen, J. Tao* , L. Yu, Y. Luo. EAMTI: A Novel Method Toward Early and Accurate Malicious Traffic Identification [C]. IFIP International Conference on Network and Parallel Computing (NPC) , 2024. (CCF C)
18. J. Duan, J. Tao* , D. Chi, X. Li, Y. Xu, Towards Energy Variations for IoT Lightweight Authentication in Backscatter Communication [J], IEEE Internet of Things Journal , 2024. (doi: 10.1109/JIOT.2024.3464100) (CCF C, JCR Q1)
19. W. Jiang, J. Tao* , Z. Guan. A Trusted Data Privacy Computing Method for Vehicular Ad Hoc Networks Based on Homomorphic Encryption and DAG Blockchain [J]. IEEE Internet of Things Journal , 2024. (DOI:10.1109/JIOT.2024.3492031)(CCF C, JCR Q1)
20. R. Li, C. Zhang, H. Chai, L. Ying, H. Duan, J. Tao . PowerPeeler: A Precise and General Deobfuscation Method for PowerShell Scripts [C]. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (ACM CCS 2024) , 2024. (accepted). (CCF A)
21. L. Yu, J. Tao* , Y. Xu, W. Sun, Z. Wang. TLS Fingerprint for Encrypted Malicious Traffic Detection with Attributed Graph Kernel [J]. Computer Networks , 2024. (accepted). (CCF B, JCR Q1)
22. Y. Ao, J. Tao , D. Zou, W. Sun, L. Yu. An Accurate and Lightweight Intrusion Detection Model Deployed on Edge Network Devices [C]. International Joint Conference on Neural Networks (IJCNN) , 2024. (CCF C)
23. H. Wang, J. Tao* , D. Chi, Y . Gao, Z. Wang, D. Zou, Y. Xu. A Preference-Driven Malicious Platform Detection Mechanism fo r Users in Mobi le Crowdsensing [J]. IEEE Transactions on Information Forensics & Security, 2024. ( DOI: 10.1109/TIFS.2024.3352412 ) (CCF A, JCR Q1)
24. Y. Zhu, J. Tao* , H. Wang, L. Yu, Y. Lu o, T. Qi, Z. Wang, Y. Xu. DGNN: Accurate Darknet Application Classification Adopting Attention Graph Neural Network [J]. IEEE Transactions on Network and System Management , 2023. ( DOI: 10.1109/TNSM.2023.3344580 ) (CCF C, JCR Q2)
25. Y. Luo, J. Tao* , Y. Zhu, Y. Xu. HSS: Enhancing IoT Malicious Traffic Classification Leveraging Hybrid Sampling Strategy [J]. Cybersecurity . ( DOI: 10.1186/s42400-023-00201-9 ) (CCF C)
26. W. Jiang, M. Chen, J. Tao* . Federated Learning with Blockchain for Privacy-preserving Data Sharing in Internet of Vehicles [J]. China Communications , 2023. (DOI:10.23919/JCC.2023.03.006) (JCR Q2)
27. Y. Gao, J. Tao* , H. Wang, Z. Wang, W. Sun, C. Song. Joint Server Deployment and Task Scheduling for the Maximal Profit in Mobile Edge Computing [J]. IEEE Internet of Things Journal , 2023.(doi: 10.1109/JIOT.2023.3303356) (CCF C, JCR Q1)
28. H. Wang, J. Tao* , D. Chi, Y. Gao, Z. Wang, D. Zou, Y. Xu. IMRSG: Incentive Mechanism Based on Rubinstein-Starr Game for Mobile CrowdSensing [J] IEEE Transactions on Vehicular Technology , 2023. (CCF C, JCR Q1)
29. X. Chen, Y. Xu, J. Tao , R. Chen. An LP-based Online Dispatching Method with Privacy-preserving in Online Ride-hailing [C]. IEEE GlobeCom 2023 . (CCF C)
30. D. Chi, J. Tao* , Y. Hu, H. Wang, Z. Wang, Y. Xu, AUV-Assisted Information Collection Scheme with Energy Balance and Low Delay of Underwater Things [J]. Wireless Networks , 2023.(to appear)
31. Y. Gao, J. Tao* , H. Wang, Z. Wang, D. Zou, Y. Xu. Benefit-Oriented Task Offloading in UAV-Aided Mobile Edge Computing: An Approximate Solution [J]. Peer-to-Peer Networking and Applications, 2023. (CCF C, JCR Q2)
32. J. Tao* , X. Yuan, S. Zhang, Y. Xu. Development of Fingerprint Identification Based on Device Flow in Industrial Control System. Applied Science, 2023, 13, 731. https://doi.org/10.3390/app13020731 (JCR Q2)
33. Z. Wang, J. Tao* , Y. Xu, Y. Gao, D. Zou. Towards the Minimal Wait-for Delay for Rechargeable WSNs with Multiple Mobile Chargers. ACM Transaction on Sensor Networks , 2022.(doi: 10.1145/3579093) (CCF B)
34. Z. Wang, J. Tao* , Y. Gao, Y. Xu, W. Sun, Y. Gao, W. Li. Joint Flight Scheduling and Task Allocation for Secure Data Collection in UAV-aided IoTs [J]. Computer Networks , 2022. (doi: 10.1016/j.comnet.2022.108849) (CCF B, JCR Q1)
35. W. Li, J. Tao , Y. Xu, Z. Wang, Y. Xu, X. Tang, Y. Dong. MobiTrack: Mobile Crowdsensing-based Object Tracking with Min-Region and Max-Utility [C]. ICA3PP , 2021.
36. Y. Gao, J. Tao* , Y. Xu, Z. Wang, W. Sun, G. Cheng. CEBD: Contact Evidence-driven Blackhole Detection based on Machine Learning in OppNets [J]. IEEE Transactions on Computational Social Systems (DOI: 10.1109/TCSS.2021.3078160). 2021.
37. 陶军* , etc. 一种面向 IPv6网络空间的特征水印生成与嵌入方案研究 [J]. 计算机研究与发展 . 2021
38. W. Sun, J. Tao , Y. Xu, Y. Gao, Z. Wang. Network Latency Estimation: A Tensor-Based Weighted Singular Value Thresholding Method [C]. IEEE HPCC 2021.
39. Y. Gao, J. Tao , Z. Wang, W. Li, G. Cheng. Analytical Optimal Solution of Selfish Node Detection with 2-hop Constraints in OppNets [C]. 2021 IEEE MASS .
40. Z. Wang, J. Tao* , Y. Gao, Y. Xu, W. Sun, X. Li. A Precision Adjustable Trajectory Planning Scheme for UAV-based Data Collection in IoTs [J]. Peer-to-Peer Networking and Applications , March, 2021(DOI: 10.1007/s12083-020-01006-0).
41. Y. Xu, P. Xu, J. Pan, J. Tao , A Unified Model for the Two-stage Offline-then-Online Resource Allocation, IJCAI 2020.
42. J. Tao , Y. Li, Z. Wang, P. Xu, and C. Su. Self-adaptive Probabilistic Sampling for Elephant Flows Detection. in Proc. 62th IEEE Global Telecommunications Conf. (GLOBECOM'19), Waikolo a, HI, USA, 2019.
43. J. Tao , X. Li, J. Li, Q. Fang, Z. Wang, and F. Tong. Similarity-guided Multimedia Recommendation in Heterogeneous Information Network. in Proc. 62th IEEE Global Telecommunications Conf. ( GLOBECOM '19), Waikoloa, HI, USA, 2019.(CCF C)
44. Y. Gao, J. Tao , L. Zeng, X. Fang, Q. Fang, X. Li. User Profiling with Campus Wi-Fi Access Trace and Network Traffic. IEEE International Conference on Multimedia and Expo (ICME 2019) 2019. (CCF B)
45. 陶军* , 施书静, 冯富琴, 高扬. 节点位置信息驱动的物联网终端缓存管理机制的研究 [J]. 计算机学报 , 42(2), 2019, pp. 252-265.
46. L. He, L. Kong, J. Tao , J. Xu and J. Pan, On-Demand Mobile Data Collection in Cyber-Physical Systems. Wireless Communications and Mobile Computing .
47. J. Tao* , Y. Xu, Z. Zhang, F. Feng, F. Tong and F. Dong, A Resource Allocation Game with Restriction Mechanism in VANET Cloud. Concurrency and Computation: Practice & Experience .
48. J. Tao* , L. Zhu, L. Chang, J. Liu, X. Wang, and Y. Hu, Joint Anti-attack Scheme for Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks. Security and Communication Networks (WILEY) , (DOI: 10.1002/sec.1176).