Ju Ren
Ju Ren
Department of Computer Science and Technology, Tsinghua University
Verified email at - Homepage
Cited by
Cited by
Security and privacy in smart city applications: Challenges and solutions
K Zhang, J Ni, K Yang, X Liang, J Ren, XS Shen
IEEE communications magazine 55 (1), 122-129, 2017
Serving at the Edge: A Scalable IoT Architecture Based on Transparent Computing
J Ren, H Guo, C Xu, Y Zhang
IEEE Network 31 (5), 96-105, 2017
A survey on end-edge-cloud orchestrated network computing paradigms: Transparent computing, mobile edge computing, fog computing, and cloudlet
J Ren, D Zhang, S He, Y Zhang, T Li
ACM Computing Surveys (CSUR) 52 (6), 1-36, 2019
SDN/NFV-empowered future IoV with enhanced communication, computing, and caching
W Zhuang, Q Ye, F Lyu, N Cheng, J Ren
Proceedings of the IEEE 108 (2), 274-291, 2019
Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks
J Ren, Y Zhang, K Zhang, A Liu, J Chen, X Shen
IEEE Transactions on Industrial Informatics 12 (2), 788-800, 2016
A blockchain-based nonrepudiation network computing service scheme for industrial IoT
Y Xu, J Ren, G Wang, C Zhang, J Yang, Y Zhang
IEEE Transactions on Industrial Informatics 15 (6), 3632-3641, 2019
Synergy of big data and 5G wireless networks: opportunities, approaches, and challenges
N Zhang, P Yang, J Ren, D Chen, L Yu, X Shen
IEEE Wireless Communications 25 (1), 12-18, 2018
Energy-harvesting-aided spectrum sensing and data transmission in heterogeneous cognitive radio sensor network
D Zhang, Z Chen, J Ren, N Zhang, MK Awad, H Zhou, XS Shen
IEEE Transactions on Vehicular Technology 66 (1), 831-843, 2016
Dynamic Channel Access to Improve Energy Efficiency in Cognitive Radio Sensor Networks
J Ren, Y Zhang, N Zhang, D Zhang, XS Shen
IEEE Transactions on Wireless Communications, 2016
Security and privacy in mobile crowdsourcing networks: challenges and opportunities
K Yang, K Zhang, J Ren, X Shen
IEEE communications magazine 53 (8), 75-81, 2015
Blockchain empowered arbitrable data auditing scheme for network storage as a service
Y Xu, J Ren, Y Zhang, C Zhang, B Shen, Y Zhang
IEEE Transactions on Services Computing 13 (2), 289-300, 2019
GANobfuscator: Mitigating information leakage under GAN via differential privacy
C Xu, J Ren, D Zhang, Y Zhang, Z Qin, K Ren
IEEE Transactions on Information Forensics and Security 14 (9), 2358-2371, 2019
Analyzing user-level privacy attack against federated learning
M Song, Z Wang, Z Zhang, Y Song, Q Wang, J Ren, H Qi
IEEE Journal on Selected Areas in Communications 38 (10), 2430-2444, 2020
Efficient computing resource sharing for mobile edge-cloud computing networks
Y Zhang, X Lan, J Ren, L Cai
IEEE/ACM Transactions on Networking 28 (3), 1227-1240, 2020
A survey on emerging computing paradigms for big data
Y Zhang, J Ren, J Liu, C Xu, H Guo, Y Liu
Chinese Journal of Electronics 26 (1), 1-12, 2017
Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions
J Ren, Y Zhang, K Zhang, X Shen
IEEE Communications Magazine 53 (3), 98-105, 2015
A trusted routing scheme using blockchain and reinforcement learning for wireless sensor networks
J Yang, S He, Y Xu, L Chen, J Ren
Sensors 19 (4), 970, 2019
Design principles and improvement of cost function based energy aware routing algorithms for wireless sensor networks
A Liu, J Ren, X Li, Z Chen, XS Shen
Computer Networks 56 (7), 1951-1967, 2012
Towards secure network computing services for lightweight clients using blockchain
Y Xu, G Wang, J Yang, J Ren, Y Zhang, C Zhang
Wireless Communications and Mobile Computing 2018, 1-12, 2018
Adaptive and Channel-aware Detection of Selective Forwarding Attacks in Wireless Sensor Networks
J Ren, Y Zhang, K Zhang, S Shen
IEEE Transactions on Wireless Communications, 2016
The system can't perform the operation now. Try again later.
Articles 1–20