Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jianyong Chen is active.

Publication


Featured researches published by Jianyong Chen.


Computers & Operations Research | 2015

A novel hybrid multi-objective immune algorithm with adaptive differential evolution

Qiuzhen Lin; Qingling Zhu; Peizhi Huang; Jianyong Chen; Zhong Ming; Jianping Yu

In this paper, we propose a novel hybrid multi-objective immune algorithm with adaptive differential evolution, named ADE-MOIA, in which the introduction of differential evolution (DE) into multi-objective immune algorithm (MOIA) combines their respective advantages and thus enhances the robustness to solve various kinds of MOPs. In ADE-MOIA, in order to effectively cooperate DE with MOIA, we present a novel adaptive DE operator, which includes a suitable parent selection strategy and a novel adaptive parameter control approach. When performing DE operation, two parents are respectively picked from the current evolved and dominated population in order to provide a correct evolutionary direction. Moreover, based on the evolutionary progress and the success rate of offspring, the crossover rate and scaling factor in DE operator are adaptively varied for each individual. The proposed adaptive DE operator is able to improve both of the convergence speed and population diversity, which are validated by the experimental studies. When comparing ADE-MOIA with several nature-inspired heuristic algorithms, such as NSGA-II, SPEA2, AbYSS, MOEA/D-DE, MIMO and D2MOPSO, simulations show that ADE-MOIA performs better on most of 21 well-known benchmark problems. Differential evolution is embedded into the multi-objective immune algorithm.A suitable parent selection strategy provides a correct evolutionary direction.A novel adaptive control approach enhances the algorithmic robustness.


Chaos | 2003

A secure communication scheme based on the phase synchronization of chaotic systems

Jianyong Chen; Kwok-Wo Wong; Lee-Ming Cheng; J. W. Shuai

Phase synchronization of chaotic systems with both weak and strong couplings has recently been investigated extensively. Similar to complete synchronization, this type of synchronization can also be applied in secure communications. We develop a digital secure communication scheme that utilizes the instantaneous phase as the signal transmitted from the drive to the response subsystems. Simulation results show that the scheme is difficult to be broken by some traditional attacks. Moreover, it operates with a weak positive conditional Lyapunov exponent in the response subsystem.


Computers & Operations Research | 2016

Adaptive differential evolution algorithm with novel mutation strategies in multiple sub-populations

Laizhong Cui; Genghui Li; Qiuzhen Lin; Jianyong Chen; Nan Lu

Differential evolution (DE) algorithm has been shown to be a very effective and efficient approach for solving global numerical optimization problems, which attracts a great attention of scientific researchers. Generally, most of DE algorithms only evolve one population by using certain kind of DE operators. However, as observed in nature, the working efficiency can be improved by using the concept of work specialization, in which the entire group should be divided into several sub-groups that are responsible for different tasks according to their capabilities. Inspired by this phenomenon, a novel adaptive multiple sub-populations based DE algorithm is designed in this paper, named MPADE, in which the parent population is split into three sub-populations based on the fitness values and then three novel DE strategies are respectively performed to take on the responsibility for either exploitation or exploration. Furthermore, a simple yet effective adaptive approach is designed for parameter adjustment in the three DE strategies and a replacement strategy is put forward to fully exploit the useful information from the trial vectors and target vectors, which enhance the optimization performance. In order to validate the effectiveness of MPADE, it is tested on 55 benchmark functions and 15 real world problems. When compared with other DE variants, MPADE performs better in most of benchmark problems and real-world problems. Moreover, the impacts of the MPADE components and their parameter sensitivity are also analyzed experimentally. Three novel mutation strategies are run in three sub-populations respectively.A novel adaptive strategy is presented to tune the systemic parameters.A simple replacement strategy is designed to remain good solutions.


IEEE Transactions on Circuits and Systems Ii-express Briefs | 2010

Simultaneous Arithmetic Coding and Encryption Using Chaotic Maps

Kwok-Wo Wong; Qiuzhen Lin; Jianyong Chen

Based on the observation that iterating a skew tent map reversely is equivalent to arithmetic coding, a simultaneous compression and encryption scheme is proposed in which the chaotic map model for arithmetic coding is determined by a secret key and keeps changing. Moreover, the compressed sequence is masked by a pseudorandom keystream generated by another chaotic map. This two-level protection enhances its security level, which results in high key and plaintext sensitivities. The compression performance of our scheme is comparable with arithmetic coding and approaches Shannons entropy limit.


IEEE Computer | 2012

On-Demand Security Architecture for Cloud Computing

Jianyong Chen; Yang Wang; Xiaomin Wang

An architecture that differentiates security according to service-specific characteristics avoids an unnecessary drain on IT resources by protecting a variety of cloud computing services at just the right level.


European Journal of Operational Research | 2010

A hybrid immune multiobjective optimization algorithm

Jianyong Chen; Qiuzhen Lin; Zhen Ji

In this paper, we develop a hybrid immune multiobjective optimization algorithm (HIMO) based on clonal selection principle. In HIMO, a hybrid mutation operator is proposed with the combination of Gaussian and polynomial mutations (GP-HM operator). The GP-HM operator adopts an adaptive switching parameter to control the mutation process, which uses relative large steps in high probability for boundary individuals and less-crowded individuals. With the generation running, the probability to perform relative large steps is reduced gradually. By this means, the exploratory capabilities are enhanced by keeping a desirable balance between global search and local search, so as to accelerate the convergence speed to the true Pareto-optimal front in the global space with many local Pareto-optimal fronts. When comparing HIMO with various state-of-the-art multiobjective optimization algorithms developed recently, simulation results show that HIMO performs better evidently.


IEEE Transactions on Information Forensics and Security | 2016

An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing

Shulan Wang; Junwei Zhou; Joseph K. Liu; Jianping Yu; Jianyong Chen; Weixin Xie

Ciphertext-policy attribute-based encryption (CP-ABE) has been a preferred encryption technology to solve the challenging problem of secure data sharing in cloud computing. The shared data files generally have the characteristic of multilevel hierarchy, particularly in the area of healthcare and the military. However, the hierarchy structure of shared files has not been explored in CP-ABE. In this paper, an efficient file hierarchy attribute-based encryption scheme is proposed in cloud computing. The layered access structures are integrated into a single access structure, and then, the hierarchical files are encrypted with the integrated access structure. The ciphertext components related to attributes could be shared by the files. Therefore, both ciphertext storage and time cost of encryption are saved. Moreover, the proposed scheme is proved to be secure under the standard assumption. Experimental simulation shows that the proposed scheme is highly efficient in terms of encryption and decryption. With the number of the files increasing, the advantages of our scheme become more and more conspicuous.


Computers & Operations Research | 2013

A novel micro-population immune multiobjective optimization algorithm

Qiuzhen Lin; Jianyong Chen

In this paper, we present a novel immune multiobjective optimization algorithm based on micro-population, which adopts a novel adaptive mutation operator for local search and an efficient fine-grained selection operator for archive update. With the external archive for storing nondominated individuals, the population diversity can be well preserved using an efficient fine-grained selection procedure performed on the micro-population. The adaptive mutation operator is executed according to the fitness values, which promotes to use relatively large steps for boundary and less-crowded individuals in high probability. Therefore, the exploratory capabilities are enhanced. When comparing the proposed algorithm with a recently proposed immune multiobjective algorithm and a scatter search multiobjective algorithm in various benchmark functions, simulations show that the proposed algorithm not only improves convergence ability but also preserves population diversity adequately in most cases.


IEEE Transactions on Circuits and Systems Ii-express Briefs | 2011

A Modified Chaos-Based Joint Compression and Encryption Scheme

Jianyong Chen; Junwei Zhou; Kwok-Wo Wong

An approach for improving the compression performance of an existing chaos-based joint compression and encryption scheme is proposed. The lookup table used for encryption is dynamically updated in the searching process. Once a partition not matched with the target symbol is visited, this and other partitions mapped to the same symbol are reallocated to a nonvisited symbol. Therefore, the target symbol eventually associates with more partitions and fewer number of iterations are needed to find it. As a result, expansion of the ciphertext is avoided, and the compression ratio is improved. Simulation results show that the proposed modification leads to a better compression performance, whereas the execution efficiency is comparable. The security of the modified scheme is also analyzed in detail.


IEEE Transactions on Information Forensics and Security | 2016

Attribute-Based Data Sharing Scheme Revisited in Cloud Computing

Shulan Wang; Kaitai Liang; Joseph K. Liu; Jianyong Chen; Jianping Yu; Weixin Xie

Ciphertext-policy attribute-based encryption (CP-ABE) is a very promising encryption technique for secure data sharing in the context of cloud computing. Data owner is allowed to fully control the access policy associated with his data which to be shared. However, CP-ABE is limited to a potential security risk that is known as key escrow problem, whereby the secret keys of users have to be issued by a trusted key authority. Besides, most of the existing CP-ABE schemes cannot support attribute with arbitrary state. In this paper, we revisit attribute-based data sharing scheme in order to solve the key escrow issue but also improve the expressiveness of attribute, so that the resulting scheme is more friendly to cloud computing applications. We propose an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service provider can compromise the whole secret key of a user individually. Moreover, we introduce the concept of attribute with weight, being provided to enhance the expression of attribute, which can not only extend the expression from binary to arbitrary state, but also lighten the complexity of access policy. Therefore, both storage cost and encryption complexity for a ciphertext are relieved. The performance analysis and the security proof show that the proposed scheme is able to achieve efficient and secure data sharing in cloud computing.

Collaboration


Dive into the Jianyong Chen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kwok-Wo Wong

City University of Hong Kong

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nan Lu

Shenzhen University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge