A rapid advice guideline for the diagnosis and treatment of 2019 novel coronavirus (2019-nCoV) infected pneumonia (standard version) YH Jin, L Cai, ZS Cheng, H Cheng, T Deng, YP Fan, C Fang, D Huang, ... Military medical research 7, 1-23, 2020 | 2926 | 2020 |
An efficient remote use authentication scheme using smart cards HM Sun IEEE Transactions on Consumer Electronics 46 (4), 958-961, 2000 | 695 | 2000 |
Adaptive data hiding in edge areas of images with spatial LSB domain systems CH Yang, CY Weng, SJ Wang, HM Sun IEEE Transactions on Information Forensics and Security 3 (3), 488-497, 2008 | 592 | 2008 |
An efficient nonrepudiable threshold proxy signature scheme with known signers HM Sun Computer communications 22 (8), 717-722, 1999 | 261 | 1999 |
Three-party encrypted key exchange: attacks and a solution CL Lin, HM Sun, T Hwang ACM SIGOPS Operating Systems Review 34 (4), 12-20, 2000 | 255 | 2000 |
Mini-YOLOv3: real-time object detector for embedded applications QC Mao, HM Sun, YB Liu, RS Jia Ieee Access 7, 133529-133538, 2019 | 246 | 2019 |
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks CM Chen, YH Lin, YC Lin, HM Sun IEEE Transactions on parallel and distributed systems 23 (4), 727-734, 2011 | 210 | 2011 |
oPass: A user authentication protocol resistant to password stealing and password reuse attacks HM Sun, YH Chen, YH Lin IEEE transactions on information forensics and security 7 (2), 651-663, 2011 | 207 | 2011 |
Three-party encrypted key exchange without server public-keys CL Lin, HM Sun, M Steiner, T Hwang IEEE Communications letters 5 (12), 497-499, 2001 | 193 | 2001 |
Attacks and solutions on strong-password authentication CL Lin, HM Sun, T Hwang IEICE transactions on communications 84 (9), 2622-2627, 2001 | 191 | 2001 |
A novel mutual authentication scheme based on quadratic residues for RFID systems Y Chen, JS Chou, HM Sun Computer Networks 52 (12), 2373-2380, 2008 | 183 | 2008 |
On the security of Chien's ultralightweight RFID authentication protocol HM Sun, WC Ting, KH Wang IEEE Transactions on Dependable and Secure Computing 8 (2), 315-317, 2009 | 180 | 2009 |
Adipose-derived stromal vascular fraction cells: update on clinical utility and efficacy S Han, HM Sun, KC Hwang, SW Kim Critical Reviews™ in Eukaryotic Gene Expression 25 (2), 2015 | 176 | 2015 |
Organic solid fluorophores regulated by subtle structure modification: color-tunable and aggregation-induced emission JN Zhang, H Kang, N Li, SM Zhou, HM Sun, SW Yin, N Zhao, BZ Tang Chemical science 8 (1), 577-582, 2017 | 168 | 2017 |
Dual RSA and its security analysis HM Sun, ME Wu, WC Ting, MJ Hinek IEEE Transactions on Information Theory 53 (8), 2922-2933, 2007 | 162 | 2007 |
Meta-analysis of microRNA-183 family expression in human cancer studies comparing cancer tissues with noncancerous tissues QH Zhang, HM Sun, RZ Zheng, YC Li, Q Zhang, P Cheng, ZH Tang, ... Gene 527 (1), 26-32, 2013 | 145 | 2013 |
Dectin-1 is inducible and plays a crucial role in Aspergillus-induced innate immune responses in human bronchial epithelial cells WK Sun, X Lu, X Li, QY Sun, X Su, Y Song, HM Sun, Y Shi European Journal of Clinical Microbiology & Infectious Diseases 31, 2755-2764, 2012 | 141 | 2012 |
Structure and photocatalytic property of Mo-doped TiO2 nanoparticles S Wang, LN Bai, HM Sun, Q Jiang, JS Lian Powder technology 244, 9-15, 2013 | 139 | 2013 |
Methadone maintenance treatment programme reduces criminal activity and improves social well-being of drug users in China: a systematic review and meta-analysis HM Sun, XY Li, EPF Chow, T Li, Y Xian, YH Lu, T Tian, X Zhuang, ... BMJ open 5 (1), e005997, 2015 | 133 | 2015 |
Multi-stage structural damage diagnosis method based on\energy-damage\theory TH Yi, HN Li, HM Sun Smart Structures and Systems 12 (3), 345-361, 2013 | 130 | 2013 |