Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm X Wang, CS Yeo, R Buyya, J Su Future Generation Computer Systems 27 (8), 1124-1134, 2011 | 198 | 2011 |
RLM: A general model for trust representation and aggregation X Wang, L Liu, J Su IEEE Transactions on Services Computing 5 (1), 131-143, 2010 | 126 | 2010 |
CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices H Sun, X Wang, R Buyya, J Su Software: Practice and Experience 47 (3), 421-441, 2017 | 122 | 2017 |
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things J Su, D Cao, B Zhao, X Wang, I You Future Generation Computer Systems 33, 11-18, 2014 | 99 | 2014 |
Attribute-based encryption schemes 苏金树, 曹丹, 王小峰, 孙一品, 胡乔林 Journal of Software 22 (6), 1299-1315, 2011 | 85 | 2011 |
A new multistage approach to detect subtle DDoS attacks F Wang, H Wang, X Wang, J Su Mathematical and Computer Modelling 55 (1-2), 198-213, 2012 | 77 | 2012 |
RPAH: Random port and address hopping for thwarting internal and external adversaries YB Luo, BS Wang, XF Wang, XF Hu, GL Cai, H Sun 2015 IEEE Trustcom/BigDataSE/ISPA 1, 263-270, 2015 | 69 | 2015 |
Toward highly secure yet efficient KNN classification scheme on outsourced cloud data L Liu, J Su, X Liu, R Chen, K Huang, RH Deng, X Wang IEEE Internet of Things Journal 6 (6), 9841-9852, 2019 | 57 | 2019 |
iTLS: Lightweight transport-layer security protocol for IoT with minimal latency and perfect forward secrecy P Li, J Su, X Wang IEEE Internet of Things Journal 7 (8), 6828-6841, 2020 | 49 | 2020 |
Bgpcoin: Blockchain-based internet number resource authority and bgp security solution Q Xing, B Wang, X Wang Symmetry 10 (9), 408, 2018 | 49 | 2018 |
State of the art: Secure mobile payment W Liu, X Wang, W Peng IEEE Access 8, 13898-13914, 2020 | 48 | 2020 |
Secure remote multi-factor authentication scheme based on chaotic map zero-knowledge proof for crowdsourcing internet of things W Liu, X Wang, W Peng IEEE Access 8, 8754-8767, 2019 | 43 | 2019 |
A PSO-optimized minimum spanning tree-based topology control scheme for wireless sensor networks W Guo, B Zhang, G Chen, X Wang, N Xiong International Journal of Distributed Sensor Networks 9 (4), 985410, 2013 | 40 | 2013 |
DiffSig: Resource differentiation based malware behavioral concise signature generation H Lu, B Zhao, X Wang, J Su Information and Communication Technology: International Conference, ICT …, 2013 | 34 | 2013 |
Reliability-oriented genetic algorithm for workflow applications using max-min strategy X Wang, R Buyya, J Su 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid …, 2009 | 30 | 2009 |
Privacy-preserving mining of association rule on outsourced cloud data from multiple parties L Liu, J Su, R Chen, X Liu, X Wang, S Chen, H Leung Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 24 | 2018 |
ENDMal: An anti-obfuscation and collaborative malware detection system using syscall sequences H Lu, X Wang, B Zhao, F Wang, J Su Mathematical and Computer Modelling 58 (5-6), 1140-1154, 2013 | 23 | 2013 |
Center-less single sign-on with privacy-preserving remote biometric-based ID-MAKA scheme for mobile cloud computing services W Liu, X Wang, W Peng, Q Xing IEEE Access 7, 137770-137783, 2019 | 22 | 2019 |
Poster: Bgpcoin: a trustworthy blockchain-based resource management solution for bgp security Q Xing, B Wang, X Wang Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 22 | 2017 |
A keyed-hashing based self-synchronization mechanism for port address hopping communication Y Luo, B Wang, X Wang, B Zhang Frontiers of Information Technology & Electronic Engineering 18 (5), 719-728, 2017 | 20 | 2017 |