Efficient privacy-aware authentication scheme for mobile cloud computing services D He, N Kumar, MK Khan, L Wang, J Shen IEEE Systems Journal 12 (2), 1621-1631, 2016 | 182 | 2016 |
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography D He, H Wang, MK Khan, L Wang Iet Communications 10 (14), 1795-1802, 2016 | 159 | 2016 |
A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network D He, N Kumar, H Wang, L Wang, KKR Choo, A Vinel IEEE Transactions on Dependable and Secure Computing 15 (4), 633-645, 2016 | 145 | 2016 |
Improved Interfacial Affinity and CO2 Separation Performance of Asymmetric Mixed Matrix Membranes by Incorporating Postmodified MIL-53(Al) H Zhu, L Wang, X Jie, D Liu, Y Cao ACS applied materials & interfaces 8 (34), 22696-22704, 2016 | 127 | 2016 |
Novel copolyimide membranes for gas separation L Wang, Y Cao, M Zhou, SJ Zhou, Q Yuan Journal of Membrane Science 305 (1-2), 338-346, 2007 | 106 | 2007 |
Dynamic proofs of retrievability for coded cloud storage systems Z Ren, L Wang, Q Wang, M Xu IEEE Transactions on Services Computing 11 (4), 685-698, 2015 | 96 | 2015 |
Similarity-maintaining privacy preservation and location-aware low-rank matrix factorization for QoS prediction based web service recommendation X Zhu, XY Jing, D Wu, Z He, J Cao, D Yue, L Wang IEEE Transactions on Services Computing 14 (3), 889-902, 2018 | 70 | 2018 |
Towards a robust deep neural network in texts: A survey W Wang, R Wang, L Wang, Z Wang, A Ye arXiv preprint arXiv:1902.07285, 2019 | 69 | 2019 |
Fabrication of high performance Matrimid/polysulfone dual-layer hollow fiber membranes for O2/N2 separation X Ding, Y Cao, H Zhao, L Wang, Q Yuan Journal of Membrane Science 323 (2), 352-361, 2008 | 68 | 2008 |
Faketagger: Robust safeguards against deepfake dissemination via provenance tracking R Wang, F Juefei-Xu, M Luo, Y Liu, L Wang Proceedings of the 29th ACM International Conference on Multimedia, 3546-3555, 2021 | 65* | 2021 |
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud D He, N Kumar, H Wang, L Wang, KKR Choo Applied Mathematics and Computation 314, 31-43, 2017 | 65 | 2017 |
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices D He, H Wang, L Wang, J Shen, X Yang Soft Computing 21, 6801-6810, 2017 | 64 | 2017 |
AMR steganalysis based on the probability of same pulse position Y Ren, T Cai, M Tang, L Wang IEEE Transactions on Information Forensics and security 10 (9), 1801-1811, 2015 | 60 | 2015 |
Universal detection of video steganography in multiple domains based on the consistency of motion vectors L Zhai, L Wang, Y Ren IEEE transactions on information forensics and security 15, 1762-1777, 2019 | 51 | 2019 |
Towards a robust deep neural network against adversarial texts: A survey W Wang, R Wang, L Wang, Z Wang, A Ye ieee transactions on knowledge and data engineering 35 (3), 3159-3179, 2021 | 50 | 2021 |
Batch identification game model for invalid signatures in wireless mobile networks J Chen, K He, Q Yuan, G Xue, R Du, L Wang IEEE Transactions on Mobile Computing 16 (6), 1530-1543, 2016 | 50 | 2016 |
Removal of CO2 from biogas by membrane contactor using PTFE hollow fibers with smaller diameter M Li, Z Zhu, M Zhou, X Jie, L Wang, G Kang, Y Cao Journal of Membrane Science 627, 119232, 2021 | 46 | 2021 |
Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage D He, H Wang, J Zhang, L Wang Information Sciences 375, 48-53, 2017 | 45 | 2017 |
AMR steganalysis based on second-order difference of pitch delay Y Ren, J Yang, J Wang, L Wang IEEE Transactions on Information Forensics and Security 12 (6), 1345-1357, 2016 | 45 | 2016 |
Lossless data hiding algorithm for encrypted images with high capacity S Zheng, D Li, D Hu, D Ye, L Wang, J Wang Multimedia Tools and Applications 75, 13765-13778, 2016 | 45 | 2016 |