Cqarank: jointly model topics and expertise in community question answering L Yang, M Qiu, S Gottipati, F Zhu, J Jiang, H Sun, Z Chen Proceedings of the 22nd ACM international conference on Information …, 2013 | 282 | 2013 |
Using trust and risk in access control for grid environment Y Li, H Sun, Z Chen, J Ren, H Luo 2008 International Conference on Security Technology, 13-16, 2008 | 34 | 2008 |
Accelerating RSA with fine-grained parallelism using GPU Y Yang, Z Guan, H Sun, Z Chen Information Security Practice and Experience: 11th International Conference …, 2015 | 31 | 2015 |
Sorcery: Could we make P2P content sharing systems robust to deceivers? E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009 | 31 | 2009 |
RFID 标签所有权转移协议研究 金永明, 孙惠平, 关志, 陈钟 计算机研究与发展 48 (8), 1400-1405, 2011 | 29 | 2011 |
Permission-based abnormal application detection for android J Zhu, Z Guan, Y Yang, L Yu, H Sun, Z Chen Information and Communications Security: 14th International Conference …, 2012 | 25 | 2012 |
Filtering spam in social tagging system with dynamic behavior analysis B Liu, E Zhai, H Sun, Y Chen, Z Chen 2009 International Conference on Advances in Social Network Analysis and …, 2009 | 25 | 2009 |
Strategy proof trust management in wireless ad hoc network H Sun, J Song Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004 | 25 | 2004 |
PUF-based RFID authentication protocol against secret key leakage Y Jin, W Xin, H Sun, Z Chen Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb …, 2012 | 21 | 2012 |
Spamclean: Towards spam-free tagging systems E Zhai, H Sun, S Qing, Z Chen 2009 International Conference on Computational Science and Engineering 4 …, 2009 | 20 | 2009 |
Passapp: My app is my password! H Sun, K Wang, X Li, N Qin, Z Chen Proceedings of the 17th international conference on human-computer …, 2015 | 18 | 2015 |
Sorcery: Overcoming deceptive votes in P2P content sharing systems E Zhai, H Sun, S Qing, Z Chen Peer-to-Peer Networking and Applications 4, 178-191, 2011 | 15 | 2011 |
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records X Chu, H Sun, Z Chen 1st Asia USEC - Workshop on Usable Security with FC 2020, 2020 | 12 | 2020 |
An efficient privacy-preserving RFID ownership transfer protocol W Xin, Z Guan, T Yang, H Sun, Z Chen Web Technologies and Applications: 15th Asia-Pacific Web Conference, APWeb …, 2013 | 12 | 2013 |
Hash-based tag ownership transfer protocol against traceability Y Jin, H Sun, Z Chen 2009 IEEE International Conference on e-Business Engineering, 487-492, 2009 | 11 | 2009 |
A trust and risk framework to enhance reliable interaction in e-commerce Y Li, M Zhao, H Sun, Z Chen 2008 IEEE International Conference on e-Business Engineering, 475-480, 2008 | 9 | 2008 |
Ownership transfer protocol for RFID tag Y Jin, H Sun, Z Guan, Z Chen Journal of Computer Research and Development 48 (8), 1400-1405, 2011 | 7 | 2011 |
Lightweight RFID mutual authentication protocol against feasible problems Y Jin, H Sun, W Xin, S Luo, Z Chen Information and Communications Security: 13th International Conference …, 2011 | 7 | 2011 |
SpamResist: making peer-to-peer tagging systems robust to spam E Zhai, R Chen, EK Lua, L Zhang, H Sun, Z Cai, S Qing, Z Chen GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 7 | 2009 |
OverlapShard: Overlap-based sharding mechanism Y Liu, H Sun, X Song, Z Chen 2021 IEEE Symposium on Computers and Communications (ISCC), 1-7, 2021 | 6 | 2021 |