Plant phenotypic traits eventually shape its microbiota: a common garden test Y Li, X Wu, T Chen, W Wang, G Liu, W Zhang, S Li, M Wang, C Zhao, ... Frontiers in microbiology 9, 2479, 2018 | 86 | 2018 |
Compulsory traceable ciphertext-policy attribute-based encryption against privilege abuse in fog computing H Qiao, J Ren, Z Wang, H Ba, H Zhou Future Generation Computer Systems 88, 107-116, 2018 | 32 | 2018 |
Practical, provably secure, and black-box traceable CP-ABE for cryptographic cloud storage H Qiao, H Ba, H Zhou, Z Wang, J Ren, Y Hu Symmetry 10 (10), 482, 2018 | 10 | 2018 |
Microbial taxonomical composition in spruce phyllosphere, but not community functional structure, varies by geographical location Y Li, X Wu, W Wang, M Wang, C Zhao, T Chen, G Liu, W Zhang, S Li, ... PeerJ 7, e7376, 2019 | 9 | 2019 |
Efficient CP-ABE with non-monotonic access structures Y Cheng, H Zhou, J Ma, Z Wang Cloud Computing and Security: Third International Conference, ICCCS 2017 …, 2017 | 8 | 2017 |
Tenant-oriented monitoring for customized security services in the cloud H Zhou, H Ba, Y Wang, Z Wang, J Ma, Y Li, H Qiao Symmetry 11 (2), 252, 2019 | 6 | 2019 |
jMonAtt: Integrity monitoring and attestation of jvm-based applications in cloud computing H Ba, H Zhou, S Bai, J Ren, Z Wang, L Ci 2017 4th International Conference on Information Science and Control …, 2017 | 6 | 2017 |
RIM4J: An Architecture for Language-Supported Runtime Measurement against Malicious Bytecode in Cloud Computing H Ba, H Zhou, H Qiao, Z Wang, J Ren Symmetry 10 (7), 253, 2018 | 5 | 2018 |
User-policy-based dynamic remote attestation in cloud computing H Ba, J Ren, Z Wang, H Zhou, Y Li, T Hong International Journal of Embedded Systems 8 (1), 39-45, 2016 | 5 | 2016 |
Astrape: An efficient concurrent cloud attestation with ciphertext-policy attribute-based encryption H Ba, H Zhou, S Mei, H Qiao, T Hong, Z Wang, J Ren Symmetry 10 (10), 425, 2018 | 4 | 2018 |
Agentless and uniform introspection for various security services in iaas cloud H Zhou, H Ba, J Ren, Y Wang, Y Li, Y Chen, Z Wang 2017 4th International Conference on Information Science and Control …, 2017 | 4 | 2017 |
ESI-cloud: Extending virtual machine introspection for integrating multiple security services J Ren, L Liu, D Zhang, H Zhou, Q Zhang 2016 IEEE International Conference on Services Computing (SCC), 804-807, 2016 | 4 | 2016 |
On the detection of malicious behaviors against introspection using hardware architectural events H Zhou, H Ba, Y Wang, T Hong IEICE TRANSACTIONS on Information and Systems 103 (1), 177-180, 2020 | 3 | 2020 |
Dynamic evaluation of consumer satisfaction based on the grey prediction model S Bai, J Ren, H Ba, H Zhou, R Yang 2017 4th International Conference on Information Science and Control …, 2017 | 3 | 2017 |
Application-assisted dynamic attestation for jvm-based cloud H Ba, H Zhou, Z Wang, J Ren, T Hong, Y Li Algorithms and Architectures for Parallel Processing: ICA3PP International …, 2015 | 3 | 2015 |
Jvm-based dynamic attestation in cloud computing H Ba, Z Wang, J Ren, H Zhou 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 3 | 2014 |
Runtime Measurement Architecture for Bytecode Integrity in JVM-Based Cloud H Ba, H Zhou, J Ren, Z Wang 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), 262-263, 2017 | 2 | 2017 |
The snapshot view analysis for continuous data protection Y Cheng, H Zhou, J Wu, J Ma, Z Wang 2017 International Conference on Network and Information Systems for …, 2017 | 2 | 2017 |
Decoupling Security Services from IaaS Cloud Through Remote Virtual Machine Introspection H Zhou, H Ba, J Ren, Y Wang, Z Wang, Y Li Security, Privacy, and Anonymity in Computation, Communication, and Storage …, 2017 | 1 | 2017 |
Dynamic Remote Attestation Service for Virtual Machine on the IaaS Cloud Platform H Zhou, H Ba, J Ren, Y Chen, Y Wang, Z Wang 2017 International Conference on Network and Information Systems for …, 2017 | | 2017 |