PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks J Zhang, J Cui, H Zhong, Z Chen, L Liu IEEE Transactions on Dependable and Secure Computing 18 (2), 722-735, 2019 | 307 | 2019 |
Handbook of peer-to-peer networking X Shen, H Yu, J Buford, M Akon Springer Science & Business Media, 2010 | 286 | 2010 |
CyberGuarder: A virtualization security assurance architecture for green cloud computing J Li, B Li, T Wo, C Hu, J Huai, L Liu, KP Lam Future generation computer systems 28 (2), 379-390, 2012 | 209 | 2012 |
Edge computing in VANETs-an efficient and privacy-preserving cooperative downloading scheme J Cui, L Wei, H Zhong, J Zhang, Y Xu, L Liu IEEE Journal on Selected Areas in Communications 38 (6), 1191-1204, 2020 | 180 | 2020 |
Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment J Cui, X Zhang, H Zhong, J Zhang, L Liu IEEE Transactions on Information Forensics and Security 15, 1654-1667, 2019 | 163 | 2019 |
A load-balancing mechanism for distributed SDN control plane using response time J Cui, Q Lu, H Zhong, M Tian, L Liu IEEE transactions on network and service management 15 (4), 1197-1206, 2018 | 142 | 2018 |
Explaining deep neural networks: A survey on the global interpretation methods R Saleem, B Yuan, F Kurugollu, A Anjum, L Liu Neurocomputing 513, 165-180, 2022 | 124 | 2022 |
Man-in-the-middle attacks in vehicular ad-hoc networks: Evaluating the impact of attackers’ strategies F Ahmad, A Adnane, VNL Franqueira, F Kurugollu, L Liu Sensors 18 (11), 4040, 2018 | 122 | 2018 |
Cloud BI: Future of business intelligence in the Cloud H Al-Aqrabi, L Liu, R Hill, N Antonopoulos Journal of Computer and System Sciences 81 (1), 85-96, 2015 | 110 | 2015 |
Edge computing-based privacy-preserving authentication framework and protocol for 5G-enabled vehicular networks J Zhang, H Zhong, J Cui, M Tian, Y Xu, L Liu IEEE Transactions on Vehicular Technology 69 (7), 7940-7954, 2020 | 109 | 2020 |
RSMA: Reputation system-based lightweight message authentication framework and protocol for 5G-enabled vehicular networks J Cui, X Zhang, H Zhong, Z Ying, L Liu IEEE Internet of Things Journal 6 (4), 6417-6428, 2019 | 105 | 2019 |
Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks H Zhong, B Huang, J Cui, Y Xu, L Liu Ieee Access 6, 2241-2250, 2017 | 99 | 2017 |
ARSH-FATI: A novel metaheuristic for cluster head selection in wireless sensor networks H Ali, UU Tariq, M Hussain, L Lu, J Panneerselvam, X Zhai IEEE Systems Journal 15 (2), 2386-2397, 2020 | 93 | 2020 |
Event detection and user interest discovering in social media data streams LL Shi, L Liu, Y Wu, L Jiang, J Hardy IEEE access 5, 20953-20964, 2017 | 88 | 2017 |
Dynamic resource discovery based on preference and movement pattern similarity for large-scale social internet of things Z Li, R Chen, L Liu, G Min IEEE Internet of Things Journal 3 (4), 581-589, 2015 | 87 | 2015 |
Notrino: A novel hybrid trust management scheme for internet-of-vehicles F Ahmad, F Kurugollu, CA Kerrache, S Sezer, L Liu IEEE Transactions on Vehicular Technology 70 (9), 9244-9257, 2021 | 83 | 2021 |
SMAKA: secure many-to-many authentication and key agreement scheme for vehicular networks J Zhang, H Zhong, J Cui, Y Xu, L Liu IEEE Transactions on Information Forensics and Security 16, 1810-1824, 2020 | 82 | 2020 |
An extensible and effective anonymous batch authentication scheme for smart vehicular networks J Zhang, H Zhong, J Cui, Y Xu, L Liu IEEE Internet of Things Journal 7 (4), 3462-3473, 2020 | 74 | 2020 |
RVLBPNN: A workload forecasting model for smart cloud computing Y Lu, J Panneerselvam, L Liu, Y Wu Scientific Programming 2016 (1), 5635673, 2016 | 74 | 2016 |
Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs L Wei, J Cui, H Zhong, Y Xu, L Liu IEEE Transactions on Mobile Computing 21 (9), 3280-3297, 2021 | 72 | 2021 |