Search pattern leakage in searchable encryption: Attacks and new construction C Liu, L Zhu, M Wang, Y Tan Information Sciences 265, 176-188, 2014 | 299 | 2014 |
The security of machine learning in an adversarial setting: A survey X Wang, J Li, X Kuang, Y Tan, J Li Journal of Parallel and Distributed Computing 130, 12-23, 2019 | 236 | 2019 |
A covert channel over volte via adjusting silence periods X Zhang, YA Tan, C Liang, Y Li, J Li IEEE Access 6, 9292-9302, 2018 | 119 | 2018 |
Deep learning feature exploration for android malware detection N Zhang, Y Tan, C Yang, Y Li Applied Soft Computing 102, 107069, 2021 | 94 | 2021 |
Towards a physical-world adversarial patch for blinding object detection models Y Wang, H Lv, X Kuang, G Zhao, Y Tan, Q Zhang, J Hu Information Sciences 556, 459-471, 2021 | 77 | 2021 |
A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application Z Qikun, G Yong, Z Quanxin, W Ruifang, T Yu-An IEEE Access 6, 24064-24074, 2018 | 72 | 2018 |
A root privilege management scheme with revocable authorization for Android devices Y Tan, Y Xue, C Liang, J Zheng, Q Zhang, J Zheng, Y Li Journal of Network and Computer Applications 107, 69-82, 2018 | 71 | 2018 |
An adversarial attack on DNN-based black-box object detectors Y Wang, Y Tan, W Zhang, Y Zhao, X Kuang Journal of Network and Computer Applications 161, 102634, 2020 | 65 | 2020 |
Building covert timing channels by packet rearrangement over mobile networks X Zhang, C Liang, Q Zhang, Y Li, J Zheng, Y Tan Information Sciences 445, 66-78, 2018 | 65 | 2018 |
Hybrid sequence‐based Android malware detection using natural language processing N Zhang, J Xue, Y Ma, R Zhang, T Liang, Y Tan International Journal of Intelligent Systems 36 (10), 5770-5784, 2021 | 64 | 2021 |
DPPDL: a dynamic partial-parallel data layout for green video surveillance storage Z Sun, Q Zhang, Y Li, Y Tan IEEE Transactions on Circuits and Systems for Video Technology 28 (1), 193-205, 2016 | 59 | 2016 |
Detecting adversarial examples via prediction difference for deep neural networks F Guo, Q Zhao, X Li, X Kuang, J Zhang, Y Han, Y Tan Information Sciences 501, 182-192, 2019 | 57 | 2019 |
A feature-vector generative adversarial network for evading PDF malware classifiers Y Li, Y Wang, Y Wang, L Ke, Y Tan Information Sciences 523, 38-48, 2020 | 56 | 2020 |
RootAgency: A digital signature-based root privilege management agency for cloud terminal devices Y Xue, Y Tan, C Liang, Y Li, J Zheng, Q Zhang Information Sciences 444, 36-50, 2018 | 56 | 2018 |
A high-imperceptibility and histogram-shifting data hiding scheme for JPEG images Y Li, S Yao, K Yang, YA Tan, Q Zhang IEEE Access 7, 73573-73582, 2019 | 54 | 2019 |
A packet-reordering covert channel over VoLTE voice and video traffics X Zhang, L Zhu, X Wang, C Zhang, H Zhu, Y Tan Journal of Network and Computer Applications 126, 29-38, 2019 | 54 | 2019 |
Covert timing channels for IoT over mobile networks Y Tan, X Zhang, K Sharif, C Liang, Q Zhang, Y Li IEEE Wireless Communications 25 (6), 38-44, 2018 | 53 | 2018 |
Data security sharing model based on privacy protection for blockchain‐enabled industrial Internet of Things Q Zhang, Y Li, R Wang, L Liu, Y Tan, J Hu International Journal of Intelligent Systems 36 (1), 94-111, 2021 | 51 | 2021 |
A payload-dependent packet rearranging covert channel for mobile VoIP traffic C Liang, X Wang, X Zhang, Y Zhang, K Sharif, Y Tan Information Sciences 465, 162-173, 2018 | 51 | 2018 |
Building packet length covert channel over mobile VoIP traffics C Liang, Y Tan, X Zhang, X Wang, J Zheng, Q Zhang Journal of Network and Computer Applications 118, 144-153, 2018 | 47 | 2018 |