Efficient privacy-aware authentication scheme for mobile cloud computing services D He, N Kumar, MK Khan, L Wang, J Shen IEEE Systems Journal 12 (2), 1621-1631, 2016 | 191 | 2016 |
Lightweight anonymous key distribution scheme for smart grid using elliptic curve cryptography D He, H Wang, MK Khan, L Wang Iet Communications 10 (14), 1795-1802, 2016 | 173 | 2016 |
A provably-secure cross-domain handshake scheme with symptoms-matching for mobile healthcare social network D He, N Kumar, H Wang, L Wang, KKR Choo, A Vinel IEEE Transactions on Dependable and Secure Computing 15 (4), 633-645, 2016 | 151 | 2016 |
Improved Interfacial Affinity and CO2 Separation Performance of Asymmetric Mixed Matrix Membranes by Incorporating Postmodified MIL-53(Al) H Zhu, L Wang, X Jie, D Liu, Y Cao ACS applied materials & interfaces 8 (34), 22696-22704, 2016 | 137 | 2016 |
Novel copolyimide membranes for gas separation L Wang, Y Cao, M Zhou, SJ Zhou, Q Yuan Journal of Membrane Science 305 (1-2), 338-346, 2007 | 109 | 2007 |
Dynamic proofs of retrievability for coded cloud storage systems Z Ren, L Wang, Q Wang, M Xu IEEE Transactions on Services Computing 11 (4), 685-698, 2015 | 96 | 2015 |
Faketagger: Robust safeguards against deepfake dissemination via provenance tracking R Wang, F Juefei-Xu, M Luo, Y Liu, L Wang Proceedings of the 29th ACM International Conference on Multimedia, 3546-3555, 2021 | 84* | 2021 |
Towards a robust deep neural network in texts: A survey W Wang, R Wang, L Wang, Z Wang, A Ye arXiv preprint arXiv:1902.07285, 2019 | 76 | 2019 |
Similarity-maintaining privacy preservation and location-aware low-rank matrix factorization for QoS prediction based web service recommendation X Zhu, XY Jing, D Wu, Z He, J Cao, D Yue, L Wang IEEE Transactions on Services Computing 14 (3), 889-902, 2018 | 76 | 2018 |
Fabrication of high performance Matrimid/polysulfone dual-layer hollow fiber membranes for O2/N2 separation X Ding, Y Cao, H Zhao, L Wang, Q Yuan Journal of Membrane Science 323 (2), 352-361, 2008 | 69 | 2008 |
Towards a robust deep neural network against adversarial texts: A survey W Wang, R Wang, L Wang, Z Wang, A Ye ieee transactions on knowledge and data engineering 35 (3), 3159-3179, 2021 | 68 | 2021 |
Privacy-preserving certificateless provable data possession scheme for big data storage on cloud D He, N Kumar, H Wang, L Wang, KKR Choo Applied Mathematics and Computation 314, 31-43, 2017 | 67 | 2017 |
Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices D He, H Wang, L Wang, J Shen, X Yang Soft Computing 21, 6801-6810, 2017 | 65 | 2017 |
Universal detection of video steganography in multiple domains based on the consistency of motion vectors L Zhai, L Wang, Y Ren IEEE transactions on information forensics and security 15, 1762-1777, 2019 | 62 | 2019 |
AMR steganalysis based on the probability of same pulse position Y Ren, T Cai, M Tang, L Wang IEEE Transactions on Information Forensics and security 10 (9), 1801-1811, 2015 | 61 | 2015 |
Anti-forgery: Towards a stealthy and robust deepfake disruption attack via adversarial perceptual-aware perturbations R Wang, Z Huang, Z Chen, L Liu, J Chen, L Wang arXiv preprint arXiv:2206.00477, 2022 | 59 | 2022 |
Batch identification game model for invalid signatures in wireless mobile networks J Chen, K He, Q Yuan, G Xue, R Du, L Wang IEEE Transactions on Mobile Computing 16 (6), 1530-1543, 2016 | 52 | 2016 |
Removal of CO2 from biogas by membrane contactor using PTFE hollow fibers with smaller diameter M Li, Z Zhu, M Zhou, X Jie, L Wang, G Kang, Y Cao Journal of Membrane Science 627, 119232, 2021 | 51 | 2021 |
AMR steganalysis based on second-order difference of pitch delay Y Ren, J Yang, J Wang, L Wang IEEE Transactions on Information Forensics and Security 12 (6), 1345-1357, 2016 | 49 | 2016 |
Effect of MIL-53 on phase inversion and gas separation performance of mixed matrix hollow fiber membranes H Zhu, X Jie, L Wang, G Kang, D Liu, Y Cao RSC advances 6 (73), 69124-69134, 2016 | 47 | 2016 |