An identity-based security system for user privacy in vehicular ad hoc networks J Sun, C Zhang, Y Zhang, Y Fang IEEE Transactions on Parallel and Distributed Systems 21 (9), 1227-1239, 2010 | 501 | 2010 |
Privacy and security for online social networks: challenges and opportunities C Zhang, J Sun, X Zhu, Y Fang IEEE network 24 (4), 13-18, 2010 | 446 | 2010 |
HCPP: Cryptography based secure EHR system for patient privacy and emergency healthcare J Sun, X Zhu, C Zhang, Y Fang 2011 31st International Conference on Distributed Computing Systems, 373-382, 2011 | 180 | 2011 |
Fine-grained private matching for proximity-based mobile social networking R Zhang, Y Zhang, J Sun, G Yan 2012 Proceedings IEEE INFOCOM, 1969-1977, 2012 | 166 | 2012 |
Cross-domain data sharing in distributed electronic health record systems J Sun, Y Fang IEEE Transactions on Parallel and Distributed Systems 21 (6), 754-764, 2009 | 158 | 2009 |
Paas: A privacy-preserving attribute-based authentication system for ehealth networks L Guo, C Zhang, J Sun, Y Fang 2012 IEEE 32nd International Conference on Distributed Computing Systems …, 2012 | 149 | 2012 |
A privacy-preserving attribute-based authentication system for mobile health networks L Guo, C Zhang, J Sun, Y Fang IEEE Transactions on Mobile Computing 13 (9), 1927-1941, 2013 | 144 | 2013 |
Privacy and emergency response in e-healthcare leveraging wireless body sensor networks J Sun, Y Fang, X Zhu IEEE Wireless Communications 17 (1), 66-73, 2010 | 142 | 2010 |
Dynamic detection of false data injection attack in smart grid using deep learning X Niu, J Li, J Sun, K Tomsovic 2019 IEEE Power & Energy Society Innovative Smart Grid Technologies …, 2019 | 140 | 2019 |
Cloud-assisted mobile-access of health data with privacy and auditability Y Tong, J Sun, SSM Chow, P Li IEEE Journal of biomedical and health Informatics 18 (2), 419-429, 2013 | 125 | 2013 |
An id-based framework achieving privacy and non-repudiation in vehicular ad hoc networks J Sun, C Zhang, Y Fang MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 122 | 2007 |
Privacy-preserving profile matching for proximity-based mobile social networking R Zhang, J Zhang, Y Zhang, J Sun, G Yan IEEE Journal on Selected Areas in Communications 31 (9), 656-668, 2013 | 117 | 2013 |
Fast identification of the missing tags in a large RFID system R Zhang, Y Liu, Y Zhang, J Sun 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2011 | 116 | 2011 |
A privacy-preserving scheme for online social networks with efficient revocation J Sun, X Zhu, Y Fang 2010 Proceedings IEEE INFOCOM, 1-9, 2010 | 109 | 2010 |
SAT: A security architecture achieving anonymity and traceability in wireless mesh networks J Sun, C Zhang, Y Zhang, Y Fang IEEE Transactions on Dependable and Secure Computing 8 (2), 295-307, 2010 | 108 | 2010 |
Protecting location privacy for task allocation in ad hoc mobile cloud computing Y Gong, C Zhang, Y Fang, J Sun IEEE Transactions on Emerging Topics in Computing 6 (1), 110-121, 2015 | 98 | 2015 |
Purging the back-room dealing: Secure spectrum auction leveraging paillier cryptosystem M Pan, J Sun, Y Fang IEEE Journal on Selected Areas in Communications 29 (4), 866-876, 2011 | 87 | 2011 |
Conaml: Constrained adversarial machine learning for cyber-physical systems J Li, Y Yang, JS Sun, K Tomsovic, H Qi Proceedings of the 2021 ACM Asia Conference on Computer and Communications …, 2021 | 75 | 2021 |
RescueMe: Location-based secure and dependable VANETs for disaster rescue J Sun, X Zhu, C Zhang, Y Fang IEEE Journal on Selected Areas in Communications 29 (3), 659-669, 2011 | 63 | 2011 |
Mac-layer selfish misbehavior in ieee 802.11 ad hoc networks: Detection and defense M Li, S Salinas, P Li, J Sun, X Huang IEEE Transactions on Mobile Computing 14 (6), 1203-1217, 2014 | 55 | 2014 |