A trust-based collaborative filtering algorithm for E-commerce recommendation system L Jiang, Y Cheng, L Yang, J Li, H Yan, X Wang Journal of ambient intelligence and humanized computing 10, 3023-3034, 2019 | 261 | 2019 |
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks Q Jiang, J Ma, G Li, L Yang Wireless personal communications 68, 1477-1491, 2013 | 138 | 2013 |
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma Journal of Ambient Intelligence and Humanized Computing 9, 1061-1073, 2018 | 116 | 2018 |
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm L Yang, Y Qiao, Z Liu, J Ma, X Li Soft Computing 22, 453-464, 2018 | 75 | 2018 |
An efficient ticket based authentication protocol with unlinkability for wireless access networks Q Jiang, J Ma, G Li, L Yang Wireless personal communications 77, 1489-1506, 2014 | 74 | 2014 |
Integrated authentication and key agreement framework for vehicular cloud computing Q Jiang, J Ni, J Ma, L Yang, X Shen IEEE Network 32 (3), 28-35, 2018 | 70 | 2018 |
A remotely keyed file encryption scheme under mobile cloud computing L Yang, Z Han, Z Huang, J Ma Journal of Network and Computer Applications 106, 90-99, 2018 | 63 | 2018 |
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. L Yang, J Ma, Q Jiang Int. J. Netw. Secur. 14 (3), 156-163, 2012 | 46 | 2012 |
Online handwritten signature verification using feature weighting algorithm relief L Yang, Y Cheng, X Wang, Q Liu Soft Computing 22, 7811-7823, 2018 | 45 | 2018 |
On the control of opinion dynamics in social networks Z Liu, J Ma, Y Zeng, L Yang, Q Huang, H Wu Physica A: Statistical Mechanics and its Applications 409, 183-198, 2014 | 39 | 2014 |
Iot etei: End-to-end iot device identification method F Yin, L Yang, Y Wang, J Dai 2021 IEEE conference on dependable and secure computing (DSC), 1-8, 2021 | 38 | 2021 |
A DNS tunneling detection method based on deep learning models to prevent data exfiltration J Zhang, L Yang, S Yu, J Ma Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 38 | 2019 |
Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty R Wan, L Ding, N Xiong, W Shu, L Yang Human-centric Computing and Information Sciences 9, 1-21, 2019 | 36 | 2019 |
Identifying opinion leaders in social networks with topic limitation L Yang, Y Tian, J Li, J Ma, J Zhang Cluster Computing 20, 2403-2413, 2017 | 35 | 2017 |
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism H Lin, J Hu, Y Tian, L Yang, L Xu Information Sciences 387, 238-253, 2017 | 27 | 2017 |
Robust two-factor authentication and key agreement preserving user privacy Q Jiang, J Ma, G Li, L Yang International Journal of Network Security 16 (3), 229-240, 2014 | 26 | 2014 |
SADUS: Secure data deletion in user space for mobile devices L Yang, T Wei, F Zhang, J Ma computers & security 77, 612-626, 2018 | 16 | 2018 |
Identifying IoT devices based on spatial and temporal features from network traffic F Yin, L Yang, J Ma, Y Zhou, Y Wang, J Dai Security and Communication Networks 2021 (1), 2713211, 2021 | 15 | 2021 |
Online handwritten signature verification based on the most stable feature and partition L Yang, X Jin, Q Jiang Cluster Computing 22, 1691-1701, 2019 | 15 | 2019 |
Achieving privacy-preserving sensitive attributes for large universe based on private set intersection L Yang, C Li, Y Cheng, S Yu, J Ma Information Sciences 582, 529-546, 2022 | 13 | 2022 |