Investigation of critical behavior in Pr0. 55Sr0. 45MnO3 by using the field dependence of magnetic entropy change J Fan, L Pi, L Zhang, W Tong, L Ling, B Hong, Y Shi, W Zhang, D Lu, ... Applied Physics Letters 98 (7), 2011 | 105 | 2011 |
Magnetic and magnetocaloric properties of perovskite manganite Pr0. 55Sr0. 45MnO3 J Fan, L Pi, L Zhang, W Tong, L Ling, B Hong, Y Shi, W Zhang, D Lu, ... Physica B: Condensed Matter 406 (11), 2289-2292, 2011 | 62 | 2011 |
APPLET: a privacy-preserving framework for location-aware recommender system X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu Science China. Information Sciences 60 (9), 092101, 2017 | 49 | 2017 |
xTSeH: A Trusted Platform Module Sharing Scheme towards Smart IoT-eHealth Devices D Lu, R Han, Y Shen, X Dong, J Ma, X Du, M Guizani IEEE Journal on Selected Areas in Communications, 2020 | 35 | 2020 |
Android malware detection via graph representation learning P Feng, J Ma, T Li, X Ma, N Xi, D Lu Mobile Information Systems 2021 (1), 5538841, 2021 | 21 | 2021 |
Android malware detection based on call graph via graph neural network P Feng, J Ma, T Li, X Ma, N Xi, D Lu 2020 International Conference on Networking and Network Applications (NaNA …, 2020 | 21 | 2020 |
Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing X Dong, T Zhang, D Lu, G Li, Y Shen, J Ma IEEE Transactions on Vehicular Technology 68 (9), 8881-8892, 2019 | 21 | 2019 |
A universal fairness evaluation framework for resource allocation in cloud computing D Lu, J Ma, N Xi China Communications 12 (5), 113-122, 2015 | 17 | 2015 |
From high-availability to collapse: quantitative analysis of “cloud-droplet-freezing” attack threats to virtual machine migration in cloud computing Y Wang, J Ma, D Lu, X Lu, L Zhang Cluster computing 17, 1369-1381, 2014 | 15 | 2014 |
Magnetocaloric effect of half-doped manganite Nd0. 5Ca0. 25Sr0. 25MnO3 J Fan, B Hong, D Lu, Y Shi, L Ling, L Zhang, W Tong, L Pi, Y Zhang Physica B: Condensed Matter 405 (15), 3120-3123, 2010 | 15 | 2010 |
Smaug: A TEE-assisted secured SQLite for embedded systems D Lu, M Shi, X Ma, X Liu, R Guo, T Zheng, Y Shen, X Dong, J Ma IEEE Transactions on Dependable and Secure Computing 20 (5), 3617-3635, 2022 | 10 | 2022 |
Information flow control on encrypted data for service composition among multiple clouds N Xi, J Ma, C Sun, D Lu, Y Shen Distributed and Parallel Databases 36, 511-527, 2018 | 8 | 2018 |
Distributed secure service composition with declassification in mobile network N Xi, C Sun, J Ma, Y Shen, D Lu 2016 International Conference on Networking and Network Applications (NaNA …, 2016 | 5 | 2016 |
A secured TPM integration scheme towards smart embedded system based collaboration network D Lu, R Han, Y Wang, Y Wang, X Dong, X Ma, T Li, J Ma Computers & Security 97, 101922, 2020 | 4 | 2020 |
Towards primary user sybil-proofness for online spectrum auction in dynamic spectrum access X Dong, Q Kang, Q Yao, D Lu, Y Xu, J Liu IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1439-1448, 2020 | 4 | 2020 |
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing X Dong, G Li, T Zhang, D Lu, Y Shen, J Ma World Wide Web 23, 1035-1055, 2020 | 4 | 2020 |
Building a secure scheme for a trusted hardware sharing environment D Lu, J Ma, C Sun, Q Wu, Z Sun, N Xi IEEE Access 5, 20260-20271, 2017 | 4 | 2017 |
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing D Lu, J Ma, C Sun, X Ma, N Xi Science China. Information Sciences 60 (5), 52103, 2017 | 4 | 2017 |
BejaGNN: behavior-based Java malware detection via graph neural network P Feng, L Yang, D Lu, N Xi, J Ma The Journal of Supercomputing 79 (14), 15390-15414, 2023 | 3 | 2023 |
Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model H Qiao, Y Liu, X Dong, D Lu 2019 International Conference on Networking and Network Applications (NaNA …, 2019 | 3 | 2019 |