A trust-based collaborative filtering algorithm for E-commerce recommendation system L Jiang, Y Cheng, L Yang, J Li, H Yan, X Wang Journal of ambient intelligence and humanized computing 10, 3023-3034, 2019 | 235 | 2019 |
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks Q Jiang, J Ma, G Li, L Yang Wireless personal communications 68, 1477-1491, 2013 | 137 | 2013 |
Security analysis and improvement of bio-hashing based three-factor authentication scheme for telecare medical information systems Q Jiang, Z Chen, B Li, J Shen, L Yang, J Ma Journal of Ambient Intelligence and Humanized Computing 9, 1061-1073, 2018 | 109 | 2018 |
An efficient ticket based authentication protocol with unlinkability for wireless access networks Q Jiang, J Ma, G Li, L Yang Wireless personal communications 77, 1489-1506, 2014 | 73 | 2014 |
Integrated authentication and key agreement framework for vehicular cloud computing Q Jiang, J Ni, J Ma, L Yang, X Shen IEEE Network 32 (3), 28-35, 2018 | 66 | 2018 |
A remotely keyed file encryption scheme under mobile cloud computing L Yang, Z Han, Z Huang, J Ma Journal of Network and Computer Applications 106, 90-99, 2018 | 64 | 2018 |
Identifying opinion leader nodes in online social networks with a new closeness evaluation algorithm L Yang, Y Qiao, Z Liu, J Ma, X Li Soft Computing 22, 453-464, 2018 | 63 | 2018 |
Mutual Authentication Scheme with Smart Cards and Password under Trusted Computing. L Yang, J Ma, Q Jiang Int. J. Netw. Secur. 14 (3), 156-163, 2012 | 45 | 2012 |
Online handwritten signature verification using feature weighting algorithm relief L Yang, Y Cheng, X Wang, Q Liu Soft Computing 22, 7811-7823, 2018 | 41 | 2018 |
On the control of opinion dynamics in social networks Z Liu, J Ma, Y Zeng, L Yang, Q Huang, H Wu Physica A: Statistical Mechanics and its Applications 409, 183-198, 2014 | 38 | 2014 |
Dynamic dual threshold cooperative spectrum sensing for cognitive radio under noise power uncertainty R Wan, L Ding, N Xiong, W Shu, L Yang Human-centric Computing and Information Sciences 9, 1-21, 2019 | 35 | 2019 |
Identifying opinion leaders in social networks with topic limitation L Yang, Y Tian, J Li, J Ma, J Zhang Cluster Computing 20, 2403-2413, 2017 | 35 | 2017 |
Iot etei: End-to-end iot device identification method F Yin, L Yang, Y Wang, J Dai 2021 IEEE conference on dependable and secure computing (DSC), 1-8, 2021 | 29 | 2021 |
A DNS tunneling detection method based on deep learning models to prevent data exfiltration J Zhang, L Yang, S Yu, J Ma Network and System Security: 13th International Conference, NSS 2019 …, 2019 | 29 | 2019 |
Toward better data veracity in mobile cloud computing: A context-aware and incentive-based reputation mechanism H Lin, J Hu, Y Tian, L Yang, L Xu Information Sciences 387, 238-253, 2017 | 26 | 2017 |
Robust two-factor authentication and key agreement preserving user privacy Q Jiang, J Ma, G Li, L Yang International Journal of Network Security 16 (3), 229-240, 2014 | 26 | 2014 |
SADUS: Secure data deletion in user space for mobile devices L Yang, T Wei, F Zhang, J Ma computers & security 77, 612-626, 2018 | 16 | 2018 |
Online handwritten signature verification based on the most stable feature and partition L Yang, X Jin, Q Jiang Cluster Computing 22, 1691-1701, 2019 | 14 | 2019 |
Direct anonymous attestation scheme in cross trusted domain for wireless mobile networks 杨力, 马建峰, 姜奇 Journal of Software 23 (5), 1260-1271, 2012 | 13 | 2012 |
A delegation based cross trusted domain direct anonymous attestation scheme L Yang, J Ma, W Lou, Q Jiang Computer Networks 81, 245–257, 2015 | 12 | 2015 |