Hadoop eco system for big data security and privacy P Adluru, SS Datla, X Zhang 2015 Long Island Systems, Applications and Technology, 1-6, 2015 | 42 | 2015 |
Data visualization for wireless sensor networks using ThingsBoard M Henschke, X Wei, X Zhang 2020 29th Wireless and Optical Communications Conference (WOCC), 1-6, 2020 | 29 | 2020 |
Hash function‐based secret sharing scheme designs CS Chum, X Zhang Security and communication networks 6 (5), 584-592, 2013 | 23 | 2013 |
Periodic sweep coverage scheme based on periodic vehicle routing problem L Shu, K Cheng, X Zhang, J Zhou Journal of Networks 9 (3), 726, 2014 | 19 | 2014 |
A study of distortion effects on fingerprint matching Q Gao, X Zhang Computer Science and Engineering 2 (3), 37-42, 2012 | 15 | 2012 |
Looking at a class of RFID APs through GNY logic X Zhang, Q Gao, MK Saad International Journal of Security and Networks 5 (2-3), 135-146, 2010 | 15 | 2010 |
Design and build a secure e-voting infrastructure A Hassan, X Zhang 2013 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2013 | 14 | 2013 |
The Latin squares and the secret sharing schemes CS Chum, X Zhang Walter de Gruyter GmbH & Co. KG 2 (2), 175-202, 2010 | 14 | 2010 |
Domain-specific ontology concept extraction and hierarchy extension G Zhao, X Zhang Proceedings of the 2nd International Conference on Natural Language …, 2018 | 12 | 2018 |
A proposed alternative to the Shamir secret sharing scheme CS Chum, B Fine, G Rosenberger, X Zhang Contemp. Math 582, 47-50, 2012 | 12 | 2012 |
Implementation of randomize-then-combine constructed hash function CS Chum, C Jun, X Zhang 2014 23rd Wireless and Optical Communication Conference (WOCC), 1-6, 2014 | 11 | 2014 |
A new bloom filter structure for searchable encryption schemes CS Chum, X Zhang Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 9 | 2017 |
An efficient, hybrid, double-hash stringmatching algorithm M Bicer, X Zhang 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2019 | 7 | 2019 |
A domain-specific web document re-ranking algorithm G Zhao, X Zhang 2017 6th IIAI International Congress on Advanced Applied Informatics (IIAI …, 2017 | 7 | 2017 |
Experiments for leveled RFID localization for indoor stationary objects M Chan, X Zhang 2014 11th International Conference on Information Technology: New …, 2014 | 7 | 2014 |
Finding hash collisions using MPI on HPC clusters M Cantu, J Kim, X Zhang 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2017 | 6 | 2017 |
Implementations of a hash function based secret sharing scheme CS Chum, X Zhang Journal of Applied Security Research 10 (4), 525-542, 2015 | 6 | 2015 |
Implementation and performance testing of the SQUASH RFID authentication protocol P Koshy, J Valentin, X Zhang 2010 IEEE Long Island Systems, Applications and Technology Conference, 1-5, 2010 | 6 | 2010 |
Applying hash functions in the Latin square based secret sharing schemes C Chum, X Zhang Proc. of The 2010 International Conference on Security and Management (SAM …, 2010 | 6 | 2010 |
Post-quantum key exchange protocols X Li, L Leung, ACT Kwan, X Zhang, D Kahanda, M Anshel Quantum Information and Computation IV 6244, 164-174, 2006 | 6 | 2006 |