APPLET: A privacy-preserving framework for location-aware recommender system X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu Science China Information Sciences 60 (9), 1-16, 2017 | 44 | 2017 |
xTSeH: A Trusted Platform Module Sharing Scheme towards Smart IoT-eHealth Devices D Lu, R Han, Y Shen, X Dong, J Ma, X Du, M Guizani IEEE Journal on Selected Areas in Communications, 2020 | 27 | 2020 |
Preserving geo-indistinguishability of the primary user in dynamic spectrum sharing X Dong, T Zhang, D Lu, G Li, Y Shen, J Ma IEEE Transactions on Vehicular Technology 68 (9), 8881-8892, 2019 | 18 | 2019 |
Android malware detection based on call graph via graph neural network P Feng, J Ma, T Li, X Ma, N Xi, D Lu 2020 International Conference on Networking and Network Applications (NaNA …, 2020 | 17 | 2020 |
A universal fairness evaluation framework for resource allocation in cloud computing D Lu, J Ma, N Xi China Communications 12 (5), 113-122, 2015 | 16 | 2015 |
From high-availability to collapse: quantitative analysis of “cloud-droplet-freezing” attack threats to virtual machine migration in cloud computing Y Wang, J Ma, D Lu, X Lu, L Zhang Cluster computing 17, 1369-1381, 2014 | 14 | 2014 |
Android malware detection via graph representation learning P Feng, J Ma, T Li, X Ma, N Xi, D Lu Mobile Information Systems 2021, 1-14, 2021 | 12 | 2021 |
Information flow control on encrypted data for service composition among multiple clouds N Xi, J Ma, C Sun, D Lu, Y Shen Distributed and Parallel Databases 36, 511-527, 2018 | 7 | 2018 |
Smaug: A TEE-assisted secured SQLite for embedded systems D Lu, M Shi, X Ma, X Liu, R Guo, T Zheng, Y Shen, X Dong, J Ma IEEE Transactions on Dependable and Secure Computing, 2022 | 5 | 2022 |
An incentive mechanism with bid privacy protection on multi-bid crowdsourced spectrum sensing X Dong, G Li, T Zhang, D Lu, Y Shen, J Ma World Wide Web 23, 1035-1055, 2020 | 4 | 2020 |
Building a secure scheme for a trusted hardware sharing environment D Lu, J Ma, C Sun, Q Wu, Z Sun, N Xi IEEE Access 5, 20260-20271, 2017 | 4 | 2017 |
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing D Lu, J Ma, C Sun, X Ma, N Xi Sci. China Inf. Sci 60 (5), 1-17, 2017 | 4 | 2017 |
Distributed secure service composition with declassification in mobile network N Xi, C Sun, J Ma, Y Shen, D Lu 2016 International Conference on Networking and Network Applications (NaNA …, 2016 | 4 | 2016 |
BejaGNN: behavior-based Java malware detection via graph neural network P Feng, L Yang, D Lu, N Xi, J Ma The Journal of Supercomputing 79 (14), 15390-15414, 2023 | 3 | 2023 |
A secured TPM integration scheme towards smart embedded system based collaboration network D Lu, R Han, Y Wang, Y Wang, X Dong, X Ma, T Li, J Ma Computers & Security 97, 101922, 2020 | 3 | 2020 |
Towards primary user Sybil-proofness for online spectrum auction in dynamic spectrum access X Dong, Q Kang, Q Yao, D Lu, Y Xu, J Liu IEEE INFOCOM 2020-IEEE Conference on Computer Communications, 1439-1448, 2020 | 3 | 2020 |
A two-dimensional Sybil-proof mechanism for dynamic spectrum access X Dong, Z You, Y Shen, D Lu, Y Xu, J Liu IEEE Transactions on Mobile Computing, 2022 | 2 | 2022 |
Personalized Recommendation for Cold-Start Users via Cluster-Level Latent Feature Model H Qiao, Y Liu, X Dong, D Lu 2019 International Conference on Networking and Network Applications (NaNA …, 2019 | 2 | 2019 |
Distributed secure service composition with declassification in mobile clouds N Xi, D Lu, C Sun, J Ma, Y Shen Mobile Information Systems 2017, 2017 | 2 | 2017 |
CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems C Ma, N Xi, D Lu, Y Feng, J Ma arXiv preprint arXiv:2309.05978, 2023 | 1 | 2023 |