Private blockchain-based secure access control for smart home systems J Xue, C Xu, Y Zhang KSII Transactions on Internet and Information Systems (TIIS) 12 (12), 6057-6078, 2018 | 74 | 2018 |
Spatio-temporal trend analysis of rainfall and temperature extremes in the Vea Catchment, Ghana I Larbi, FCC Hountondji, T Annor, WA Agyare, J Mwangi Gathenya, ... Climate 6 (4), 87, 2018 | 67 | 2018 |
The Hippo pathway regulates caveolae expression and mediates flow response via caveolae V Rausch, JR Bostrom, J Park, IR Bravo, Y Feng, DC Hay, BA Link, ... Current Biology 29 (2), 242-255. e6, 2019 | 62 | 2019 |
Chemical Modulation of in Vivo Macrophage Function with Subpopulation-Specific Fluorescent Prodrug Conjugates A Fernandez, M Vermeren, D Humphries, R Subiros-Funosas, N Barth, ... ACS Central Science 3 (9), 995-1005, 2017 | 62 | 2017 |
Identity-based public verification with privacy-preserving for data storage security in cloud computing J Zhao, C Xu, F Li, W Zhang IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 60 | 2013 |
Cryptographic public verification of data integrity for cloud storage systems Y Zhang, C Xu, H Li, X Liang IEEE Cloud Computing 3 (5), 44-52, 2016 | 58 | 2016 |
A secure ECC-based RFID mutual authentication protocol to enhance patient medication safety C Jin, C Xu, X Zhang, F Li Journal of medical systems 40, 1-6, 2016 | 58 | 2016 |
Secure outsourcing SIFT: Efficient and privacy-preserving image feature extraction in the encrypted domain L Jiang, C Xu, X Wang, B Luo, H Wang IEEE Transactions on Dependable and Secure Computing 17 (1), 179-193, 2017 | 57 | 2017 |
Wound healing in zebrafish P Martin, Y Feng Nature 459 (7249), 921-923, 2009 | 55 | 2009 |
Designated verifier proxy signature scheme without random oracles Y Yu, C Xu, X Zhang, Y Liao Computers & Mathematics with Applications 57 (8), 1352-1364, 2009 | 55 | 2009 |
Pivotal role of hmx2 and hmx3 in zebrafish inner ear and lateral line development Y Feng, Q Xu Developmental biology 339 (2), 507-518, 2010 | 54 | 2010 |
Secure password-protected encryption key for deduplicated cloud storage systems Y Zhang, C Xu, N Cheng, X Shen IEEE Transactions on Dependable and Secure Computing 19 (4), 2789-2806, 2021 | 53 | 2021 |
Detecting Changes in Hydro-Climatic Variables during the Last Four Decades (1975-2014) on Downstream Kaduna River Catchment, Nigeria C Okafor, OD Jimoh, I Larbi Atmosphere and Climate Science, 2017 | 53 | 2017 |
An efficient anonymous proxy signature scheme with provable security Y Yu, C Xu, X Huang, Y Mu Computer Standards & Interfaces 31 (2), 348-353, 2009 | 53 | 2009 |
A secure RFID mutual authentication protocol for healthcare environments using elliptic curve cryptography C Jin, C Xu, X Zhang, J Zhao Journal of medical systems 39, 1-8, 2015 | 52 | 2015 |
Commodity options purchasing and credit financing under capital constraint Y Feng, Y Mu, B Hu, A Kumar International Journal of Production Economics 153, 230-237, 2014 | 51 | 2014 |
Prevalence of psychiatric diagnosis and related psychopathological symptoms among patients with COVID-19 during the second wave of the pandemic Z Zhang, Y Feng, R Song, D Yang, X Duan Globalization and health 17, 1-12, 2021 | 50 | 2021 |
Imaging innate immune responses at tumour initiation: new insights from fish and flies Y Feng, P Martin Nature Reviews Cancer 15 (9), 556-562, 2015 | 50 | 2015 |
Coronin-1C and RCC2 guide mesenchymal migration by trafficking Rac1 and controlling GEF exposure RC Williamson, CAM Cowell, CL Hammond, DJM Bergen, JA Roper, ... Journal of cell science 127 (19), 4292-4307, 2014 | 49 | 2014 |
Proteolytic and opportunistic breaching of the basement membrane zone by immune cells during tumor initiation MCW van den Berg, L MacCarthy-Morrogh, D Carter, J Morris, IR Bravo, ... Cell reports 27 (10), 2837-2846. e4, 2019 | 47 | 2019 |