Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing Q Lu, Y Xiong, X Gong, W Huang Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012 | 30 | 2012 |
Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation X Gong, Y Xiong, W Huang, L Chen, Q Lu, Y Hu Database Systems for Advanced Applications, 108-124, 2015 | 15 | 2015 |
A distributed ECC-DSS authentication scheme based on CRT-VSS and trusted computing in MANET Q Lu, Y Xiong, W Huang, X Gong, F Miao Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012 | 12 | 2012 |
Collaborative outsourced data mining for secure cloud computing Y Huang, Q Lu, Y Xiong Journal of Networks 9 (10), 2655-2664, 2014 | 10 | 2014 |
Fine-grained Refinement on TPM-based Protocol Applications W Huang, Y Xiong, X Wang, F Miao, C Wu, X Gong, Q Lu IEEE Transactions on Information Forensics and Security 8 (6), 1013-1026, 2013 | 10 | 2013 |
Privacy-Preserving Collaborative Filtering Based on Time-Drifting Characteristic F ZHAO, Y XIONG, X LIANG, X GONG, Q LU Chinese Journal of Electronics 25 (1), 2016 | 8 | 2016 |
Node behavior and identity-based trusted authentication in wireless sensor networks T LIU, Y XIONG, W HUANG, Q LU, X GONG Journal of Computer Applications 7, 017, 2013 | 5 | 2013 |
A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics X GONG, Y XIONG, Q LU, F MIAO, W HUANG Chinese Journal of Electronics 22 (1), 2013 | 5 | 2013 |
A trusted fair non-repudiation protocol based on dynamic third party in mobile ad hoc networks CY Wu, Y Xiong, WC Huang, QW Lu, XD Gong Chinese Journal of Electronics 41 (2), 227-232, 2013 | 3 | 2013 |
A Secure Adaptive Routing Strategy Using Immune Mechanism in MANET Y Hu, Y Xiong, Q Lu, X Gong, W Huang Chinese Journal of Electronics 22 (4), 2013 | 2 | 2013 |
Study on sagitta morphology of Chilean jack mackerel (Trachurus murphyi) in the southeast Pacific Ocean C WU, X ZOU, M ZHANG, W ZHANG, B ZHOU, Q LU, S XU Journal of Shanghai Ocean University 6, 016, 2011 | 2 | 2011 |
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET X Wang, Q Lu, Y Xiong, F Miao, W Huang, T LIU, X WU Chinese Journal of Electronics 23 (2), 2014 | 1 | 2014 |
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism Y Hu, Y Xiong, X Gong, Q Lu, M Li, W Huang Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 …, 2013 | | 2013 |
Based on Chaos PSO algorithm optimize RBF network intrusion detection Y Wang, Y Xiong, X Gong, Q Lu Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) 49 (10 …, 2013 | | 2013 |
Dependable data survival scheme based on Chinese remainder theorem weighted threshold secret sharing in unattended WSN M Han, Y Xiong, Q Lu, X Gong, T Liu Jisuanji Yingyong/ Journal of Computer Applications 33 (5), 1343-1346, 2013 | | 2013 |
Fine-grained Refinement on TPM-based Protocol Applications (Extended Version) W Huang, Y Xiong, X Wang, F Miao, C Wu, XD Gong, Q Lu | | 2013 |
Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization. S Liu, Y Xiong, Q Lu, W Huang IJCCI, 133-143, 2012 | | 2012 |
Ad hoc network clock synchronization QI Lu, C Wu Application Research of Computers 12, 082, 2011 | | 2011 |
The Application of SAVR2000 Excitation System in DaTun Mining Generators G XING, Q LU Journal of North China Institute of Science and Technology 3, 018, 2009 | | 2009 |