An effective method for 3D geological modeling with multi-source data integration Q Wu, H Xu, X Zou Computers & geosciences 31 (1), 35-43, 2005 | 384 | 2005 |
A hierarchical modeling and analysis for grid service reliability YS Dai, Y Pan, X Zou IEEE Transactions on Computers 56 (5), 681-691, 2007 | 133 | 2007 |
A practical and flexible key management mechanism for trusted collaborative computing X Zou, YS Dai, E Bertino IEEE INFOCOM 2008-The 27th Conference on Computer Communications, 538-546, 2008 | 115 | 2008 |
Secure group communications over data networks X Zou, B Ramamurthy, SS Magliveras Springer Science & Business Media, 2004 | 103 | 2004 |
Routing techniques in wireless ad hoc networks classification and comparison X Zou, B Ramamurthy, S Magliveras Proceedings of the Sixth World Multiconference on Systemics, Cybernetics and …, 2002 | 103 | 2002 |
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces W Peng, F Li, CT Huang, X Zou 2014 IEEE International Conference on Communications (ICC), 804-809, 2014 | 101 | 2014 |
Hierarchy-based access control in distributed environments JC Birget, X Zou, G Noubir, B Ramamurthy ICC 2001. IEEE International Conference on Communications. Conference Record …, 2001 | 90 | 2001 |
A two-stage deanonymization attack against anonymized social networks W Peng, F Li, X Zou, J Wu IEEE Transactions on computers 63 (2), 290-303, 2012 | 71 | 2012 |
A proactive secret sharing scheme in matrix projection method L Bai, XK Zou International journal of security and networks 4 (4), 201-209, 2009 | 66 | 2009 |
Chinese remainder theorem based hierarchical access control for secure group communication X Zou, B Ramamurthy, SS Magliveras International Conference on Information and Communications Security, 381-385, 2001 | 65 | 2001 |
New threats to health data privacy F Li, X Zou, P Liu, JY Chen BMC bioinformatics 12, 1-7, 2011 | 61 | 2011 |
CRTDH: an efficient key agreement scheme for secure group communications in wireless ad hoc networks RK Balachandran, B Ramamurthy, X Zou, NV Vinodchandran IEEE International Conference on Communications, 2005. ICC 2005. 2005 2 …, 2005 | 59 | 2005 |
KeyRev: An efficient key revocation scheme for wireless sensor networks Y Wang, B Ramamurthy, X Zou 2007 IEEE International Conference on Communications, 1260-1265, 2007 | 57 | 2007 |
DGKD: Distributed group key distribution with authentication capability P Adusumilli, X Zou, B Ramamurthy Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop …, 2005 | 52 | 2005 |
The performance of elliptic curve based group diffie-hellman protocols for secure group communication over ad hoc networks Y Wang, B Ramamurthy, X Zou 2006 IEEE International Conference on Communications 5, 2243-2248, 2006 | 51 | 2006 |
Design and analysis of a highly user-friendly, secure, privacy-preserving, and revocable authentication method Y Sui, X Zou, EY Du, F Li IEEE Transactions on Computers 63 (4), 902-916, 2013 | 48 | 2013 |
A robust and stateless self-healing group key management scheme X Zou, YS Dai 2006 International Conference on Communication Technology, 1-4, 2006 | 44 | 2006 |
Local differential privately anonymizing online social networks under hrg-based model T Gao, F Li, Y Chen, XK Zou IEEE Transactions on Computational Social Systems 5 (4), 1009-1020, 2018 | 40 | 2018 |
Behavioral malware detection in delay tolerant networks W Peng, F Li, X Zou, J Wu IEEE Transactions on Parallel and Distributed systems 25 (1), 53-63, 2013 | 40 | 2013 |
A taxonomy of privilege escalation attacks in Android applications M Rangwala, P Zhang, X Zou, F Li International Journal of Security and Networks 9 (1), 40-55, 2014 | 36 | 2014 |