Survey on securing data storage in the cloud CT Huang, L Huang, Z Qin, H Yuan, L Zhou, V Varadharajan, CCJ Kuo APSIPA Transactions on Signal and Information Processing 3, e7, 2014 | 108 | 2014 |
Multimedia storage security in cloud computing: An overview CT Huang, Z Qin, CCJ Kuo 2011 IEEE 13th International Workshop on Multimedia Signal Processing, 1-6, 2011 | 31 | 2011 |
An efficient identity-based key management scheme for wireless sensor networks using the bloom filter Z Qin, X Zhang, K Feng, Q Zhang, J Huang Sensors 14 (10), 17937-17951, 2014 | 25 | 2014 |
An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks Z Qin, X Zhang, K Feng, Q Zhang, J Huang International Journal of Distributed Sensor Networks 11 (9), 691498, 2015 | 23 | 2015 |
Malware detection in smartphone using hidden Markov model K Xin, G Li, Z Qin, Q Zhang 2012 fourth international conference on multimedia information networking …, 2012 | 22 | 2012 |
Trends and brief comments on anti-collision techniques in radio frequency identification system B Liang, AQ Hu, ZY Qin The 6th International conference on ITS Telecommunications, Chengdu, China …, 2006 | 16 | 2006 |
A novel design for RFID anti-collision technique B Liang, A Hu, Z Qin 电子与信息学报 29 (9), 2158-2160, 2007 | 12 | 2007 |
Semantic repository modeling in image database R Zhang, Z Zhang, Z Qin 2004 IEEE International Conference on Multimedia and Expo (ICME)(IEEE Cat …, 2004 | 8 | 2004 |
Android malware detection based on permission and behavior analysis Z Qin, Y Xu, Y Di, Q Zhang, J Huang IET Digital Library, 2014 | 7 | 2014 |
Mobile phone viruses detection based on HMM Z Qin, N Chen, Q Zhang, Y Di 2011 Third International Conference on Multimedia Information Networking and …, 2011 | 7 | 2011 |
Adversarial samples generation based on rmsprop Y Yu, L Zhang, L Chen, Z Qin 2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP …, 2021 | 5 | 2021 |
Android malware detection based on multi-level signature matching [J] Z QIN, Z WANG, F WU Application Research of Computers 33 (3), 891-895, 2016 | 5 | 2016 |
An efficient method of detecting repackaged android applications Z Qin, X Zhang, Q Zhang, Z Yang International conference on cyberspace technology (CCT 2014), 1-4, 2014 | 5 | 2014 |
A novel identity-based security scheme for wireless sensor networks Z Qin, K Feng, S Hu, L Tao, Z Hu, X Zhang, J Huang 2014 Tenth International Conference on Computational Intelligence and …, 2014 | 4 | 2014 |
Detecting repackaged android applications Z Qin, Z Yang, Y Di, Q Zhang, X Zhang, Z Zhang Computer Engineering and Networking: Proceedings of the 2013 International …, 2014 | 4 | 2014 |
Cloud storage retrievability based on third party audit Q Zhongyuan, S Yunyan, Z Qunfang, H Jie 1st International Workshop on Cloud Computing and Information Security, 303-307, 2013 | 4 | 2013 |
Di Y. State-of-the-art virtualization security in cloud computing Z Qin, Q Zhang, C Wan J Inf Comput Sci 9 (6), 1487-97, 2012 | 4 | 2012 |
An efficient scheme of detecting repackaged android applications Z QIN, W PAN, Y XU, K FENG, Z YANG ZTE Communications 14 (3), 60-66, 2019 | 3 | 2019 |
A key pre-distribution scheme based on multiple key spaces in wireless sensor networks Y Wang, Z Qin, Q Zhang, H Wang, J Huang 2014 Tenth International Conference on Computational Intelligence and …, 2014 | 3 | 2014 |
A 3D Modeling Scheme for Cerebral Vasculature from MRA Datasets. Z Qin, X Mou, R Zhang CBMS, 346-, 2003 | 3 | 2003 |