Follow
Zhongyuan Qin
Zhongyuan Qin
Unknown affiliation
Verified email at seu.edu.cn
Title
Cited by
Cited by
Year
Survey on securing data storage in the cloud
CT Huang, L Huang, Z Qin, H Yuan, L Zhou, V Varadharajan, CCJ Kuo
APSIPA Transactions on Signal and Information Processing 3, e7, 2014
1082014
Multimedia storage security in cloud computing: An overview
CT Huang, Z Qin, CCJ Kuo
2011 IEEE 13th International Workshop on Multimedia Signal Processing, 1-6, 2011
312011
An efficient identity-based key management scheme for wireless sensor networks using the bloom filter
Z Qin, X Zhang, K Feng, Q Zhang, J Huang
Sensors 14 (10), 17937-17951, 2014
252014
An efficient key management scheme based on ECC and AVL tree for large scale wireless sensor networks
Z Qin, X Zhang, K Feng, Q Zhang, J Huang
International Journal of Distributed Sensor Networks 11 (9), 691498, 2015
232015
Malware detection in smartphone using hidden Markov model
K Xin, G Li, Z Qin, Q Zhang
2012 fourth international conference on multimedia information networking …, 2012
222012
Trends and brief comments on anti-collision techniques in radio frequency identification system
B Liang, AQ Hu, ZY Qin
The 6th International conference on ITS Telecommunications, Chengdu, China …, 2006
162006
A novel design for RFID anti-collision technique
B Liang, A Hu, Z Qin
电子与信息学报 29 (9), 2158-2160, 2007
122007
Semantic repository modeling in image database
R Zhang, Z Zhang, Z Qin
2004 IEEE International Conference on Multimedia and Expo (ICME)(IEEE Cat …, 2004
82004
Android malware detection based on permission and behavior analysis
Z Qin, Y Xu, Y Di, Q Zhang, J Huang
IET Digital Library, 2014
72014
Mobile phone viruses detection based on HMM
Z Qin, N Chen, Q Zhang, Y Di
2011 Third International Conference on Multimedia Information Networking and …, 2011
72011
Adversarial samples generation based on rmsprop
Y Yu, L Zhang, L Chen, Z Qin
2021 IEEE 6th International Conference on Signal and Image Processing (ICSIP …, 2021
52021
Android malware detection based on multi-level signature matching [J]
Z QIN, Z WANG, F WU
Application Research of Computers 33 (3), 891-895, 2016
52016
An efficient method of detecting repackaged android applications
Z Qin, X Zhang, Q Zhang, Z Yang
International conference on cyberspace technology (CCT 2014), 1-4, 2014
52014
A novel identity-based security scheme for wireless sensor networks
Z Qin, K Feng, S Hu, L Tao, Z Hu, X Zhang, J Huang
2014 Tenth International Conference on Computational Intelligence and …, 2014
42014
Detecting repackaged android applications
Z Qin, Z Yang, Y Di, Q Zhang, X Zhang, Z Zhang
Computer Engineering and Networking: Proceedings of the 2013 International …, 2014
42014
Cloud storage retrievability based on third party audit
Q Zhongyuan, S Yunyan, Z Qunfang, H Jie
1st International Workshop on Cloud Computing and Information Security, 303-307, 2013
42013
Di Y. State-of-the-art virtualization security in cloud computing
Z Qin, Q Zhang, C Wan
J Inf Comput Sci 9 (6), 1487-97, 2012
42012
An efficient scheme of detecting repackaged android applications
Z QIN, W PAN, Y XU, K FENG, Z YANG
ZTE Communications 14 (3), 60-66, 2019
32019
A key pre-distribution scheme based on multiple key spaces in wireless sensor networks
Y Wang, Z Qin, Q Zhang, H Wang, J Huang
2014 Tenth International Conference on Computational Intelligence and …, 2014
32014
A 3D Modeling Scheme for Cerebral Vasculature from MRA Datasets.
Z Qin, X Mou, R Zhang
CBMS, 346-, 2003
32003
The system can't perform the operation now. Try again later.
Articles 1–20