Identifying influential spreaders by gravity model Z Li, T Ren, X Ma, S Liu, Y Zhang, T Zhou Scientific reports 9 (1), 8387, 2019 | 196 | 2019 |
NHL Pathological Image Classification Based on Hierarchical Local Information and GoogLeNet‐Based Representations J Bai, H Jiang, S Li, X Ma BioMed research international 2019 (1), 1065652, 2019 | 39 | 2019 |
Implementation of hybrid artificial intelligence technique to detect covert channels attack in new generation internet protocol IPv6 A Salih, X Ma, E Peytchev Leadership, Innovation and Entrepreneurship as Driving Forces of the Global …, 2017 | 22 | 2017 |
A healthcare-driven framework for facilitating the secure sharing of data across organisational boundaries T Solomonides Global Healthgrid: E-Science Meets Biomedical Informatics: Proceedings of …, 2008 | 17* | 2008 |
Analysing and attacking the 4-way handshake of IEEE 802.11 i standard A Alabdulatif, X Ma, L Nolle 8th International Conference for Internet Technology and Secured …, 2013 | 16 | 2013 |
Security concerns in cloud computing X Ma 2012 Fourth International Conference on Computational and Information …, 2012 | 16 | 2012 |
Construction of pancreatic cancer classifier based on SVM optimized by improved FOA H Jiang, D Zhao, R Zheng, X Ma BioMed research international 2015 (1), 781023, 2015 | 15 | 2015 |
Transfer learning and fusion model for classification of epileptic pet images H Jiang, F Gao, X Duan, Z Bai, Z Wang, X Ma, YW Chen Innovation in Medicine and Healthcare Systems, and Multimedia: Proceedings …, 2019 | 9 | 2019 |
Verifying and fixing password authentication protocol X Ma, R McCrindle, X Cheng Seventh ACIS International Conference on Software Engineering, Artificial …, 2006 | 9 | 2006 |
Biometric identity-based cryptography for e-Government environment D Aljeaid, X Ma, C Langensiepen 2014 Science and Information Conference, 581-588, 2014 | 7 | 2014 |
Verifying security protocols by knowledge analysis X Ma, X Cheng International Journal of Security and Networks 3 (3), 183-192, 2008 | 7 | 2008 |
New intelligent heuristic algorithm to mitigate security vulnerabilities in IPv6 A Salih, X Ma, E Peytchev IJIS International Journal of Information Security 4, 2015 | 6 | 2015 |
Managing identities in cloud computing environments X Ma 2015 2nd International Conference on Information Science and Control …, 2015 | 5 | 2015 |
Analysis of security protocols using finite-state machines D Aljeaid, X Ma, C Langensiepen International Journal of Advanced Research in Artificial Intelligence …, 2015 | 5 | 2015 |
Analysing the EAP-TLS Handshake and the 4-Way Handshake of the 802.11 i Standard A Alabdulatif, X Ma International Journal for Information Security Research (IJISR) 3 (34), 439-448, 2013 | 5 | 2013 |
Formal verification of the Merchant Registration phase of the SET protocol XQ Ma, XC Cheng International Journal of Automation and Computing 2 (2), 155-162, 2005 | 5 | 2005 |
A mobile agent based spam filter system X Cheng, X Ma, L Wang, S Zhong Computational Intelligence and Security: International Conference, CIS 2005 …, 2005 | 5 | 2005 |
A framework for proving the correctness of cryptographic protocol properties by linear temporal logic X Ma International Journal of Digital Society (IJDS) 41 (12), 749-757, 2013 | 3 | 2013 |
Knowledge based approach for mechanically verifying security protocols X Ma, X Cheng, R McCrindle INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE 19, 1572, 2005 | 3 | 2005 |
An exploratory data analysis of the network behavior of hive home devices A Wali, O Apejoye, J He, X Ma 2021 8th International Conference on Internet of Things: Systems, Management …, 2021 | 2 | 2021 |