Understanding information interactions in diffusion: an evolutionary game-theoretic perspective
SU, Yuan, ZHANG, Xi, LIU, Lixin, SONG, Shouyou, FANG, Binxing
Published in Frontiers of Computer Science (01.06.2016)
Published in Frontiers of Computer Science (01.06.2016)
Get full text
Journal Article
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems
Wang, Guofeng, Liu, Chuanyi, Dong, Yingfei, Choo, Kim-Kwang Raymond, Han, Peiyi, Pan, Hezhong, Fang, Binxing
Published in IEEE access (01.01.2018)
Published in IEEE access (01.01.2018)
Get full text
Journal Article
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker’s Perspective
Song, Xiaobao, Wang, Guofeng, Binxing, Fang, Liu, Chuanyi, Han, Peiyi, Wan, Lei
Published in Scientific programming (01.01.2016)
Published in Scientific programming (01.01.2016)
Get full text
Journal Article
Erratum: Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach [IEICE Transactions on Information and Systems Vol.E100.D (2017) , No.10 pp.2307-2318]
ZHAN, Dongyang, YE, Lin, FANG, Binxing, DU, Xiaojiang, XU, Zhikai
Published in IEICE Transactions on Information and Systems (01.06.2018)
Published in IEICE Transactions on Information and Systems (01.06.2018)
Get full text
Journal Article
Performance analysis of topic detection algorithms in distributed environment
Lu DENG, Yan JIA, Binxing FANG, Bin ZHOU, Tao ZHANG, Xin LIU
Published in Tongxin Xuebao (25.08.2018)
Published in Tongxin Xuebao (25.08.2018)
Get full text
Journal Article
An approximate search framework for big data
Shang Li, Zhigang Zhou, Hongli Zhang, Binxing Fang
Published in 2017 IEEE International Conference on Communications (ICC) (01.05.2017)
Published in 2017 IEEE International Conference on Communications (ICC) (01.05.2017)
Get full text
Conference Proceeding
Geometric Name Routing for ICN in Dynamic World
Sun, Yanbin, Zhang, Yu, Su, Shen, Zhang, Hongli, Fang, Binxing
Published in China communications (01.07.2015)
Published in China communications (01.07.2015)
Get full text
Journal Article
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach
ZHAN, Dongyang, YE, Lin, FANG, Binxing, DU, Xiaojiang, XU, Zhikai
Published in IEICE Transactions on Information and Systems (01.01.2017)
Published in IEICE Transactions on Information and Systems (01.01.2017)
Get full text
Journal Article
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI
Dongyang Zhan, Lin Ye, Binxing Fang, Xiaojiang Du, Shen Su
Published in 2016 IEEE International Conference on Communications (ICC) (01.05.2016)
Published in 2016 IEEE International Conference on Communications (ICC) (01.05.2016)
Get full text
Conference Proceeding
Modeling Multi-factor Sequential User Behavior Data over Social Networks
Wang, Peng, Zhang, Peng, Zhou, Chuan, Guo, Li, Fang, Binxing, Yang, Tao
Published in Chinese Journal of Electronics (01.03.2016)
Published in Chinese Journal of Electronics (01.03.2016)
Get full text
Journal Article
A closer look at Eclipse attacks against Tor hidden services
Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang
Published in 2017 IEEE International Conference on Communications (ICC) (01.05.2017)
Published in 2017 IEEE International Conference on Communications (ICC) (01.05.2017)
Get full text
Conference Proceeding
A large scale code resolution service network in the Internet of Things
Yu, Haining, Zhang, Hongli, Fang, Binxing, Yu, Xiangzhan
Published in Sensors (Basel, Switzerland) (01.11.2012)
Published in Sensors (Basel, Switzerland) (01.11.2012)
Get full text
Journal Article
T-YUN: Trustworthiness Verification and Audit on the Cloud Providers
LIU, Chuanyi, LIN, Jie, FANG, Binxing
Published in IEICE Transactions on Information and Systems (2013)
Published in IEICE Transactions on Information and Systems (2013)
Get full text
Journal Article
Hunting abnormal configurations for permission-sensitive role mining
Lihua Yin, Liang Fang, Ben Niu, Binxing Fang, Fenghua Li
Published in MILCOM 2016 - 2016 IEEE Military Communications Conference (01.11.2016)
Published in MILCOM 2016 - 2016 IEEE Military Communications Conference (01.11.2016)
Get full text
Conference Proceeding
Utility-based cooperative decision in cooperative authentication
Guo Yunchuan, Yin Lihua, Liu Licai, Fang Binxing
Published in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (01.04.2014)
Published in IEEE INFOCOM 2014 - IEEE Conference on Computer Communications (01.04.2014)
Get full text
Conference Proceeding
A Strategy Optimization Approach for Mission Deployment in Distributed Systems
Yi, Gao, Binxing, Fang, Yuyu, Yuan, Xiaojian, Liu
Published in Mathematical problems in engineering (01.01.2014)
Published in Mathematical problems in engineering (01.01.2014)
Get full text
Journal Article