Big Search in Cyberspace
Fang, Binxing, Jia, Yan, Li, Xiaoyong, Li, Aiping, Wu, Xindong
Published in IEEE transactions on knowledge and data engineering (01.09.2017)
Published in IEEE transactions on knowledge and data engineering (01.09.2017)
Get full text
Journal Article
A Method for Quantifying Global Network Topology Based on a Mathematical Model
Zhu, Jinyu, Zhang, Yu, Wang, Yunan, Zhang, Hongli, Fang, Binxing
Published in Mathematics (Basel) (01.10.2024)
Published in Mathematics (Basel) (01.10.2024)
Get full text
Journal Article
Framework for understanding intention-unbreakable malware
Ji, Tiantian, Fang, Binxing, Cui, Xiang, Wang, Zhongru, Liao, Peng, Song, Shouyou
Published in Science China. Information sciences (01.04.2023)
Published in Science China. Information sciences (01.04.2023)
Get full text
Journal Article
Predictive modeling of 30-day readmission risk of diabetes patients by logistic regression, artificial neural network, and EasyEnsemble
Xiang, Xiayu, Liu, Chuanyi, Zhang, Yanchun, Xiang, Wei, Fang, Binxing
Published in Asian Pacific journal of tropical medicine (01.09.2021)
Published in Asian Pacific journal of tropical medicine (01.09.2021)
Get full text
Journal Article
Automated Vulnerability Discovery and Exploitation in the Internet of Things
Wang, Zhongru, Zhang, Yuntao, Tian, Zhihong, Ruan, Qiang, Liu, Tong, Wang, Haichen, Liu, Zhehui, Lin, Jiayi, Fang, Binxing, Shi, Wei
Published in Sensors (Basel, Switzerland) (31.07.2019)
Published in Sensors (Basel, Switzerland) (31.07.2019)
Get full text
Journal Article
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications
Wang, Guofeng, Liu, Chuanyi, Dong, Yingfei, Han, Peiyi, Pan, Hezhong, Fang, Binxing
Published in IEEE access (01.01.2018)
Published in IEEE access (01.01.2018)
Get full text
Journal Article
Effective and Fast Near Duplicate Detection via Signature-Based Compression Metrics
Binxing, Fang, Ji, Yingsheng, Yao, Yuntao, Zhang, Xi
Published in Mathematical problems in engineering (01.01.2016)
Published in Mathematical problems in engineering (01.01.2016)
Get full text
Journal Article
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach
Zhan, Dongyang, Ye, Lin, Fang, Binxing, Zhang, Hongli, Du, Xiaojiang
Published in Soft computing (Berlin, Germany) (01.12.2018)
Published in Soft computing (Berlin, Germany) (01.12.2018)
Get full text
Journal Article
Hierarchically defining Internet of Things security: From CIA to CACA
Yin, Lihua, Fang, Binxing, Guo, Yunchuan, Sun, Zhe, Tian, Zhihong
Published in International journal of distributed sensor networks (01.01.2020)
Published in International journal of distributed sensor networks (01.01.2020)
Get full text
Journal Article
Theories of Social Media: Philosophical Foundations
Qi, Jiayin, Monod, Emmanuel, Fang, Binxing, Deng, Shichang
Published in Engineering (Beijing, China) (01.02.2018)
Published in Engineering (Beijing, China) (01.02.2018)
Get full text
Journal Article
Security Measurement for Unknown Threats Based on Attack Preferences
Li, Fenghua, Guo, Yunchuan, Wang, Zhen, Sun, Yanwei, Yin, Lihua, Binxing, Fang
Published in Security and communication networks (01.01.2018)
Published in Security and communication networks (01.01.2018)
Get full text
Journal Article
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage
Han, Peiyi, Liu, Chuanyi, Cao, Jiahao, Duan, Shaoming, Pan, Hezhong, Cao, Zekun, Fang, Binxing
Published in IEEE access (2020)
Published in IEEE access (2020)
Get full text
Journal Article