Browsing by Author Chen, Zhong

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 241 next >
Issue Date Title Author(s)
2013 Accelerating AES in JavaScript with WebGL Yang, Yang;Guan, Zhi;Zhu, Jiawei;Dong, Qiuxiang;Chen, Zhong
2015 Accelerating RSA with Fine-Grained Parallelism Using GPU Yang, Yang;Guan, Zhi;Sun, Huiping;Chen, Zhong
2004 An access control model for Web services in business process Liu, Peng;Chen, Zhong
2010 An Adjacency Matrixes-based Model for Network Security Analysis Xie, Anming;Tang, Cong;Gui, Nike;Cai, Zhuhua;Hu, Jianbin;Chen, Zhong
Nov-2022 The adverse impact of ecotropic viral integration site-1 (EVI1) overexpression on the prognosis of acute myeloid leukemia with KMT2A gene rearrangement in different risk stratification subtypes Liu, Xin-Xin;Pan, Xin-An;Gao, Meng-Ge;Kong, Jun;Jiang, Hao;Chang, Ying-Jun;Zhang, Xiao-Hui;Wang, Yu;Liu, Kai-Yan;Chen, Zhong;Zhao, Xiao-Su;Huang, Xiao-Jun
2013 Analysis and design of distance-bounding protocols for RFID Xin, Wei;Sun, Huiping;Chen, Zhong
2008 Analysis and improvement in supermarket service model Bao, Dihui;Chen, Yelu;Sun, Huiping;Chen, Zhong
2005 Analysis on combined security efficiency and vulnerability for information system security evaluation Duan, Yunsuo;Liu, Xin;Chen, Zhong
2015 API Sequences based Malware Detection for Android Zhu, Jiawei;Wu, Zhengang;Guan, Zhi;Chen, Zhong
2015 Appearance similarity evaluation for Android applications Zhu, Jiawei;Wu, Zhengang;Guan, Zhi;Chen, Zhong
2009 Applying Attack Graphs to Network Security Metric Xie, Anming;Wen, Weiping;Zhang, Li;Hu, Jianbin;Chen, Zhong
2010 An approach to semantic web services publication and discovery based on owl ontology inference Si, Huayou;Ni, Yulin;Chen, Zhong;Yu, Lian;Zhao, Yun
2018 Approaching the upper bound of load capacity: Functional grading with interpenetrating polymer networks Chen, Zhong;Li, Wenlong;Negahban, Mehrdad;Saiter, Jean-Marc;Delpouve, Nicolas;Tan, Li;Li, Zheng
2015 Attribute-based Keyword Search Efficiency Enhancement Via an Online/Offline Approach Dong, Qiuxiang;Guan, Zhi;Chen, Zhong
2013 Authenticating Users of Recommender Systems Using Naive Bayes Wu, Zhengang;Yu, Liangwen;Sun, Huiping;Guan, Zhi;Chen, Zhong
2010 Automatic construction and optimization of layered Network Attack Graph Wang, Yonggang;Gui, Nike;Hu, Jianbin;Chen, Zhong
2012 Bidder-anonymous English auction protocol based on revocable ring signature Xiong, Hu;Chen, Zhong;Li, Fagen
2007 Bounded model checking of CTL Tao, Zhi-Hong;Zhou, Cong-Hua;Chen, Zhong;Wang, Li-Fu
2011 A business oriented risk assessment model Li, Bin;Xie, Feng;Chen, Zhong
2006 C4W: An energy efficient Public Key Cryptosystem for large-scale wireless sensor networks Jing, Qi;Hu, Jianbin;Chen, Zhong