Su jinshu
Su jinshu
Dirección de correo verificada de nudt.edu.cn
Título
Citado por
Citado por
Año
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
Y Sun, R Lu, X Lin, X Shen, J Su
IEEE Transactions on Vehicular Technology 59 (7), 3589-3603, 2010
3532010
The TianHe-1A supercomputer: its hardware and software
XJ Yang, XK Liao, K Lu, QF Hu, JQ Song, JS Su
Journal of computer science and technology 26 (3), 344-351, 2011
2042011
Advances in machine learning based text categorization.
JS Su, BF Zhang, X Xu
Ruan Jian Xue Bao(Journal of Software) 17 (9), 1848-1859, 2006
1652006
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm
X Wang, CS Yeo, R Buyya, J Su
Future Generation Computer Systems 27 (8), 1124-1134, 2011
1632011
RLM: A general model for trust representation and aggregation
X Wang, L Liu, J Su
IEEE Transactions on Services Computing 5 (1), 131-143, 2010
1202010
Attribute-based encryption schemes
JS Su, D Cao, XF Wang, YP Sun, QL Hu
Journal of Software 22 (6), 1299-1315, 2011
922011
A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms
C Xu, S Chen, J Su, SM Yiu, LCK Hui
IEEE Communications Surveys & Tutorials 18 (4), 2991-3029, 2016
822016
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
J Su, D Cao, B Zhao, X Wang, I You
Future Generation Computer Systems 33, 11-18, 2014
812014
Roadside units deployment for efficient short-time certificate updating in VANETs
Y Sun, X Lin, R Lu, X Shen, J Su
2010 IEEE International Conference on Communications, 1-5, 2010
802010
CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices
H Sun, X Wang, R Buyya, J Su
Software: Practice and Experience 47 (3), 421-441, 2017
792017
A new multistage approach to detect subtle DDoS attacks
F Wang, H Wang, X Wang, J Su
Mathematical and Computer Modelling 55 (1-2), 198-213, 2012
672012
Self-supported cooperative networking for emergency services in multi-hop wireless networks
B Han, J Li, J Su, J Cao
IEEE Journal on Selected Areas in Communications 30 (2), 450-457, 2012
572012
A class-incremental learning method for multi-class support vector machines in text classification
BF Zhang, JS Su, X Xu
2006 International Conference on Machine Learning and Cybernetics, 2581-2585, 2006
572006
Secrecy capacity optimization via cooperative relaying and jamming for WANETs
B Han, J Li, J Su, M Guo, B Zhao
IEEE Transactions on Parallel and Distributed Systems 26 (4), 1117-1128, 2014
562014
Mix-zones optimal deployment for protecting location privacy in VANET
Y Sun, B Zhang, B Zhao, X Su, J Su
Peer-to-Peer Networking and Applications 8 (6), 1108-1121, 2015
542015
Dynamic edge computation offloading for internet of things with energy harvesting: A learning method
Z Wei, B Zhao, J Su, X Lu
IEEE Internet of Things Journal 6 (3), 4436-4447, 2018
512018
Cupid: Congestion-free consistent data plane update in software defined networks
W Wang, W He, J Su, Y Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
502016
Delay-bounded range queries in DHT-based peer-to-peer systems
D Li, X Lu, B Wang, J Su, J Cao, KCC Chan, H Leong
26th IEEE International Conference on Distributed Computing Systems (ICDCS …, 2006
442006
OverWatch: A cross-plane DDoS attack defense framework with collaborative intelligence in SDN
B Han, X Yang, Z Sun, J Huang, J Su
Security and Communication Networks 2018, 2018
422018
A scalable approach to analyzing network security using compact attack graphs
F Chen, D Liu, Y Zhang, J Su
Journal of Networks 5 (5), 543, 2010
412010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20