An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications Y Sun, R Lu, X Lin, X Shen, J Su IEEE Transactions on Vehicular Technology 59 (7), 3589-3603, 2010 | 427 | 2010 |
The TianHe-1A supercomputer: its hardware and software XJ Yang, XK Liao, K Lu, QF Hu, JQ Song, JS Su Journal of computer science and technology 26 (3), 344-351, 2011 | 228 | 2011 |
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm X Wang, CS Yeo, R Buyya, J Su Future Generation Computer Systems 27 (8), 1124-1134, 2011 | 200 | 2011 |
Advances in machine learning based text categorization 苏金树, 张博锋, 徐昕 Journal of software 17 (9), 1848-1859, 2006 | 185 | 2006 |
A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms C Xu, S Chen, J Su, SM Yiu, LCK Hui IEEE Communications Surveys & Tutorials 18 (4), 2991-3029, 2016 | 169 | 2016 |
Dynamic edge computation offloading for Internet of Things with energy harvesting: A learning method Z Wei, B Zhao, J Su, X Lu IEEE Internet of Things Journal 6 (3), 4436-4447, 2018 | 127 | 2018 |
RLM: A general model for trust representation and aggregation X Wang, L Liu, J Su IEEE Transactions on Services Computing 5 (1), 131-143, 2010 | 127 | 2010 |
CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices H Sun, X Wang, R Buyya, J Su Software: Practice and Experience 47 (3), 421-441, 2017 | 123 | 2017 |
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things J Su, D Cao, B Zhao, X Wang, I You Future Generation Computer Systems 33, 11-18, 2014 | 101 | 2014 |
A blockchain based witness model for trustworthy cloud service level agreement enforcement H Zhou, X Ouyang, Z Ren, J Su, C de Laat, Z Zhao IEEE INFOCOM 2019-IEEE conference on computer Communications, 1567-1575, 2019 | 100 | 2019 |
OverWatch: a cross‐plane DDoS attack defense framework with collaborative intelligence in SDN B Han, X Yang, Z Sun, J Huang, J Su Security and Communication Networks 2018 (1), 9649643, 2018 | 88 | 2018 |
Roadside units deployment for efficient short-time certificate updating in VANETs Y Sun, X Lin, R Lu, X Shen, J Su 2010 IEEE international conference on communications, 1-5, 2010 | 87 | 2010 |
Attribute-based encryption schemes 苏金树, 曹丹, 王小峰, 孙一品, 胡乔林 Journal of Software 22 (6), 1299-1315, 2011 | 85 | 2011 |
Mix-zones optimal deployment for protecting location privacy in VANET Y Sun, B Zhang, B Zhao, X Su, J Su Peer-to-Peer Networking and Applications 8, 1108-1121, 2015 | 79 | 2015 |
A new multistage approach to detect subtle DDoS attacks F Wang, H Wang, X Wang, J Su Mathematical and Computer Modelling 55 (1-2), 198-213, 2012 | 77 | 2012 |
Self-supported cooperative networking for emergency services in multi-hop wireless networks B Han, J Li, J Su, J Cao IEEE Journal on Selected Areas in Communications 30 (2), 450-457, 2012 | 74 | 2012 |
Towards practical privacy-preserving decision tree training and evaluation in the cloud L Liu, R Chen, X Liu, J Su, L Qiao IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020 | 68 | 2020 |
Secrecy capacity optimization via cooperative relaying and jamming for WANETs B Han, J Li, J Su, M Guo, B Zhao IEEE Transactions on Parallel and Distributed Systems 26 (4), 1117-1128, 2014 | 68 | 2014 |
A class-incremental learning method for multi-class support vector machines in text classification BF Zhang, JS Su, X Xu 2006 International Conference on Machine Learning and Cybernetics, 2581-2585, 2006 | 68 | 2006 |
Cupid: Congestion-free consistent data plane update in software defined networks W Wang, W He, J Su, Y Chen IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016 | 65 | 2016 |