Name
Affiliation
Papers
GONGXUAN ZHANG
Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing, Jiangsu, Peoples R China
54
Collaborators
Citations 
PageRank 
113
94
19.89
Referers 
Referees 
References 
250
1428
569
Search Limit
1001000
Title
Citations
PageRank
Year
An approach for unsupervised contextual anomaly detection and characterization00.342022
IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds20.362022
Improvements Based on JWT and RBAC for Spring Security Framework.00.342020
Makespan-Cost-Reliability-Optimized Workflow Scheduling Using Evolutionary Techniques in Clouds.00.342020
A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems00.342020
Privacy-aware cross-cloud service recommendations based on Boolean historical invocation records.00.342019
A Short Review of Security-Aware Techniques in Real-Time Embedded Systems.00.342019
SeShare: Secure cloud data sharing based on blockchain and public auditing40.382019
Traffic-driven epidemic spreading and its control strategies00.342019
A Review of Cost and Makespan-Aware Workflow Scheduling in Clouds10.352019
Power allocation algorithm based on mixed integer nonlinear programming in WSN00.342019
Game Theoretic Fund Allocation for Maximizing Throughput of Multiserver Systems in Cloud.00.342019
A trust enhancement scheme for cluster-based wireless sensor networks10.352019
A Participation Degree-Based Fault Detection Method for Wireless Sensor Networks.00.342019
A Review of Recent Techniques in Mixed-Criticality Systems10.352019
A New Path-Constrained Rendezvous Planning Approach for Large-Scale Event-Driven Wireless Sensor Networks.20.362018
Privacy-Preserving Public Auditing for Non-manager Group Shared Data.20.352018
A Reliable Secure Storage Cloud and Data Migration Based on Erasure Code.00.342018
Transmission power control of wireless sensor networks based on optimal connectivity.00.342018
A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing00.342018
Thermal-aware correlated two-level scheduling of real-time tasks with reduced processor energy on heterogeneous MPSoCs.120.552018
Genetic algorithm for energy-efficient clustering and routing in wireless sensor networks.70.442018
基于改进支持向量机的无线传感器网络路由优化算法 (Routing Optimization Algorithm of Wireless Sensor Network Based on Improved SVM).00.342018
Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage.20.372018
Certificateless public verification scheme with privacy-preserving and message recovery for dynamic group.10.362017
A Trusted and Energy Efficient Approach for Cluster-Based Wireless Sensor Networks.30.372016
A privacy-preserving group authentication protocol for machine-type communication in LTE/LTE-A networks.80.492016
NNB: An efficient nearest neighbor search method for hierarchical clustering on large datasets10.362015
On Further Reduction of Constraints in “Nonpure Petri Net Supervisors for Optimal Deadlock Control of Flexible Manufacturing Systems”40.382015
Lexicographic Multiobjective Integer Programming for Optimal and Structurally Minimal Petri Net Supervisors of Automated Manufacturing Systems110.482015
Comments on "Heuristic search for scheduling flexible manufacturing systems using lower bound reachability matrix".10.362014
Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks30.432014
A New Architecture in Greenhouse Soil Solution Monitoring System Based on ZigBee Protocol.10.482014
A Privacy Preserving Vertical Handover Authentication Scheme for WiMAX-WiFi Networks.30.382014
A New Approach Based on Intelligent Water Drops Algorithm for Node Selection in Service-Oriented Wireless Sensor Networks00.342014
Heuristic Search for Scheduling Flexible Manufacturing Systems Using Multiple Heuristic Functions.00.342014
Search strategy for scheduling flexible manufacturing systems simultaneously using admissible heuristic functions and nonadmissible heuristic functions.90.482014
Hierarchical Clustering Routing Protocol Based on Optimal Load Balancing in Wireless Sensor Networks.00.342013
Quantifying Consistency between Conceptual and Executable Business Processes30.412013
A Secure and Efficient Fault-Tolerant Group Key Agreement Protocol10.352013
GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks50.422013
Briareus: Accelerating Python Applications with Cloud10.402013
A Cloud Computing System for Snore Signals Processing.00.342013
Migration Validity of WS-BPEL Instances Revisited00.342013
Permission Assurance for Semantic Aspects of Design Patterns00.342012
Towards Dynamic Evolution of Service Choreographies00.342012
A TCM-enabled access control scheme10.352011
ApproxCCA: An approximate correlation analysis algorithm for multidimensional data streams40.392011
Assuring Structural Parallel Programs based on Scoped Permissions00.342009
A designing method for high-rate serial communication00.342007
  • 1
  • 2