Name
Affiliation
Papers
CHENLIN HUANG
Institute of Software, School of Computer Science, National University of Defense Technology, Changsha, China
23
Collaborators
Citations 
PageRank 
63
48
8.83
Referers 
Referees 
References 
150
468
212
Search Limit
100468
Title
Citations
PageRank
Year
Agile Approach on the Performance Prediction of ARM TrustZone-based Mandatory Access Control Security Enhancement00.342021
Toward security as a service: A trusted cloud service architecture with policy customization00.342021
SLR-SELinux: Enhancing the Security Footstone of SEAndroid with Security Label Randomization00.342020
Blockchain-based Access Control Mechanism of Federated Data Sharing System00.342020
ASPGen: an Automatic Security Policy Generating Framework for AppArmor00.342020
Address Randomization for Dynamic Memory Allocators on the GPU00.342019
Policy-Customized: A New Abstraction for Building Security as a Service00.342017
Developing an Efficient Pattern Discovery Method for CPU Utilizations of Computers.40.492017
Research on Linux Trusted Boot Method Based on Reverse Integrity Verification10.372016
Developing A Trustworthy Computing Framework For Clouds00.342016
Enabling User-Policy-Confined VM Migration in Trusted Cloud Computing00.342016
Developing the Cloud-integrated data replication framework in decentralized online social networks40.382016
Analyzing and Boosting the Data Availability in Decentralized Online Social Networks.00.342015
An Efficient Method For Motif Discovery In Cpu Host Load00.342015
Performance Optimization for Managing Massive Numbers of Small Files in Distributed File Systems60.452015
On the Shoulders of Giants: Incremental Influence Maximization in Evolving Social Networks120.522015
Cadros: The Cloud-Assisted Data Replication in Decentralized Online Social Networks10.362014
Modelling and Predicting the Data Availability in Decentralized Online Social Networks00.342014
iFlatLFS: Performance optimization for accessing massive small files00.342013
Modeling and analyzing the impact of authorization on workflow executions90.542012
Modelling and analyzing the authorization and execution of video workflows00.342011
Efficient and fine-grained sharing of encrypted files.00.342010
A dynamic trust model based on feedback control mechanism for p2p applications110.652006