Name
Affiliation
Papers
CHANGXIANG SHEN
Beijing Univ Technol, Sch Comp, Beijing 100124, Peoples R China
28
Collaborators
Citations 
PageRank 
70
127
14.57
Referers 
Referees 
References 
370
422
206
Search Limit
100422
Title
Citations
PageRank
Year
A dual-system trusted computing node construction method based on ARM multi-core CPU architecture00.342022
TM-Miner: TFS-Based Algorithm for Mining Temporal Motifs in Large Temporal Network00.342019
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.00.342019
Video Subtitle Location and Recognition Based on Edge Features00.342019
New Algorithms for Counting Temporal Graph Pattern00.342019
Nonlinear boundary stabilization of the wave equations with variable coefficients and time dependent delay.00.342014
Equivalent Inner Key Recovery Attack to NMAC.00.342012
Edge Self-Monitoring for Wireless Sensor Networks140.862011
On the Security of NMAC and Its Variants.00.342011
Breaking H2-MAC Using Birthday Paradox.00.342011
Beyond rigidity: obtain localisability with noisy ranging measurement60.472011
Formal Definitions for Trust in Trusted Computing50.452010
Research on trusted computing and its development.161.402010
A feather-weight application isolation model00.342009
Barrier Coverage with Mobile Sensors251.412008
The Banknote Anti-forgery System Based on Digital Signature Algorithms30.552008
Maximal Coverage Scheduling in Randomly Deployed Directional Sensor Networks351.232007
Analysis of Electronic Voting with Different Stage.00.342007
Design of secure operating systems with high security levels20.362007
EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks00.342007
Software Complexity Based Remote Attestation00.342006
An Integrated Access Control Model of Distributed Database Systems00.342006
An Efficient Attestation for Trustworthiness of Computing Platform100.942006
Research on Applying Java Card to Database Encryption Systems00.342006
A trust-based routing framework in energy-constrained wireless sensor networks110.812006
Trust Extended Dynamic Security Model and Its Application in Network00.342006
Develop secure database system with security extended ER model00.342005
Research on confidential level extended BLP model00.342005