Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Koh Aoki
Yan-Han Chew
Zhiguo Cao
Bhupendra Singh
Richard M. Murray
J. Caiko
David J. Westover
Songhua Li
Sebastian Magda
David MacDonald
Home
/
Author
/
CHANGXIANG SHEN
Author Info
Open Visualization
Name
Affiliation
Papers
CHANGXIANG SHEN
Beijing Univ Technol, Sch Comp, Beijing 100124, Peoples R China
28
Collaborators
Citations
PageRank
70
127
14.57
Referers
Referees
References
370
422
206
Search Limit
100
422
Publications (28 rows)
Collaborators (70 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A dual-system trusted computing node construction method based on ARM multi-core CPU architecture
0
0.34
2022
TM-Miner: TFS-Based Algorithm for Mining Temporal Motifs in Large Temporal Network
0
0.34
2019
TAW: Cost-Effective Threshold Authentication With Weights for Internet of Things.
0
0.34
2019
Video Subtitle Location and Recognition Based on Edge Features
0
0.34
2019
New Algorithms for Counting Temporal Graph Pattern
0
0.34
2019
Nonlinear boundary stabilization of the wave equations with variable coefficients and time dependent delay.
0
0.34
2014
Equivalent Inner Key Recovery Attack to NMAC.
0
0.34
2012
Edge Self-Monitoring for Wireless Sensor Networks
14
0.86
2011
On the Security of NMAC and Its Variants.
0
0.34
2011
Breaking H2-MAC Using Birthday Paradox.
0
0.34
2011
Beyond rigidity: obtain localisability with noisy ranging measurement
6
0.47
2011
Formal Definitions for Trust in Trusted Computing
5
0.45
2010
Research on trusted computing and its development.
16
1.40
2010
A feather-weight application isolation model
0
0.34
2009
Barrier Coverage with Mobile Sensors
25
1.41
2008
The Banknote Anti-forgery System Based on Digital Signature Algorithms
3
0.55
2008
Maximal Coverage Scheduling in Randomly Deployed Directional Sensor Networks
35
1.23
2007
Analysis of Electronic Voting with Different Stage.
0
0.34
2007
Design of secure operating systems with high security levels
2
0.36
2007
EETO: An Energy-Efficient Target-Oriented Clustering Protocol in Wireless Sensor Networks
0
0.34
2007
Software Complexity Based Remote Attestation
0
0.34
2006
An Integrated Access Control Model of Distributed Database Systems
0
0.34
2006
An Efficient Attestation for Trustworthiness of Computing Platform
10
0.94
2006
Research on Applying Java Card to Database Encryption Systems
0
0.34
2006
A trust-based routing framework in energy-constrained wireless sensor networks
11
0.81
2006
Trust Extended Dynamic Security Model and Its Application in Network
0
0.34
2006
Develop secure database system with security extended ER model
0
0.34
2005
Research on confidential level extended BLP model
0
0.34
2005
1