Name
Papers
Collaborators
XINWEN ZHANG
47
109
Citations 
PageRank 
Referers 
697
46.90
1914
Referees 
References 
1234
564
Search Limit
1001000
Title
Citations
PageRank
Year
How to Find a Perfect Data Scientist: A Distance-Metric Learning Approach.00.342018
Towards Virus Scanning as a Service in Mobile Cloud Computing: Energy-Efficient Dispatching Policy Under N-Version Protection.10.372018
ResumeNet: A Learning-Based Framework for Automatic Resume Quality Assessment00.342018
ABSS: An Attribute-based Sanitizable Signature for Integrity of Outsourced Database with Public Cloud30.382015
A Host-Based Approach for Unknown Fast-Spreading Worm Detection and Containment00.342014
Improved anonymous proxy re-encryption with CCA security20.392014
Design and Implementation of Efficient Integrity Protection for Open Mobile Platforms10.372014
Protecting access privacy of cached contents in information centric networks170.682013
Cherub: Fine-grained application protection with on-demand virtualization.00.342013
Lattice-Based Multi-party Concurrent Signatures Scheme20.412013
CloudSafe: Securing data processing within vulnerable virtualization environments in the cloud20.412013
Information-centric networking based homenet50.752013
Contextualized information-centric home network70.672013
ACaaS: Access Control as a Service for IaaS Cloud50.572013
Behavioral Attestation for Web Services using access policies00.342013
AppInk: watermarking android apps for repackaging deterrence351.112013
Towards software defined ICN based edge-cloud services190.972013
Remote Attestation with Domain-Based Integrity Model and Policy Analysis120.882012
Enhancing the Trust of Internet Routing With Lightweight Route Attestation30.392012
On-demand security service00.342012
CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud301.062012
Supporting dual-mode forwarding in content-centric network20.392012
Multiparty Cloud Computation00.342012
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks221.082012
Towards end-to-end secure content storage and delivery with public cloud170.802012
Supporting seamless mobility in named data networking231.272012
An Android runtime security policy enforcement framework50.532012
Chrome Extensions: Threat Analysis and Countermeasures.241.232012
Architectural support of multiple hypervisors over single platform for enhancing cloud computing security20.382012
STC 2012: the seventh ACM workshop on scalable trusted computing00.342012
Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing80.522011
Botnet with Browser Extensions20.382011
Towards name-based trust and security for content-centric network371.912011
Unleashing the Power of Mobile Cloud Computing using ThinkAir150.792011
TGIS: Booting Trust for Secure Information Sharing in Dynamic Group Collaborations.20.392011
xDAuth: a scalable and lightweight framework for cross domain access control and delegation150.742011
Towards an Elastic Application Model for Augmenting the Computing Capabilities of Mobile Devices with Cloud Computing1224.702011
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services.70.502011
Patient-centric authorization framework for electronic healthcare services301.672011
Taming information-stealing smartphone applications (on Android)1079.272011
Runtime Administration of an RBAC Profile for XACML30.432011
SEIP: simple and efficient integrity protection for open mobile platforms60.862010
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication733.292010
Elastic HTML5: Workload Offloading Using Cloud-Based Web Workers and Storages for Mobile Devices.70.572010
Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing40.512010
Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms132.022009
Towards Session-Aware RBAC Administration and Enforcement with XACML70.542009