Name
Affiliation
Papers
LIANG HU
Jilin Univ, Dept Comp Sci & Technol, Changchun, Jilin, Peoples R China
22
Collaborators
Citations 
PageRank 
48
34
8.17
Referers 
Referees 
References 
124
853
273
Search Limit
100853
Title
Citations
PageRank
Year
Framework for replica placement over cooperative edge networks00.342019
The maximum matching degree sifting algorithm for steganography pretreatment applied to IoT.00.342018
A heuristic placement selection approach of partitions of mobile applications in mobile cloud computing model based on community collaboration.10.352017
Semantic Preference-Based Personalized Recommendation on Heterogeneous Information Network.00.342017
A secure and effective scheme providing comprehensive forward security to LTE/SAE X2 handover key management.00.342017
Explore virtual machine deployment to mobile cloud computing for multi-tenancy and energy conservation in wireless network.20.362017
The efficiency improved scheme for secure access control of digital video distribution00.342016
Computer forensic analysis model for the reconstruction of chain of evidence of volatile memory data20.372016
A Novel Trajectory Similarity-Based Approach For Location Prediction00.342016
A Closer Look at GPGPU.00.342016
Software Toolkits: Practical Aspects Of The Internet Of Things-A Survey30.482015
Estimating online vacancies in real-time road traffic monitoring with traffic sensor data stream50.432015
An Improved Intrusion Detection Framework Based On Artificial Neural Networks10.372015
The Research and Prospect of Secure Data Access Control in Cloud Storage Environment.00.342015
A survey from the perspective of evolutionary process in the internet of things80.442015
PEMM: A Privacy-Aware Data Aggregation Solution for Mobile Sensing Networks.00.342015
False positive elimination in intrusion detection based on clustering00.342015
Analysis And Improvement Of A Robust User Authentication Framework For Ubiquitous Sensor Networks20.372014
Cryptanalysis And Improvement Of An Id-Based Threshold Signcryption Scheme30.412012
The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment.20.392012
Analysis and Enhancement of Three Identity-based Signcryption Protocols.30.462012
An Improved Dynamic Password based Group Key Agreement against Dictionary Attack.20.382012