Certificateless public key encryption with equality test H Qu, Z Yan, XJ Lin, Q Zhang, L Sun Information Sciences 462, 76-92, 2018 | 79 | 2018 |
A typical noisy covert channel in the IP protocol H Qu, P Su, D Feng 38th Annual 2004 International Carnahan Conference on Security Technology …, 2004 | 50 | 2004 |
Generic construction of public key encryption, identity-based encryption and signcryption with equality test XJ Lin, L Sun, H Qu Information Sciences 453, 111-126, 2018 | 46 | 2018 |
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications XJ Lin, L Sun, H Qu computers & security 48, 142-149, 2015 | 41 | 2015 |
Public key encryption supporting equality test and flexible authorization without bilinear pairings XJ Lin, L Sun, H Qu, X Zhang Computer Communications 170, 190-199, 2021 | 39 | 2021 |
An efficient RSA-based certificateless public key encryption scheme XJ Lin, L Sun, H Qu Discrete Applied Mathematics 241, 39-47, 2018 | 30 | 2018 |
Identity-based encryption with equality test and datestamp-based authorization mechanism XJ Lin, Q Wang, L Sun, H Qu Theoretical Computer Science 861, 117-132, 2021 | 22 | 2021 |
A passive client-based approach to detect evil twin attacks Q Lu, H Qu, Y Zhuang, XJ Lin, Y Zhu, Y Liu 2017 IEEE Trustcom/BigDataSE/ICESS, 233-239, 2017 | 20 | 2017 |
UD-TDMA: A distributed TDMA protocol for underwater acoustic sensor network Z Li, Z Guo, H Qu, F Hong, P Chen, M Yang 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems …, 2009 | 19 | 2009 |
Sensitivity Approach of Suboptional Control for a Class of Nonlinear Systems T Gongyou, Q Haipeng, G Yanming JOURNAL-OCEAN UNIVERSITY OF QINGDAO 32 (4), 615-620, 2002 | 18 | 2002 |
Exploiting temperature-varied ECU fingerprints for source identification in in-vehicle network intrusion detection M Tian, R Jiang, C Xing, H Qu, Q Lu, X Zhou 2019 IEEE 38th International Performance Computing and Communications …, 2019 | 16 | 2019 |
SLFAT: client-side evil twin detection approach based on arrival time of special length frames Q Lu, H Qu, Y Ouyang, J Zhang Security and Communication Networks 2019, 2019 | 16 | 2019 |
Cryptanalysis of a privacy-preserving smart metering scheme using linkable anonymous credential H Qu, P Shang, XJ Lin, L Sun Cryptology ePrint Archive, 2015 | 14 | 2015 |
Cryptanalysis of a pairing-free certificateless signcryption scheme XJ Lin, L Sun, H Qu, D Liu The Computer Journal 61 (4), 539-544, 2018 | 13 | 2018 |
Real-time risk assessment based on hidden Markov model and security configuration D Yu-Ting, Q Hai-Peng, T Xi-Long 2014 International Conference on Information Science, Electronics and …, 2014 | 12 | 2014 |
On the security of a certificateless signcryption with known session-specific temporary information security in the standard model XJ Lin, L Sun, Z Yan, X Zhang, H Qu The Computer Journal 63 (8), 1259-1262, 2020 | 11 | 2020 |
BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks Q Lu, R Jiang, Y Ouyang, H Qu, J Zhang Computers & Security 88, 101618, 2020 | 11 | 2020 |
Advanced temperature-varied ecu fingerprints for source identification and intrusion detection in controller area networks M Tian, R Jiang, H Qu, Q Lu, X Zhou Security and Communication Networks 2020, 1-17, 2020 | 10 | 2020 |
AFLTurbo: Speed up path discovery for greybox fuzzing L Sun, X Li, H Qu, X Zhang 2020 IEEE 31st International Symposium on Software Reliability Engineering …, 2020 | 10 | 2020 |
Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames Q Lu, H Qu, Y Zhuang, XJ Lin, Y Ouyang IEICE TRANSACTIONS on Information and Systems 101 (10), 2465-2473, 2018 | 10 | 2018 |