Follow
Su jinshu
Title
Cited by
Cited by
Year
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
Y Sun, R Lu, X Lin, X Shen, J Su
IEEE Transactions on Vehicular Technology 59 (7), 3589-3603, 2010
4292010
The TianHe-1A supercomputer: its hardware and software
XJ Yang, XK Liao, K Lu, QF Hu, JQ Song, JS Su
Journal of computer science and technology 26 (3), 344-351, 2011
2282011
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm
X Wang, CS Yeo, R Buyya, J Su
Future Generation Computer Systems 27 (8), 1124-1134, 2011
2002011
Advances in machine learning based text categorization
苏金树, 张博锋, 徐昕
Journal of software 17 (9), 1848-1859, 2006
1862006
A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms
C Xu, S Chen, J Su, SM Yiu, LCK Hui
IEEE Communications Surveys & Tutorials 18 (4), 2991-3029, 2016
1722016
CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices
H Sun, X Wang, R Buyya, J Su
Software: Practice and Experience 47 (3), 421-441, 2017
1312017
Dynamic edge computation offloading for Internet of Things with energy harvesting: A learning method
Z Wei, B Zhao, J Su, X Lu
IEEE Internet of Things Journal 6 (3), 4436-4447, 2018
1292018
RLM: A general model for trust representation and aggregation
X Wang, L Liu, J Su
IEEE Transactions on Services Computing 5 (1), 131-143, 2010
1282010
A blockchain based witness model for trustworthy cloud service level agreement enforcement
H Zhou, X Ouyang, Z Ren, J Su, C de Laat, Z Zhao
IEEE INFOCOM 2019-IEEE conference on computer Communications, 1567-1575, 2019
1032019
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
J Su, D Cao, B Zhao, X Wang, I You
Future Generation Computer Systems 33, 11-18, 2014
1022014
OverWatch: a cross‐plane DDoS attack defense framework with collaborative intelligence in SDN
B Han, X Yang, Z Sun, J Huang, J Su
Security and Communication Networks 2018 (1), 9649643, 2018
892018
Roadside units deployment for efficient short-time certificate updating in VANETs
Y Sun, X Lin, R Lu, X Shen, J Su
2010 IEEE international conference on communications, 1-5, 2010
872010
Attribute-based encryption schemes
苏金树, 曹丹, 王小峰, 孙一品, 胡乔林
Journal of Software 22 (6), 1299-1315, 2011
852011
Mix-zones optimal deployment for protecting location privacy in VANET
Y Sun, B Zhang, B Zhao, X Su, J Su
Peer-to-Peer Networking and Applications 8, 1108-1121, 2015
792015
A new multistage approach to detect subtle DDoS attacks
F Wang, H Wang, X Wang, J Su
Mathematical and Computer Modelling 55 (1-2), 198-213, 2012
772012
Self-supported cooperative networking for emergency services in multi-hop wireless networks
B Han, J Li, J Su, J Cao
IEEE Journal on Selected Areas in Communications 30 (2), 450-457, 2012
752012
Towards practical privacy-preserving decision tree training and evaluation in the cloud
L Liu, R Chen, X Liu, J Su, L Qiao
IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020
722020
Secrecy capacity optimization via cooperative relaying and jamming for WANETs
B Han, J Li, J Su, M Guo, B Zhao
IEEE Transactions on Parallel and Distributed Systems 26 (4), 1117-1128, 2014
692014
A class-incremental learning method for multi-class support vector machines in text classification
BF Zhang, JS Su, X Xu
2006 International Conference on Machine Learning and Cybernetics, 2581-2585, 2006
692006
DRL-ER: An intelligent energy-aware routing protocol with guaranteed delay bounds in satellite mega-constellations
J Liu, B Zhao, Q Xin, J Su, W Ou
IEEE Transactions on Network Science and Engineering 8 (4), 2872-2884, 2020
652020
The system can't perform the operation now. Try again later.
Articles 1–20