Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading S Kosta, A Aucinas, P Hui, R Mortier, X Zhang 2012 Proceedings IEEE Infocom, 945-953, 2012 | 1287 | 2012 |
Apex: extending android permission model and enforcement with user-defined runtime constraints M Nauman, S Khan, X Zhang Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 811 | 2010 |
Taming information-stealing smartphone applications (on android) Y Zhou, X Zhang, X Jiang, VW Freeh International conference on Trust and trustworthy computing, 93-107, 2011 | 576 | 2011 |
PBDM: a flexible delegation model in RBAC X Zhang, S Oh, R Sandhu Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 382 | 2003 |
Detecting unauthorized use of computing devices based on behavioral patterns L Xie, X Zhang, J Seifert, O Aciicmez, A Latifi US Patent 8,595,834, 2013 | 363 | 2013 |
Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing X Zhang, A Kunjithapatham, S Jeong, S Gibbs Mobile Networks and Applications 16 (3), 270-284, 2011 | 351 | 2011 |
Formal model and policy specification of usage control X Zhang, F Parisi-Presicce, R Sandhu, J Park ACM Transactions on Information and System Security (TISSEC) 8 (4), 351-387, 2005 | 320 | 2005 |
Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication D Huang, X Zhang, M Kang, J Luo Proceedings of 5th IEEE International Symposium on Service-Oriented System …, 2010 | 259* | 2010 |
Securing elastic applications on mobile devices for cloud computing X Zhang, J Schiffman, S Gibbs, A Kunjithapatham, S Jeong Proceedings of the 2009 ACM workshop on Cloud computing security, 127-134, 2009 | 224 | 2009 |
Generalized dual-mode data forwarding plane for information-centric network GQ Wang, R Ravindran, X Zhang US Patent 8,694,675, 2014 | 223 | 2014 |
Peer-to-peer access control architecture using trusted computing technology R Sandhu, X Zhang Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 211 | 2005 |
Principal-identity-domain based naming scheme for information centric networks X Zhang, G Wang, R Ravindran US Patent 9,253,087, 2016 | 203 | 2016 |
Virusmeter: Preventing your cellphone from spies L Liu, G Yan, X Zhang, S Chen International workshop on recent advances in intrusion detection, 244-264, 2009 | 186 | 2009 |
Name-based neighbor discovery and multi-hop service discovery in information-centric networks X Zhang, B Zhao, A Chakraborti, R Ravindran, G Wang US Patent 9,515,920, 2016 | 182 | 2016 |
Measurement of particle production and inclusive differential cross sections in collisions at T Aaltonen, J Adelman, T Akimoto, BÁ González, S Amerio, D Amidei, ... Physical Review D 79 (11), 112005, 2009 | 182 | 2009 |
Protection of query privacy for continuous location based services A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao 2011 Proceedings IEEE INFOCOM, 1710-1718, 2011 | 172 | 2011 |
pBMDS: a behavior-based malware detection system for cellphone devices L Xie, X Zhang, JP Seifert, S Zhu Proceedings of the third ACM conference on Wireless network security, 37-48, 2010 | 165 | 2010 |
Augmenting name/prefix based routing protocols with trust anchor in information-centric networks X Zhang, H Xie, R Ravindran, G Wang US Patent 9,009,465, 2015 | 163 | 2015 |
CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud L Xu, X Wu, X Zhang | 153 | 2012 |
Towards a VMM-based usage control framework for OS kernel integrity protection M Xu, X Jiang, R Sandhu, X Zhang Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 148 | 2007 |