Malware obfuscation techniques: A brief survey I You, K Yim 2010 International conference on broadband, wireless computing …, 2010 | 495 | 2010 |
Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing Y Zhang, X Chen, J Li, DS Wong, H Li, I You Information Sciences 379, 42-61, 2017 | 197 | 2017 |
Comparative handover performance analysis of IPv6 mobility management protocols JH Lee, JM Bonnin, I You, TM Chung IEEE Transactions on Industrial Electronics 60 (3), 1077-1088, 2012 | 137 | 2012 |
Verifiable auditing for outsourced database in cloud computing J Wang, X Chen, X Huang, I You, Y Xiang IEEE transactions on computers 64 (11), 3293-3303, 2015 | 125 | 2015 |
Fair resource allocation in an intrusion-detection system for edge computing: Ensuring the security of Internet of Things devices F Lin, Y Zhou, X An, I You, KKR Choo IEEE Consumer Electronics Magazine 7 (6), 45-50, 2018 | 111 | 2018 |
New order preserving encryption model for outsourced databases in cloud environments Z Liu, X Chen, J Yang, C Jia, I You Journal of Network and Computer Applications 59, 198-207, 2016 | 100 | 2016 |
A chain-cluster based routing algorithm for wireless sensor networks F Tang, I You, S Guo, M Guo, Y Ma journal of intelligent manufacturing 23 (4), 1305-1313, 2012 | 98 | 2012 |
A cross-layer protocol of spectrum mobility and handover in cognitive LTE networks YS Chen, CH Cho, I You, HC Chao Simulation Modelling Practice and Theory 19 (8), 1723-1744, 2011 | 75 | 2011 |
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things J Su, D Cao, B Zhao, X Wang, I You Future Generation Computer Systems 33, 11-18, 2014 | 62 | 2014 |
An optimization-based scheme for efficient virtual machine placement F Song, D Huang, H Zhou, H Zhang, I You International Journal of Parallel Programming 42 (5), 853-872, 2014 | 60 | 2014 |
A smartphone-based wearable sensors for monitoring real-time physiological data I You, KKR Choo, CL Ho Computers & Electrical Engineering 65, 376-392, 2018 | 54 | 2018 |
Secure and energy-efficient handover in fog networks using blockchain-based DMM V Sharma, I You, F Palmieri, DNK Jayakody, J Li IEEE Communications Magazine 56 (5), 22-31, 2018 | 52 | 2018 |
N-NEMO: A Comprehensive Network Mobility Solution in Proxy Mobile IPv6 Network. Z Yan, H Zhou, I You J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 1 (2/3), 52-70, 2010 | 51 | 2010 |
Smart collaborative caching for information-centric IoT in fog computing F Song, ZY Ai, JJ Li, G Pau, M Collotta, I You, HK Zhang Sensors 17 (11), 2512, 2017 | 49 | 2017 |
Secure and efficient protocol for route optimization in PMIPv6-based smart home IoT networks D Shin, V Sharma, J Kim, S Kwon, I You IEEE Access 5, 11100-11117, 2017 | 49 | 2017 |
Design and implementation of a ubiquitous ECG monitoring system using SIP and the zigbee network B Kim, Y Kim, IS Lee, I You Future generation communication and networking (fgcn 2007) 2, 599-604, 2007 | 49 | 2007 |
Energy efficient device discovery for reliable communication in 5G-based IoT and BSNs using unmanned aerial vehicles V Sharma, F Song, I You, M Atiquzzaman Journal of Network and Computer Applications 97, 79-95, 2017 | 46 | 2017 |
Guest editorial: A brief overview of data leakage and insider threats CL Huth, DW Chadwick, WR Claycomb, I You Information Systems Frontiers 15 (1), 1-4, 2013 | 46 | 2013 |
Smart collaborative distribution for privacy enhancement in moving target defense F Song, YT Zhou, Y Wang, TM Zhao, I You, HK Zhang Information Sciences 479, 593-606, 2019 | 45 | 2019 |
SeDaTiVe: SDN-enabled deep learning architecture for network traffic control in vehicular cyber-physical systems A Jindal, GS Aujla, N Kumar, R Chaudhary, MS Obaidat, I You IEEE network 32 (6), 66-73, 2018 | 45 | 2018 |