Xinwen Zhang
Xinwen Zhang
Hiretual
Verified email at hiretual.com - Homepage
Title
Cited by
Cited by
Year
Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading
S Kosta, A Aucinas, P Hui, R Mortier, X Zhang
2012 Proceedings IEEE Infocom, 945-953, 2012
12782012
Apex: extending android permission model and enforcement with user-defined runtime constraints
M Nauman, S Khan, X Zhang
Proceedings of the 5th ACM symposium on information, computer and …, 2010
8092010
Taming information-stealing smartphone applications (on android)
Y Zhou, X Zhang, X Jiang, VW Freeh
International conference on Trust and trustworthy computing, 93-107, 2011
5712011
PBDM: a flexible delegation model in RBAC
X Zhang, S Oh, R Sandhu
Proceedings of the eighth ACM symposium on Access control models and …, 2003
3822003
Detecting unauthorized use of computing devices based on behavioral patterns
L Xie, X Zhang, J Seifert, O Aciicmez, A Latifi
US Patent 8,595,834, 2013
3592013
Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing
X Zhang, A Kunjithapatham, S Jeong, S Gibbs
Mobile Networks and Applications 16 (3), 270-284, 2011
3492011
Formal model and policy specification of usage control
X Zhang, F Parisi-Presicce, R Sandhu, J Park
ACM Transactions on Information and System Security (TISSEC) 8 (4), 351-387, 2005
3202005
Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
Proceedings of 5th IEEE International Symposium on Service-Oriented System …, 2010
259*2010
Generalized dual-mode data forwarding plane for information-centric network
GQ Wang, R Ravindran, X Zhang
US Patent 8,694,675, 2014
2232014
Securing elastic applications on mobile devices for cloud computing
X Zhang, J Schiffman, S Gibbs, A Kunjithapatham, S Jeong
Proceedings of the 2009 ACM workshop on Cloud computing security, 127-134, 2009
2232009
Peer-to-peer access control architecture using trusted computing technology
R Sandhu, X Zhang
Proceedings of the tenth ACM symposium on Access control models and …, 2005
2112005
Principal-identity-domain based naming scheme for information centric networks
X Zhang, G Wang, R Ravindran
US Patent 9,253,087, 2016
2032016
Virusmeter: Preventing your cellphone from spies
L Liu, G Yan, X Zhang, S Chen
International workshop on recent advances in intrusion detection, 244-264, 2009
1842009
Name-based neighbor discovery and multi-hop service discovery in information-centric networks
X Zhang, B Zhao, A Chakraborti, R Ravindran, G Wang
US Patent 9,515,920, 2016
1822016
Measurement of particle production and inclusive differential cross sections in collisions at
T Aaltonen, J Adelman, T Akimoto, BÁ González, S Amerio, D Amidei, ...
Physical Review D 79 (11), 112005, 2009
1812009
Protection of query privacy for continuous location based services
A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao
2011 Proceedings IEEE INFOCOM, 1710-1718, 2011
1702011
pBMDS: a behavior-based malware detection system for cellphone devices
L Xie, X Zhang, JP Seifert, S Zhu
Proceedings of the third ACM conference on Wireless network security, 37-48, 2010
1642010
Augmenting name/prefix based routing protocols with trust anchor in information-centric networks
X Zhang, H Xie, R Ravindran, G Wang
US Patent 9,009,465, 2015
1632015
CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud
L Xu, X Wu, X Zhang
1522012
Towards a VMM-based usage control framework for OS kernel integrity protection
M Xu, X Jiang, R Sandhu, X Zhang
Proceedings of the 12th ACM symposium on Access control models and …, 2007
1482007
The system can't perform the operation now. Try again later.
Articles 1–20