Thinkair: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading S Kosta, A Aucinas, P Hui, R Mortier, X Zhang 2012 Proceedings IEEE Infocom, 945-953, 2012 | 1558 | 2012 |
Apex: extending android permission model and enforcement with user-defined runtime constraints M Nauman, S Khan, X Zhang Proceedings of the 5th ACM symposium on information, computer and …, 2010 | 886 | 2010 |
Taming information-stealing smartphone applications (on android) Y Zhou, X Zhang, X Jiang, VW Freeh Trust and Trustworthy Computing: 4th International Conference, TRUST 2011 …, 2011 | 628 | 2011 |
Detecting unauthorized use of computing devices based on behavioral patterns L Xie, X Zhang, JP Seifert, O Aciicmez, A Latifi US Patent 8,595,834, 2013 | 494 | 2013 |
PBDM: a flexible delegation model in RBAC X Zhang, S Oh, R Sandhu Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 407 | 2003 |
Towards an elastic application model for augmenting the computing capabilities of mobile devices with cloud computing X Zhang, A Kunjithapatham, S Jeong, S Gibbs Mobile Networks and Applications 16, 270-284, 2011 | 374 | 2011 |
Formal model and policy specification of usage control X Zhang, F Parisi-Presicce, R Sandhu, J Park ACM Transactions on Information and System Security (TISSEC) 8 (4), 351-387, 2005 | 359 | 2005 |
Mobicloud: A secure mobile cloud framework for pervasive mobile computing and communication D Huang, X Zhang, M Kang, J Luo Proceedings of 5th IEEE International Symposium on Service-Oriented System …, 2010 | 297* | 2010 |
Securing elastic applications on mobile devices for cloud computing X Zhang, J Schiffman, S Gibbs, A Kunjithapatham, S Jeong Proceedings of the 2009 ACM workshop on Cloud computing security, 127-134, 2009 | 250 | 2009 |
Generalized dual-mode data forwarding plane for information-centric network GQ Wang, R Ravindran, X Zhang US Patent 8,694,675, 2014 | 245 | 2014 |
Peer-to-peer access control architecture using trusted computing technology R Sandhu, X Zhang Proceedings of the tenth ACM symposium on Access control models and …, 2005 | 231 | 2005 |
CL-PRE: a Certificateless Proxy Re-Encryption Scheme for Secure Data Sharing with Public Cloud L Xu, X Wu, X Zhang | 219 | 2012 |
Principal-identity-domain based naming scheme for information centric networks X Zhang, GQ Wang, R Ravindran US Patent 9,253,087, 2016 | 216 | 2016 |
Protection of query privacy for continuous location based services A Pingley, N Zhang, X Fu, HA Choi, S Subramaniam, W Zhao 2011 Proceedings IEEE INFOCOM, 1710-1718, 2011 | 205 | 2011 |
Virusmeter: Preventing your cellphone from spies L Liu, G Yan, X Zhang, S Chen Recent Advances in Intrusion Detection: 12th International Symposium, RAID …, 2009 | 200 | 2009 |
Name-based neighbor discovery and multi-hop service discovery in information-centric networks X Zhang, B Zhao, A Chakraborti, R Ravindran, GQ Wang US Patent 9,515,920, 2016 | 190 | 2016 |
pBMDS: a behavior-based malware detection system for cellphone devices L Xie, X Zhang, JP Seifert, S Zhu Proceedings of the third ACM conference on Wireless network security, 37-48, 2010 | 181 | 2010 |
Augmenting name/prefix based routing protocols with trust anchor in information-centric networks X Zhang, H Xie, R Ravindran, GQ Wang US Patent 9,009,465, 2015 | 170 | 2015 |
Towards a VMM-based usage control framework for OS kernel integrity protection M Xu, X Jiang, R Sandhu, X Zhang Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 170 | 2007 |
AppInk: watermarking android apps for repackaging deterrence W Zhou, X Zhang, X Jiang Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 163 | 2013 |