Year |
Citation |
Score |
2019 |
Liu A, Fu H, Hong Y, Liu J, Li Y. $LiveForen$ : Ensuring Live Forensic Integrity in the Cloud Ieee Transactions On Information Forensics and Security. 14: 2749-2764. DOI: 10.1109/Tifs.2019.2898841 |
0.409 |
|
2018 |
Zhu Y, Gurary J, Corser G, Oluoch J, Alnahash N, Fu H, Tang J. CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices Ieee Access. 6: 54795-54810. DOI: 10.1109/Access.2018.2872772 |
0.449 |
|
2017 |
Bassous R, Mansour A, Bassous R, Fu H, Zhu Y, Corser G. Ambiguous Multi-Symmetric Scheme and Applications Journal of Information Security. 8: 383-401. DOI: 10.4236/Jis.2017.84024 |
0.51 |
|
2017 |
Gurary J, Zhu Y, Fu H. Leveraging 3D Benefits for Authentication Int'L J. of Communications, Network and System Sciences. 10: 324-338. DOI: 10.4236/Ijcns.2017.108B035 |
0.403 |
|
2017 |
Alshehri A, Hewins A, McCulley M, Alshahrani H, Fu H, Zhu Y. Risks behind Device Information Permissions in Android OS Communications and Network. 9: 219-234. DOI: 10.4236/Cn.2017.94016 |
0.359 |
|
2017 |
Alshahrani H, Alzahrani A, Hanton A, Alshehri A, Fu H, Zhu Y. DroidData: Tracking and Monitoring Data Transmission in the Android Operating System Communications and Network. 9: 192-206. DOI: 10.4236/Cn.2017.93014 |
0.396 |
|
2017 |
Alzahrani A, Alqazzaz A, Almashfi N, Fu H, Zhu Y. Web Application Security Tools Analysis Studies in Media and Communication. 5: 118-131. DOI: 10.11114/Smc.V5I2.2663 |
0.358 |
|
2016 |
Corser GP, Fu H, Banihani A. Evaluating Location Privacy in Vehicular Communications and Applications Ieee Transactions On Intelligent Transportation Systems. 17: 2658-2667. DOI: 10.1109/Tits.2015.2506579 |
0.444 |
|
2014 |
Caushaj E, Ivanov I, Fu H, Sethi I, Zhu Y. Evaluating Throughput and Delay in 3G and 4G Mobile Architectures Journal of Computational Chemistry. 2: 1-8. DOI: 10.4236/Jcc.2014.210001 |
0.363 |
|
2014 |
Zhu Y, Vikram A, Fu H, Guan Y. On non-cooperative multiple-target tracking with wireless sensor networks Ieee Transactions On Wireless Communications. 13: 6496-6510. DOI: 10.1109/Twc.2014.2329306 |
0.364 |
|
2014 |
Zhu Y, Vikram A, Fu H. On topology of sensor networks deployed for multitarget tracking Ieee Transactions On Intelligent Transportation Systems. 15: 1489-1498. DOI: 10.1109/Tits.2014.2301033 |
0.381 |
|
2014 |
Shao C, Leng S, Zhang Y, Fu H. A multi-priority supported medium access control in Vehicular Ad Hoc Networks Computer Communications. 39: 11-21. DOI: 10.1016/J.Comcom.2013.11.002 |
0.461 |
|
2013 |
Lun R, Zhu Y, Fu H. BISTRO: BitTorrent Based on Space-Time Trade-Off Communications and Network. 5: 618-624. DOI: 10.4236/Cn.2013.53B2111 |
0.379 |
|
2013 |
Corser GP, Arslanturk S, Oluoch J, Fu H, Corser GE. Knowing the Enemy at the Gates: Measuring Attacker Motivation International Journal of Interdisciplinary Telecommunications and Networking. 5: 83-95. DOI: 10.4018/Jitn.2013040107 |
0.433 |
|
2013 |
Caushaj E, Fu H, Sethi I, Badih H, Watson D, Zhu Y, Leng S. Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications International Journal of Interdisciplinary Telecommunications and Networking. 5: 66-82. DOI: 10.4018/Jitn.2013040106 |
0.403 |
|
2012 |
Wang Q, Leng S, Fu H, Zhang Y. An IEEE 802.11p-Based Multichannel MAC Scheme With Channel Coordination for Vehicular Ad Hoc Networks Ieee Transactions On Intelligent Transportation Systems. 13: 449-458. DOI: 10.1109/Tits.2011.2171951 |
0.535 |
|
2011 |
Fu Y, Zhu Y, Fu H. Preserving Privacy in Time Series Data Mining International Journal of Data Warehousing and Mining. 7: 64-85. DOI: 10.4018/Jdwm.2011100104 |
0.365 |
|
2011 |
Zhu Y, Fu H. Traffic analysis attacks on Skype VoIP calls Computer Communications. 34: 1202-1212. DOI: 10.1016/J.Comcom.2010.12.007 |
0.535 |
|
2011 |
Weerasinghe HD, Tackett R, Fu H. Verifying position and velocity for vehicular ad-hoc networks Security and Communication Networks. 4: 785-791. DOI: 10.1002/Sec.231 |
0.419 |
|
2010 |
He Y, Han Z, Fu H, Qu G. The Formal Model of DBMS Enforcing Multiple Security Polices Journal of Software. 5: 514-521. DOI: 10.4304/Jsw.5.5.514-521 |
0.386 |
|
2010 |
Zhu Y, Fu Y, Fu H. On privacy-preserving time series data classification International Journal of Data Mining, Modelling and Management. 2: 117-136. DOI: 10.1504/Ijdmmm.2010.032145 |
0.534 |
|
2008 |
Fu H, Kawamura S, Zhang M, Zhang L. Replication attack on random key pre-distribution schemes for wireless sensor networks Computer Communications. 31: 842-857. DOI: 10.1016/J.Comcom.2007.10.026 |
0.479 |
|
2007 |
Leng S, Zhang L, Fu H, Yang J. A Novel Location-Service Protocol Based on $k$ -Hop Clustering for Mobile Ad Hoc Networks Ieee Transactions On Vehicular Technology. 56: 810-817. DOI: 10.1109/Tvt.2007.891425 |
0.49 |
|
2007 |
Leng S, Zhang L, Fu H, Yang J. Mobility analysis of mobile hosts with random walking in ad hoc networks Computer Networks. 51: 2514-2528. DOI: 10.1016/J.Comnet.2006.11.011 |
0.384 |
|
2006 |
Mangipudi KV, Katti RS, Fu H. Authentication and Key Agreement Protocols Preserving Anonymity International Journal of Network Security. 3: 259-270. DOI: 10.6633/Ijns.200611.3(3).07 |
0.488 |
|
2006 |
Fu H, Zhang M. Online adaptive firewall allocation in internet data center Computer Communications. 29: 1858-1867. DOI: 10.1016/J.Comcom.2005.05.011 |
0.506 |
|
2006 |
Fu H. On parameter estimation of a simple real-time flow aggregation model International Journal of Communication Systems. 19: 795-808. DOI: 10.1002/Dac.770 |
0.378 |
|
2003 |
Fu H, Zhang L. Low cost pre-stored video transmission across networks Computer Communications. 26: 2061-2069. DOI: 10.1016/S0140-3664(03)00190-7 |
0.528 |
|
2003 |
Fu H, Zhang L. Variable segmentation based on intrinsic video rate characteristics to transport pre-stored video across networks International Journal of Communication Systems. 16: 923-934. DOI: 10.1002/Dac.629 |
0.49 |
|
2001 |
Zhang L, Fu H. Adaptive bandwidth allocation based on playback tunnel to support video on demand service over ATM networks Computer Communications. 24: 1485-1496. DOI: 10.1016/S0140-3664(01)00301-2 |
0.561 |
|
2001 |
Zhang L, Fu H. Optional dynamic bandwidth allocation based on playback tunnel to support video-on-demand service in virtual private networks Computer Communications. 24: 1019-1030. DOI: 10.1016/S0140-3664(00)00340-6 |
0.573 |
|
2001 |
Zhang L, Fu H, Ng CH. Dynamic bandwidth allocation and buffer dimensioning under equal segment scheme to support video-on-demand services International Journal of Communication Systems. 14: 941-960. DOI: 10.1002/Dac.517 |
0.511 |
|
2000 |
Zhang L, Fu H. A novel scheme of transporting pre-stored MPEG video to support video-on-demand (VoD) services Computer Communications. 23: 133-148. DOI: 10.1016/S0140-3664(99)00161-9 |
0.506 |
|
2000 |
Zhang L, Fu H. Dynamic bandwidth allocation and buffer dimensioning for supporting video-on-demand services in virtual private networks Computer Communications. 23: 1410-1424. DOI: 10.1016/S0140-3664(00)00186-9 |
0.499 |
|
Show low-probability matches. |