Yanjun Zuo, Ph.D. - Publications

Affiliations: 
2005 University of Arkansas, Little Rock, AR 
Area:
Computer Science

15 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Zuo Y, Liu J. A reputation-based model for mobile agent migration for information search and retrieval International Journal of Information Management. 37: 357-366. DOI: 10.1016/J.Ijinfomgt.2017.04.002  0.372
2013 Zuo Y. Survivability enhancing techniques for RFID systems Mobile and Handheld Computing Solutions For Organizations and End-Users. 37-53. DOI: 10.4018/Jhcr.2011010102  0.378
2013 Zuo Y, Panda B. Composition and combination-based object trust evaluation for knowledge management in virtual organizations Vine. 43: 296-321. DOI: 10.1108/Vine-03-2012-0004  0.535
2012 Zuo Y. Automatic Proof of Survivability Compliance -Approaches and Techniques International Journal of Computer Theory and Engineering. 740-744. DOI: 10.7763/Ijcte.2012.V4.569  0.302
2012 Zuo Y. Survivability experiment and attack characterization for RFID Ieee Transactions On Dependable and Secure Computing. 9: 289-302. DOI: 10.1109/Tdsc.2011.30  0.354
2010 Zuo Y. Secure and private search protocols for RFID systems Information Systems Frontiers. 12: 507-519. DOI: 10.1007/S10796-009-9208-6  0.36
2009 Zuo Y, Hu WC. Trust-based information risk management in a supply chain network International Journal of Information Systems and Supply Chain Management. 2: 19-34. DOI: 10.4018/Jisscm.2009070102  0.304
2007 Zuo Y. Component comparison based information quality assurance International Journal of Information Quality. 1: 295-313. DOI: 10.1504/Ijiq.2007.016393  0.364
2007 Zuo Y, O'Keefe T. Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system Information Systems Frontiers. 9: 451-467. DOI: 10.1007/S10796-007-9057-0  0.345
2006 Zuo Y, Panda B. Distributed database damage assessment paradigm Information Management and Computer Security. 14: 116-139. DOI: 10.1108/09685220610655870  0.564
2006 Zuo Y, Panda B. A trust-based model for information integrity in open systems Ifip International Federation For Information Processing. 193.  0.517
2005 Zuo Y, Panda B. External object trust zone mapping for information clustering Proceedings of the 3rd International Workshop On Security in Information Systems, Wosis 2005, in Conjunction With Iceis 2005. 196-206.  0.519
2005 Zuo Y, Panda B. A Trust-Based Model for Information Integrity in Open Systems Ifip Advances in Information and Communication Technology. 193: 337-354.  0.517
2004 Zuo Y, Panda B. Damage discovery in distributed database systems Ifip Advances in Information and Communication Technology. 144: 111-123.  0.517
2004 Zuo Y, Panda B. Fuzzy dependency and its applications in damage assessment and recovery Proceedings Fron the Fifth Annual Ieee System, Man and Cybernetics Information Assurance Workshop, Smc. 350-357.  0.471
Show low-probability matches.