Su jinshu
Cited by
Cited by
An efficient pseudonymous authentication scheme with strong privacy preservation for vehicular communications
Y Sun, R Lu, X Lin, X Shen, J Su
IEEE Transactions on Vehicular Technology 59 (7), 3589-3603, 2010
The TianHe-1A supercomputer: its hardware and software
XJ Yang, XK Liao, K Lu, QF Hu, JQ Song, JS Su
Journal of computer science and technology 26 (3), 344-351, 2011
Optimizing the makespan and reliability for workflow applications with reputation and a look-ahead genetic algorithm
X Wang, CS Yeo, R Buyya, J Su
Future Generation Computer Systems 27 (8), 1124-1134, 2011
Advances in machine learning based text categorization
苏金树, 张博锋, 徐昕
Journal of software 17 (9), 1848-1859, 2006
A survey on regular expression matching for deep packet inspection: Applications, algorithms, and hardware platforms
C Xu, S Chen, J Su, SM Yiu, LCK Hui
IEEE Communications Surveys & Tutorials 18 (4), 2991-3029, 2016
CloudEyes: Cloud‐based malware detection with reversible sketch for resource‐constrained internet of things (IoT) devices
H Sun, X Wang, R Buyya, J Su
Software: Practice and Experience 47 (3), 421-441, 2017
RLM: A general model for trust representation and aggregation
X Wang, L Liu, J Su
IEEE Transactions on Services Computing 5 (1), 131-143, 2010
Dynamic edge computation offloading for Internet of Things with energy harvesting: A learning method
Z Wei, B Zhao, J Su, X Lu
IEEE Internet of Things Journal 6 (3), 4436-4447, 2018
ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
J Su, D Cao, B Zhao, X Wang, I You
Future Generation Computer Systems 33, 11-18, 2014
A blockchain based witness model for trustworthy cloud service level agreement enforcement
H Zhou, X Ouyang, Z Ren, J Su, C de Laat, Z Zhao
IEEE INFOCOM 2019-IEEE conference on computer Communications, 1567-1575, 2019
Roadside units deployment for efficient short-time certificate updating in VANETs
Y Sun, X Lin, R Lu, X Shen, J Su
2010 IEEE international conference on communications, 1-5, 2010
Attribute-based encryption schemes
苏金树, 曹丹, 王小峰, 孙一品, 胡乔林
Journal of Software 22 (6), 1299-1315, 2011
OverWatch: a cross‐plane DDoS attack defense framework with collaborative intelligence in SDN
B Han, X Yang, Z Sun, J Huang, J Su
Security and Communication Networks 2018 (1), 9649643, 2018
Mix-zones optimal deployment for protecting location privacy in VANET
Y Sun, B Zhang, B Zhao, X Su, J Su
Peer-to-Peer Networking and Applications 8, 1108-1121, 2015
A new multistage approach to detect subtle DDoS attacks
F Wang, H Wang, X Wang, J Su
Mathematical and Computer Modelling 55 (1-2), 198-213, 2012
Self-supported cooperative networking for emergency services in multi-hop wireless networks
B Han, J Li, J Su, J Cao
IEEE Journal on Selected Areas in Communications 30 (2), 450-457, 2012
A class-incremental learning method for multi-class support vector machines in text classification
BF Zhang, JS Su, X Xu
2006 International Conference on Machine Learning and Cybernetics, 2581-2585, 2006
Secrecy capacity optimization via cooperative relaying and jamming for WANETs
B Han, J Li, J Su, M Guo, B Zhao
IEEE Transactions on Parallel and Distributed Systems 26 (4), 1117-1128, 2014
Cupid: Congestion-free consistent data plane update in software defined networks
W Wang, W He, J Su, Y Chen
IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer …, 2016
Towards practical privacy-preserving decision tree training and evaluation in the cloud
L Liu, R Chen, X Liu, J Su, L Qiao
IEEE Transactions on Information Forensics and Security 15, 2914-2929, 2020
The system can't perform the operation now. Try again later.
Articles 1–20