Showing 1 - 17 results of 17 for search 'Bin-xing FANG', query time: 0.03s
Refine Results
-
1
A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG
Published 2015-12-01
Article -
2
Data privacy preservation for the search of Internet of things based on fine-grained authorization by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG
Published 2017-01-01
Article -
3
Survey on data preserving for the search of internet of things by Jia-hui WANG, Chuan-yi LIU, Bin-xing FANG
Published 2016-09-01
Article -
4
Survey on the search of Internet of Things by Yun-quan GAO, Xiao-yong LI, Bin-xing FANG
Published 2015-12-01
Article -
5
Location privacy preservation approach towards to content sharing on mobile online social network by Chao LI, Li-hua YIN, Kui GENG, Bin-xing FANG
Published 2016-11-01
Article -
6
Binary search on range of IPv6 prefix sets by Yu CUI, Zhi-hong TIAN, GHong-li ZHAN, Bin-xing FANG
Published 2013-06-01
Article -
7
Mining characteristic clusters:a density estimation approach by Yi HAN, Bin-xing FANG, Yan JIA, Bin ZHOU, Wei-hong AN
Published 2012-05-01
Article -
8
Spectral-clustering-based abnormal permission assignments hunting framework by Liang FANG, Li-hua YIN, Feng-hua LI, Bin-xing FANG
Published 2017-12-01
Article -
9
Research on architecture and algorithm for code resolution system in the internet of things by Hai-ning YU, Hong-li ZHANG, Bin-xing FANG, Xiang-zhan YU
Published 2012-11-01
Article -
10
Research towards IoT-oriented universal control system security model by Jin-cui YANG, Bin-xing FANG, Li-dong ZHAI, Fang-jiao ZHANG
Published 2012-11-01
Article -
11
-
12
Research on Webshell-based botnet by Ke LI, Bin-xing FANG, Xiang CUI, Qi-xu LIU, Zhi-tao YAN
Published 2016-06-01
Article -
13
Novel “rich cloud” based data disaster recovery strategy by Fei XIANG, Chuan-yi LIU, Bin-xing FANG, Chun-lu WANG, GRui-ming ZHON
Published 2013-06-01
Article -
14
Research on ciphertext search for the cloud environment by Fei XIANG, Chuan-yi LIU, Bin-xing FANG, Chun-lu WANG, HONGRui-ming Z
Published 2013-07-01
Article -
15
Measuring and analyzing node families in the Tor anonymous communication network by Xiao WANG, Bin-xing FANG, Pei-peng LIU, Li2 GUO, Jin-qiao SHI
Published 2015-02-01
Article -
16
Survey on cyber deception by Zhao-peng JIA, Bin-xing FANG, Chao-ge LIU, Qi-xu LIU, Jian-bao LIN
Published 2017-12-01
Article -
17