Showing 1 - 15 results of 15 for search 'Yu-qing ZHANG', query time: 0.01s
Refine Results
-
1
Adjusted automata learning algorithm for security protocol adaptive model checking by Jing YANG, Dan FAN, Yu-qing ZHANG
Published 2015-11-01
Article -
2
Optimal quinary cyclic codes with minimum distance four by Ye TIAN, Yu-qing ZHANG, Yu-pu HU
Published 2017-02-01
Article -
3
-
4
Lightweight detection system of shared spam attacks by Shao-qing LV, Dan FAN, Yu-qing ZHANG
Published 2015-07-01
Article -
5
Privacy leakage in online social networks based on public information by Shao-qing LV, Yu-qing ZHANG, Ping NI
Published 2013-08-01
Article -
6
Research of discovering vulnerabilities of NFC applications on Android platform by Zhi-qiang WANG, Qi-xu LIU, Yu-qing ZHANG
Published 2014-11-01
Article -
7
Research on HTML5 application cache poison attack by Yan JIA, He WANG, Shao-qing LYU, Yu-qing ZHANG
Published 2016-10-01
Article -
8
-
9
Research on security of third-party tracking by Yu-qing ZHANG, Qian-ru WU, Qi-xu LIU, Ying DONG
Published 2014-09-01
Article -
10
Android malware detection method based on permission sequential pattern mining algorithm by Huan YANG, Yu-qing ZHANG, Yu-pu HU, Qi-xu LIU
Published 2013-08-01
Article -
11
Extended algebraic immunity of symmetric Boolean function by Gao-fei WU, Xue-feng LIU, Ye TIAN, Yu-qing ZHANG
Published 2014-11-01
Article -
12
New bound of algebraic immunity of a class of Boolean function by Ye TIAN, Yu-qing ZHANG, Yu-pu HU, Gao-fei WU
Published 2016-10-01
Article -
13
Two-factor authenticated key agreement protocol based on biometric feature and password by Xiao-wei LI, Deng-qi YANG, Ben-hui CHEN, Yu-qing ZHANG
Published 2017-07-01
Article -
14
Research on key technology of vulnerability threat classification by Qi-xu LIU, Chong-bin ZHANG, Yu-qing ZHANG, Bao-feng ZHANG
Published 2012-09-01
Article -
15
Detecting Spam albums in online social network by Shao-qing LYU, Yu-qing ZHANG, Dong-hang LIU, Guang-hua ZHANG
Published 2016-09-01
Article