Browsing by Author Tang, Cong

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 18 of 18
Issue DateTitleAuthor(s)
2010An Adjacency Matrixes-based Model for Network Security AnalysisXie, Anming; Tang, Cong; Gui, Nike; Cai, Zhuhua; Hu, Jianbin; Chen, Zhong
Feb-2021Characteristics, trend, and precursors of extreme cold events in northwestern North AmericaShi, Jian; Wu, Kaijun; Qian, Weihong; Huang, Fei; Li, Chun; Tang, Cong
12-May-2022Circular RNA vaccines against SARS-CoV-2 and emerging variantsQu, Liang; Yi, Zongyi; Shen, Yong; Lin, Liangru; Chen, Feng; Xu, Yiyuan; Wu, Zeguang; Tang, Huixian; Zhang, Xiaoxue; Tian, Feng; Wang, Chunhui; Xiao, Xia; Dong, Xiaojing; Guo, Li; Lu, Shuaiyao; Yang, Chengyun; Tang, Cong; Yang, Yun; Yu, Wenhai; Wang, Junbin; Zhou, Yanan; Huang, Qing; Yisimayi, Ayijiang; Liu, Shuo; Huang, Weijin; Cao, Yunlong; Wang, Youchun; Zhou, Zhuo; Peng, Xiaozhong; Wang, Jianwei; Xie, Xiaoliang Sunney; Wei, Wensheng
2011A distance bounding protocol using error state and punishmentXin, Wei; Yang, Tao; Tang, Cong; Hu, Jianbin; Chen, Zhong
2012Estimating age privacy leakage in online social networksDey, Ratan; Tang, Cong; Ross, Keith; Saxena, Nitesh
2009Evaluating Network Security With Two-layer Attack GraphsXie, Anming; Cai, Zhuhua; Tang, Cong; Hu, Jianbin; Chen, Zhong
2010A hybrid movie recommender based on ontology and neural networksDeng, Yong; Wu, Zhonghai; Tang, Cong; Si, Huayou; Xiong, Hu; Chen, Zhong
2015Making Tagging Systems Resistant to Tricky Spam AttacksLi, Zhou; Tang, Cong; Hu, Jianbin; Chen, Zhong
2011Message from the SIMNA 2011 co-chairsLua, Eng Keong; Chen, Ruichuan; Tang, Cong
2011Need For Symmetry: Addressing Privacy Risks in Online Social NetworksTang, Cong; Wang, Yonggang; Xiong, Hu; Yang, Tao; Hu, Jianbin; Shen, Qingni; Chen, Zhong
2010On the privacy of peer-assisted distribution of security patchesWu, Di; Tang, Cong; Dhungel, Prithula; Saxena, Nitesh; Ross, Keith W.
2009SKIP: A Secure Key Issuing Scheme for Peer-to-Peer NetworksTang, Cong; Chen, Ruichuan; Cai, Zhuhua; Me, Anming; Hu, Jianbin; Tang, Liyong; Chen, Zhong
2019Themis: Towards Decentralized Escrow of Cryptocurrencies without Trusted Third PartiesMeng, Hongwei; Bian, Evan; Tang, Cong
2012Towards privacy-preserving RFID-based location-based servicesXin, Wei; Tang, Cong; Yang, Tao; Sun, Huiping; Chen, Zhong
2017Versatile Routing and Self-Certifying Features Support for Secure Mobility in eXpressive Internet ArchitectureMeng, Hongwei; Chen, Zhong; Hu, Jianbin; Song, Chuck; Tang, Cong
2011VLSP: Enabling location privacy in vehicular location based servicesYang, Tao; Tang, Cong; Yu, Liangwen; Xin, Wei; Deng, Yong; Hu, Jianbin; Chen, Zhong
2015Vulnerabilities Scoring Approach for Cloud SaaSLi, Zhou; Tang, Cong; Hu, Jianbin; Chen, Zhong
2011Yet Another Certificateless three-party authenticated key agreement protocolHu, Jianbin; Xiong, Hu; Guan, Zhi; Tang, Cong; Wang, Yonggang; Xin, Wei; Chen, Zhong