Issue Date | Title | Author(s) |
2010 | An Adjacency Matrixes-based Model for Network Security Analysis | Xie, Anming; Tang, Cong; Gui, Nike; Cai, Zhuhua; Hu, Jianbin; Chen, Zhong |
Feb-2021 | Characteristics, trend, and precursors of extreme cold events in northwestern North America | Shi, Jian; Wu, Kaijun; Qian, Weihong; Huang, Fei; Li, Chun; Tang, Cong |
12-May-2022 | Circular RNA vaccines against SARS-CoV-2 and emerging variants | Qu, Liang; Yi, Zongyi; Shen, Yong; Lin, Liangru; Chen, Feng; Xu, Yiyuan; Wu, Zeguang; Tang, Huixian; Zhang, Xiaoxue; Tian, Feng; Wang, Chunhui; Xiao, Xia; Dong, Xiaojing; Guo, Li; Lu, Shuaiyao; Yang, Chengyun; Tang, Cong; Yang, Yun; Yu, Wenhai; Wang, Junbin; Zhou, Yanan; Huang, Qing; Yisimayi, Ayijiang; Liu, Shuo; Huang, Weijin; Cao, Yunlong; Wang, Youchun; Zhou, Zhuo; Peng, Xiaozhong; Wang, Jianwei; Xie, Xiaoliang Sunney; Wei, Wensheng |
2011 | A distance bounding protocol using error state and punishment | Xin, Wei; Yang, Tao; Tang, Cong; Hu, Jianbin; Chen, Zhong |
2012 | Estimating age privacy leakage in online social networks | Dey, Ratan; Tang, Cong; Ross, Keith; Saxena, Nitesh |
2009 | Evaluating Network Security With Two-layer Attack Graphs | Xie, Anming; Cai, Zhuhua; Tang, Cong; Hu, Jianbin; Chen, Zhong |
2010 | A hybrid movie recommender based on ontology and neural networks | Deng, Yong; Wu, Zhonghai; Tang, Cong; Si, Huayou; Xiong, Hu; Chen, Zhong |
2015 | Making Tagging Systems Resistant to Tricky Spam Attacks | Li, Zhou; Tang, Cong; Hu, Jianbin; Chen, Zhong |
2011 | Message from the SIMNA 2011 co-chairs | Lua, Eng Keong; Chen, Ruichuan; Tang, Cong |
2011 | Need For Symmetry: Addressing Privacy Risks in Online Social Networks | Tang, Cong; Wang, Yonggang; Xiong, Hu; Yang, Tao; Hu, Jianbin; Shen, Qingni; Chen, Zhong |
2010 | On the privacy of peer-assisted distribution of security patches | Wu, Di; Tang, Cong; Dhungel, Prithula; Saxena, Nitesh; Ross, Keith W. |
2009 | SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks | Tang, Cong; Chen, Ruichuan; Cai, Zhuhua; Me, Anming; Hu, Jianbin; Tang, Liyong; Chen, Zhong |
2019 | Themis: Towards Decentralized Escrow of Cryptocurrencies without Trusted Third Parties | Meng, Hongwei; Bian, Evan; Tang, Cong |
2012 | Towards privacy-preserving RFID-based location-based services | Xin, Wei; Tang, Cong; Yang, Tao; Sun, Huiping; Chen, Zhong |
2017 | Versatile Routing and Self-Certifying Features Support for Secure Mobility in eXpressive Internet Architecture | Meng, Hongwei; Chen, Zhong; Hu, Jianbin; Song, Chuck; Tang, Cong |
2011 | VLSP: Enabling location privacy in vehicular location based services | Yang, Tao; Tang, Cong; Yu, Liangwen; Xin, Wei; Deng, Yong; Hu, Jianbin; Chen, Zhong |
2015 | Vulnerabilities Scoring Approach for Cloud SaaS | Li, Zhou; Tang, Cong; Hu, Jianbin; Chen, Zhong |
2011 | Yet Another Certificateless three-party authenticated key agreement protocol | Hu, Jianbin; Xiong, Hu; Guan, Zhi; Tang, Cong; Wang, Yonggang; Xin, Wei; Chen, Zhong |