• Dong Wang

    Chinese Academy of Sciences, Beijing, China, and Graduate School of Chinese Academy of Sciences, Beijing, China

    information diffusion;tweets popularity;Sina microblog service;multiplicative cascade model;Chinese equivalent;social medium;stretched exponential

    Ranking

    11

    Hi-index

    292.64

  • Lin-na Zhou

    Department of Electronic Engineering, Tsinghua University, Beijing, China,Beijing Institute of Electronic Technology Application, Beijing, China

    multimedia security;digital multimedia forensics;digital watermarking;improved algorithm;improved scale invariant feature;SIFT ring descriptorRecent study;blind copy-paste detection;copy-paste fake combination;feature vector;forensics technique

    Ranking

    12

    Hi-index

    289.56

  • Mi Li

    International WIC Institute, Beijing University of Technology, Beijing, P.R. China 100022 and Liaoning ShiHua University, Liaoning, P.R. China 113001;The School of Computer and Communication Engineering, Liaoning ShiHua University, Liaoning, China, International WIC Institute, Beijing University of Technology, Beijing, China, Beijing Key Labora ...

    Web page;social statistical information;visual search;information form;memory encoding;floating ad;associative information processing;web information;Web commercial information;basic information form

    Ranking

    13

    Hi-index

    286.18

  • Zhongwen Zhang

    State Key Laboratory of Information Security, Institute of Information Engineering, CAS, Beijing, China,University of Chinese Academy of Sciences, Beijing, China

    monetary theft attack;routing information;DVM monitoringMonetary theft attack;anonymity scheme;existing scheme;secure anonymity scheme;Android system;DHT inquiry mechanism;DHT overlay;FSM-based detection approach

    Ranking

    14

    Hi-index

    284.87

  • Jinjing Zhao

    Beijing Institute of System Engineering, Beijing, China, National Key Laboratory of Science and Technology on Information System Security, Beijing, China

    Web service;security architecture;Web service application;Web services platform;Web services technology;common security requirement;new security implementation approach;security flaw;security requirement;specific security requirement

    Ranking

    15

    Hi-index

    283.57

  • Dongxia Wang

    Beijing Institute of System Engineering, Beijing, China, National Key Laboratory of Science and Technology on Information System Security, Beijing, China

    Web service;security architecture;Web service application;NetworkThe traditional security model;common security requirement;existing security model;new security implementation approach;security demand;security flaw;security framework

    Ranking

    16

    Hi-index

    283.57

  • Ruxia Ma

    University of China, Beijing, China, The Capital Normal University, Beijing, China

    personal information;search engine;Preserving privacy;privacy attack Privacy Inference;privacy inference attack;privacy information;privacy leakage;scattered information;user information;Privacy Leakage Detection Probability

    Ranking

    17

    Hi-index

    283.57

  • Yuqing Zhang

    State Key Lab on ISN, Xidian University, Xi'an, 710071, P. R. China, Institute of Information Security, Xidian University, Xi'an, 710071, P. R. China;State Key Laboratory of Information Security, GSCAS, Beijing, P.R. China;National Computer Network Intrusion Protection Center, GUCAS, Beijing, PR China;National Computer Network Intrusion Protection Center, GUCAS, Beijing,;National Computer Network Intrusion Protection Center, GUCAS, Beijing 100049, PR China and School of Information Science and Engineering, GUCAS, Beijing 100190, PR China;National Computer Network Intrusion Protection Center, Graduate University of Chinese Academy of Sciences, Beijing 100049, China and State Key Laboratory of Information Security, Graduate Universi ...;National Computer Network Intrusion Protection Center, Beijing, China;University of Chinese Academy of Sciences, Beijing, China

    Running-Mode Analysis;TFTP server;vulnerability rating system;vulnerability type;dishonest recommendation;two-party security protocol;CVE vulnerability;logic vulnerability;common program analysis;Needham-Schroeder public-key protocol

    Ranking

    18

    Hi-index

    278.94

  • Bin Wang

    Institute of Computing Technology, Zhongguanchun, Beijing, China;ICT, CAS, Beijing, China;ICT, Beijing, CHINA;Institute of Computational Technology, Beijing, China;Institute of Computing Technology, Beijing, China

    term dependency;experimental result;retrieval performance;information retrieval;language model estimation;retrieval model;dual role model;dynamic model;different query;query performance

    Ranking

    19

    Hi-index

    277.25

  • Liyun Ru

    Sohu Inc. R&D center;R&D center, Sohu Corporation, Beijing, People's Republic of China;Tsinghua University, Beijing, China;Sohu Inc. R&D center, Beijing, China;Sogou Incorporation, Beijing, China;State Key Lab of Intelligence Technology and Systems, Beijing, China

    Web search engine;experimental result;web spam;search engine;user behavior;Web access log;UA Web;Web information retrieval;Web page;Web search

    Ranking

    20

    Hi-index

    275.37