• Min Huan Huang

    Beijing Institute of System Engineering, Beijing, China, National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineering, China, National Key Laboratory of Science and Technology on Information System Security, China

    Web service;security architecture;Web service application;reverse engineering;common security requirement;new security implementation approach;security etc.;security flaw;security requirement;security situation

    Ranking

    1

    Hi-index

    392.21

  • Deyi Li

    China Constitute of Electronic System Engineering, Beijing, China;Tsinghua University, China;Institute of Electronic System Engineering, Beijing, China;The Institute of Beijing Electronic System Engineering, Beijing, China;Institute of China Electronic System Engineering, Beijing, China;State Key Laboratory of Software Development Environment, Beijing University of Aeronautics and Astronautics, Beijing, China 100191 and Institute of Electronic System Engineering, Beijing, China 1 ...;China Institute of Electronic System Engineering, Beijing;Beijing Institute of Electronic System Engineering, Beijing, China;Beijing Institute of Electronic System Engineering, Beijing, 100039, China

    cloud model;complex network;cloud computing;network topology;proposed method;XML data;cloud generator;cloud security;normal cloud model;GPS data

    Ranking

    2

    Hi-index

    374.82

  • Yan Wen

    School of Computer, National University of Defense Technology, Changsha, China;Beijing Institute of System Engineerring, Beijing, China and National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineering, Beijing, China, National Key Laboratory of Science and Technology on Information System Security, Beijing, China

    OS isolation;host OS;untrusted code;virtual machine;OS image;OS resource;booted OS;dynamic OS migration;explicit OS implementation information;preinstalled OS

    Ranking

    3

    Hi-index

    354.97

  • Xiao-Hui Kuang

    Beijing Institute of System and Engineering, Beijing, China;National Key Laboratory of Science and Technology on Information System Security, Beijing, China;Beijing Institute of System Engineer, Beijing, China;National Key Laboratory of Science and Technology on Information System Security, Beijing, China, Beijing Institute of System Engineering, China

    network survivability;survivable network;Index System;Network Security;clustering algorithm;control network;different network layer;different network system;network application;network condition

    Ranking

    4

    Hi-index

    349.98

  • Liping Shao

    School of Computer Science, Shaanxi Normal University, Xi'an, China,School of Computer Science, Northwest Polytechnical University, Xi'an, China;School of Computer Science, Northwest Polytechnical University, Xi'an, China,School of Computer Science, Shaanxi Normal University, Xi'an, China

    image encryption algorithm;secret image;DCT multi-channel image information;ciphered image;complete image encryption algorithm;conventional image information;hided secret image;image histogram;image pixel distribution;multi-channel image information sharing

    Ranking

    5

    Hi-index

    329.48

  • Jiming Liu

    International WIC Institute, Beijing University of Technology, China, Beijing Key Laboratory of MRI and Brain Informatics, China, Dept. of Computer Science, Hong Kong Baptist University, China

    brain hypergraph model;brain network;brain networksThis paper;core brain intrinsic network;intrinsic brain organization;large-scale brain;important intrinsic information processing;intrinsic hub hyperedges;graph model;hypergraph model

    Ranking

    6

    Hi-index

    326.97

  • Chao Li

    Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China and Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China and Graduate School of C ...;Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, China,Graduate School of Chinese Academy of Sciences, Beijing, China

    social network;location information;MLN model;information propagation;communities structure;location cluster;regional influence analysis;Multi-Layer network;abundant information;information sharing

    Ranking

    7

    Hi-index

    312.92

  • Jun Xu

    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China

    implicit polynomial recovery;large root;cryptosystemA public key cryptosystem;partial private key recovery;private key;public key;implicit polynomial;combinatorial problem;partial information;lattice basis reduction

    Ranking

    8

    Hi-index

    293.60

  • Huimin Shuai

    State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China

    encrypted data;interactive sharing;data security;personal data;sensitive data;traditional data retrieval;access pattern privacy;index privacy;keyword privacy;privacy assurancesBreaches

    Ranking

    9

    Hi-index

    293.59

  • Xiankun Yang

    Institute of Remote Sensing Applications, Chinese Academy of Sciences, Beijing, China,Graduate University of Chinese Academy of Sciences, Beijing, China

    fusion image;image fusion method;multispectral image;proposed method;PAN image;false colour composite image;fusion result;fusion technique;important information;large data

    Ranking

    10

    Hi-index

    293.39