Follow
Huiping Sun
Huiping Sun
Verified email at ss.pku.edu.cn - Homepage
Title
Cited by
Cited by
Year
Cqarank: jointly model topics and expertise in community question answering
L Yang, M Qiu, S Gottipati, F Zhu, J Jiang, H Sun, Z Chen
Proceedings of the 22nd ACM international conference on Information …, 2013
2762013
Using trust and risk in access control for grid environment
Y Li, H Sun, Z Chen, J Ren, H Luo
2008 International Conference on Security Technology, 13-16, 2008
332008
Sorcery: Could we make P2P content sharing systems robust to deceivers?
E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009
322009
Accelerating RSA with fine-grained parallelism using GPU
Y Yang, Z Guan, H Sun, Z Chen
Information Security Practice and Experience: 11th International Conference …, 2015
312015
RFID 标签所有权转移协议研究
金永明, 孙惠平, 关志, 陈钟
计算机研究与发展 48 (8), 1400-1405, 2011
292011
Permission-based abnormal application detection for Android
J Zhu, Z Guan, Y Yang, L Yu, H Sun, Z Chen
Information and Communications Security: 14th International Conference …, 2012
252012
Filtering spam in social tagging system with dynamic behavior analysis
B Liu, E Zhai, H Sun, Y Chen, Z Chen
2009 International Conference on Advances in Social Network Analysis and …, 2009
252009
Strategy proof trust management in wireless ad hoc network
H Sun, J Song
Canadian Conference on Electrical and Computer Engineering 2004 (IEEE Cat …, 2004
242004
PUF-based RFID authentication protocol against secret key leakage
Y Jin, W Xin, H Sun, Z Chen
Web Technologies and Applications: 14th Asia-Pacific Web Conference, APWeb …, 2012
212012
Spamclean: Towards spam-free tagging systems
E Zhai, H Sun, S Qing, Z Chen
2009 International Conference on Computational Science and Engineering 4 …, 2009
202009
Passapp: My app is my password!
H Sun, K Wang, X Li, N Qin, Z Chen
Proceedings of the 17th international conference on human-computer …, 2015
162015
Sorcery: Overcoming deceptive votes in P2P content sharing systems
E Zhai, H Sun, S Qing, Z Chen
Peer-to-Peer Networking and Applications 4, 178-191, 2011
152011
An efficient privacy-preserving RFID ownership transfer protocol
W Xin, Z Guan, T Yang, H Sun, Z Chen
Web Technologies and Applications: 15th Asia-Pacific Web Conference, APWeb …, 2013
122013
Hash-based tag ownership transfer protocol against traceability
Y Jin, H Sun, Z Chen
2009 IEEE International Conference on e-Business Engineering, 487-492, 2009
112009
A trust and risk framework to enhance reliable interaction in e-commerce
Y Li, M Zhao, H Sun, Z Chen
2008 IEEE International Conference on e-Business Engineering, 475-480, 2008
82008
Ownership transfer protocol for RFID tag
Y Jin, H Sun, Z Guan, Z Chen
Journal of Computer Research and Development 48 (8), 1400-1405, 2011
72011
Lightweight RFID mutual authentication protocol against feasible problems
Y Jin, H Sun, W Xin, S Luo, Z Chen
Information and Communications Security: 13th International Conference …, 2011
72011
SpamResist: making peer-to-peer tagging systems robust to spam
E Zhai, R Chen, EK Lua, L Zhang, H Sun, Z Cai, S Qing, Z Chen
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
72009
PassPage: Graphical Password Authentication Scheme Based on Web Browsing Records
X Chu, H Sun, Z Chen
1st Asia USEC - Workshop on Usable Security with FC 2020, 2020
62020
Towards privacy-preserving RFID-based location-based services
W Xin, C Tang, T Yang, H Sun, Z Chen
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
62012
The system can't perform the operation now. Try again later.
Articles 1–20