Riskranker: scalable and accurate zero-day android malware detection M Grace, Y Zhou, Q Zhang, S Zou, X Jiang Proceedings of the 10th international conference on Mobile systems …, 2012 | 806 | 2012 |
Fast, scalable detection of" piggybacked" mobile applications W Zhou, Y Zhou, M Grace, X Jiang, S Zou Proceedings of the third ACM conference on Data and application security and …, 2013 | 287 | 2013 |
Statistical analysis and prompting method and system for mobile terminal internet traffic C Luo, Y Zhang, S Zou, Y Lin US Patent App. 14/129,751, 2014 | 110 | 2014 |
WLC17-6: An enhanced energy saving mechanism in IEEE 802.16 e J Xiao, S Zou, B Ren, S Cheng IEEE Globecom 2006, 1-5, 2006 | 60 | 2006 |
Virtualknotter: Online virtual machine shuffling for congestion resolving in virtualized datacenter S Zou, X Wen, K Chen, S Huang, Y Chen, Y Liu, Y Xia, C Hu Computer networks 67, 141-153, 2014 | 58 | 2014 |
Are these Ads Safe: Detecting Hidden Attacks through the Mobile App-Web Interfaces. V Rastogi, R Shao, Y Chen, X Pan, S Zou, R Riley NDSS, 2016 | 56 | 2016 |
A new trust model based on recommendation evidence for P2P networks C Tian, SH Zou, WD Wang, SD Cheng CHINESE JOURNAL OF COMPUTERS-CHINESE EDITION- 31 (2), 270, 2008 | 51 | 2008 |
A group based reputation system for P2P networks H Tian, S Zou, W Wang, S Cheng International Conference on Autonomic and Trusted Computing, 342-351, 2006 | 46 | 2006 |
A relay-aided media access (RAMA) protocol in multirate wireless networks S Zou, B Li, H Wu, Q Zhang, W Zhu, S Cheng IEEE Transactions on vehicular technology 55 (5), 1657-1667, 2006 | 43 | 2006 |
Trust model based on reputation for peer-to-peer networks C TIAN, S ZOU, W WANG, S CHENG Journal on Communications 29 (4), 63, 2008 | 37* | 2008 |
Fault management for internet services: Modeling and algorithms X Huang, S Zou, W Wang, S Cheng 2006 IEEE International Conference on Communications 2, 854-859, 2006 | 37 | 2006 |
Efficient anonymous authenticated key agreement scheme for wireless body area networks T Li, Y Zheng, T Zhou Security and communication networks 2017, 2017 | 36 | 2017 |
A density control algorithm based on probability coverage model in wireless sensor networks LIU Li Journal of Beijing University of Posts and Telecommunications 28 (4), 14, 2005 | 31 | 2005 |
Heuristic algorithms for dynamic spectrum assignment in open spectrum system DD Hao, SH Zou, SD Cheng Journal of Software 19 (3), 479-491, 2008 | 25 | 2008 |
A low-cost and accurate indoor localization algorithm using label propagation based semi-supervised learning S Liu, H Luo, S Zou 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks …, 2009 | 24 | 2009 |
Method and system for performing parent control on mobile device J Ou, Y Chen, S Zou, Y Lin US Patent App. 14/129,765, 2014 | 23 | 2014 |
Constructing efficient peer-to-peer overlay topologies by adaptive connection establishment H Tian, S Zou, W Wang, S Cheng Computer communications 29 (17), 3567-3579, 2006 | 23 | 2006 |
Service management platform for configuring, monitoring, and managing mobile devices S Zou, Y Lin, W Shi, I Andersen, CC Edwards, D Fu, JH Ou, ... US Patent App. 13/842,096, 2013 | 22 | 2013 |
Method and system to subscribe, configure and move mobile telephone software service conveniently S Zou, Y Lin, W Shi US Patent 8,369,845, 2013 | 22 | 2013 |
A new trust model based on reputation and risk evaluation for P2P networks CQ Tian, SH Zou, HR Tian, WD Wang, SD Cheng Journal of Elect ronics & Information Technology 29 (7), 1628-1632, 2007 | 22 | 2007 |