Follow
Qiwei Lu
Title
Cited by
Cited by
Year
Secure Collaborative Outsourced Data Mining with Multi-owner in Cloud Computing
Q Lu, Y Xiong, X Gong, W Huang
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
302012
Fast Similarity Search of Multi-Dimensional Time Series via Segment Rotation
X Gong, Y Xiong, W Huang, L Chen, Q Lu, Y Hu
Database Systems for Advanced Applications, 108-124, 2015
152015
A distributed ECC-DSS authentication scheme based on CRT-VSS and trusted computing in MANET
Q Lu, Y Xiong, W Huang, X Gong, F Miao
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 …, 2012
122012
Collaborative outsourced data mining for secure cloud computing
Y Huang, Q Lu, Y Xiong
Journal of Networks 9 (10), 2655-2664, 2014
102014
Fine-grained Refinement on TPM-based Protocol Applications
W Huang, Y Xiong, X Wang, F Miao, C Wu, X Gong, Q Lu
IEEE Transactions on Information Forensics and Security 8 (6), 1013-1026, 2013
102013
Privacy-Preserving Collaborative Filtering Based on Time-Drifting Characteristic
F ZHAO, Y XIONG, X LIANG, X GONG, Q LU
Chinese Journal of Electronics 25 (1), 2016
82016
Node behavior and identity-based trusted authentication in wireless sensor networks
T LIU, Y XIONG, W HUANG, Q LU, X GONG
Journal of Computer Applications 7, 017, 2013
52013
A Trusted Ad Hoc Routing Protocol Based on Fuzzy Mathematics
X GONG, Y XIONG, Q LU, F MIAO, W HUANG
Chinese Journal of Electronics 22 (1), 2013
52013
A trusted fair non-repudiation protocol based on dynamic third party in mobile ad hoc networks
CY Wu, Y Xiong, WC Huang, QW Lu, XD Gong
Chinese Journal of Electronics 41 (2), 227-232, 2013
32013
A Secure Adaptive Routing Strategy Using Immune Mechanism in MANET
Y Hu, Y Xiong, Q Lu, X Gong, W Huang
Chinese Journal of Electronics 22 (4), 2013
22013
Study on sagitta morphology of Chilean jack mackerel (Trachurus murphyi) in the southeast Pacific Ocean
C WU, X ZOU, M ZHANG, W ZHANG, B ZHOU, Q LU, S XU
Journal of Shanghai Ocean University 6, 016, 2011
22011
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
X Wang, Q Lu, Y Xiong, F Miao, W Huang, T LIU, X WU
Chinese Journal of Electronics 23 (2), 2014
12014
TARS: Trusted Adaptive Routing Strategy with Back-Off Observing Mechanism
Y Hu, Y Xiong, X Gong, Q Lu, M Li, W Huang
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 …, 2013
2013
Based on Chaos PSO algorithm optimize RBF network intrusion detection
Y Wang, Y Xiong, X Gong, Q Lu
Jisuanji Gongcheng yu Yingyong(Computer Engineering and Applications) 49 (10 …, 2013
2013
Dependable data survival scheme based on Chinese remainder theorem weighted threshold secret sharing in unattended WSN
M Han, Y Xiong, Q Lu, X Gong, T Liu
Jisuanji Yingyong/ Journal of Computer Applications 33 (5), 1343-1346, 2013
2013
Fine-grained Refinement on TPM-based Protocol Applications (Extended Version)
W Huang, Y Xiong, X Wang, F Miao, C Wu, XD Gong, Q Lu
2013
Replicator Dynamic Inspired Differential Evolution Algorithm for Global Optimization.
S Liu, Y Xiong, Q Lu, W Huang
IJCCI, 133-143, 2012
2012
Ad hoc network clock synchronization
QI Lu, C Wu
Application Research of Computers 12, 082, 2011
2011
The Application of SAVR2000 Excitation System in DaTun Mining Generators
G XING, Q LU
Journal of North China Institute of Science and Technology 3, 018, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–19