Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography L Yan, C Rong, G Zhao Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009 | 254 | 2009 |
Trusted data sharing over untrusted cloud storage providers G Zhao, C Rong, J Li, F Zhang, Y Tang 2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010 | 204* | 2010 |
PERMIS: a modular authorization infrastructure D Chadwick, G Zhao, S Otenko, R Laborde, L Su, TA Nguyen Concurrency and Computation: Practice and Experience 20 (11), 1341-1357, 2008 | 131 | 2008 |
Fine-grained data access control systems with user accountability in cloud computing J Li, G Zhao, X Chen, D Xie, C Rong, W Li, L Tang, Y Tang 2010 IEEE Second International Conference on Cloud Computing Technology and …, 2010 | 126 | 2010 |
Fast algorithms to evaluate collaborative filtering recommender systems F Zhang, T Gong, VE Lee, G Zhao, C Rong, G Qu Knowledge-Based Systems 96, 96-103, 2016 | 124 | 2016 |
Schema conversion model of SQL database to NoSQL G Zhao, Q Lin, L Li, Z Li 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014 | 102 | 2014 |
Designing cloud-based electronic health record system with attribute-based encryption F Xhafa, J Li, G Zhao, J Li, X Chen, DS Wong Multimedia tools and applications 74, 3441-3458, 2015 | 98 | 2015 |
ContractGuard: Defend ethereum smart contracts with embedded intrusion detection X Wang, J He, Z Xie, G Zhao, SC Cheung IEEE Transactions on Services Computing 13 (2), 314-328, 2019 | 94 | 2019 |
Modeling MongoDB with relational model G Zhao, W Huang, S Liang, Y Tang 2013 Fourth International Conference on Emerging Intelligent Data and Web …, 2013 | 86 | 2013 |
Cloud computing: A statistics aspect of users G Zhao, J Liu, Y Tang, W Sun, F Zhang, X Ye, N Tang Cloud Computing: First International Conference, CloudCom 2009, Beijing …, 2009 | 73 | 2009 |
Cir-net: Automatic classification of human chromosome based on inception-resnet architecture C Lin, G Zhao, Z Yang, A Yin, X Wang, L Guo, H Chen, Z Ma, L Zhao, ... IEEE/ACM Transactions on Computational Biology and Bioinformatics 19 (3 …, 2020 | 60 | 2020 |
Deployment models: Towards eliminating security concerns from cloud computing G Zhao, C Rong, MG Jaatun, FE Sandnes 2010 International Conference on High Performance Computing & Simulation …, 2010 | 60 | 2010 |
Cloud Computing: First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings MG Jaatun, G Zhao, C Rong Springer Science & Business Media, 2009 | 52 | 2009 |
Proc. IAU Symp. 298, Setting the scene for Gaia and LAMOST XW Liu, S Feltzing, G Zhao, NA Walton, P Whitelock Cambridge Univ. Press, Cambridge, 2014 | 50 | 2014 |
MDP-based quantitative analysis framework for proof of authority X Liu, G Zhao, X Wang, Y Lin, Z Zhou, H Tang, B Chen 2019 International Conference on Cyber-Enabled Distributed Computing and …, 2019 | 41 | 2019 |
Reference deployment models for eliminating user concerns on cloud security G Zhao, C Rong, MG Jaatun, FE Sandnes The Journal of Supercomputing 61, 337-352, 2012 | 40 | 2012 |
Obligations for role based access control G Zhao, D Chadwick, S Otenko 21st International Conference on Advanced Information Networking and …, 2007 | 38 | 2007 |
Adaptive cross-contextual word embedding for word polysemy with unsupervised topic modeling S Li, R Pan, H Luo, X Liu, G Zhao Knowledge-Based Systems 218, 106827, 2021 | 34 | 2021 |
Deep learning for diagnosis and classification of obstructive sleep apnea: A nasal airflow-based multi-resolution residual network H Yue, Y Lin, Y Wu, Y Wang, Y Li, X Guo, Y Huang, W Wen, G Zhao, ... Nature and Science of Sleep, 361-373, 2021 | 33 | 2021 |
A survey on the efficiency, reliability, and security of data query in blockchain systems Q Zhang, Y He, R Lai, Z Hou, G Zhao Future Generation Computer Systems 145, 303-320, 2023 | 30 | 2023 |