Follow
Cong Tang
Cong Tang
Temi Group and PKU
Verified email at infosec.pku.edu.cn
Title
Cited by
Cited by
Year
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
1342012
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
International Conference on Database Systems for Advanced Applications, 344-356, 2011
1312011
Evaluating network security with two-layer attack graphs
A Xie, Z Cai, C Tang, J Hu, Z Chen
2009 Annual Computer Security Applications Conference, 127-136, 2009
442009
On scaling and accelerating decentralized private blockchains
W Xin, T Zhang, C Hu, C Tang, C Liu, Z Chen
2017 ieee 3rd international conference on big data security on cloud …, 2017
292017
PGC: Decentralized confidential payment system with auditability
Y Chen, X Ma, C Tang, MH Au
European Symposium on Research in Computer Security, 591-610, 2020
192020
A hybrid movie recommender based on ontology and neural networks
Y Deng, Z Wu, C Tang, H Si, H Xiong, Z Chen
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010
162010
A holistic mechanism against file pollution in peer-to-peer networks
Z Cai, R Chen, J Feng, C Tang, Z Chen, J Hu
Proceedings of the 2009 ACM symposium on Applied Computing, 28-34, 2009
152009
Need for symmetry: Addressing privacy risks in online social networks
C Tang, Y Wang, H Xiong, T Yang, J Hu, Q Shen, Z Chen
2011 IEEE International Conference on Advanced Information Networking and …, 2011
92011
PGC: pretty good decentralized confidential payment system with auditability
Y Chen, X Ma, C Tang, MH Au
Cryptology ePrint Archive, 2019
62019
Towards privacy-preserving RFID-based location-based services
W Xin, C Tang, T Yang, H Sun, Z Chen
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
62012
A novel framework to carry out cloud penetration test
J Hu, C Tang
International Journal of Computer Network and Information Security 3 (3), 1, 2011
62011
PGC: Pretty Good Confidential Transaction System with Accountability.
Y Chen, X Ma, C Tang, MH Au
IACR Cryptol. ePrint Arch. 2019, 319, 2019
52019
A distance bounding protocol using error state and punishment
W Xin, T Yang, C Tang, J Hu, Z Chen
2011 First International Conference on Instrumentation, Measurement …, 2011
52011
SKIP: A secure key issuing scheme for peer-to-peer networks
C Tang, R Chen, Z Cai, A Xie, J Hu, L Tang, Z Chen
2009 Fifth International Conference on Networking and Services, 296-302, 2009
52009
An adjacency matrixes-based model for network security analysis
A Xie, C Tang, N Gui, Z Cai, J Hu, Z Chen
2010 IEEE International Conference on Communications, 1-5, 2010
42010
Difo: discovering faulty obus in vanets
L Huang, H Meng, C Tang, W Song
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
32012
VLSP: enabling location privacy in vehicular location based services
T Yang, C Tang, L Yu, W Xin, Y Deng, J Hu, Z Chen
2011 First International Conference on Instrumentation, Measurement …, 2011
32011
Themis: Towards decentralized escrow of cryptocurrencies without trusted third parties
H Meng, E Bian, C Tang
2019 Sixth International Conference on Software Defined Systems (SDS), 266-271, 2019
22019
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture
H Meng, Z Chen, J Hu, C Song, C Tang
China Communications 14 (4), 73-88, 2017
22017
Vulnerabilities scoring approach for cloud SaaS
Z Li, C Tang, J Hu, Z Chen
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
22015
The system can't perform the operation now. Try again later.
Articles 1–20