Citation Impact
Citing Papers
Information Privacy Research: an Interdisciplinary Review1
2011 Standout
On the Security of a Secure Batch Verification with Group Testing for VANET
2014
Conjugate relation between loss functions and uncertainty sets in classification problems
2013
A review of uncertainty quantification in deep learning: Techniques, applications and challenges
2021 Standout
Driving forces and barriers of Industry 4.0: Do multinational and small and medium-sized companies have equal opportunities?
2019 Standout
Sparse Subspace Clustering: Algorithm, Theory, and Applications
2013 Standout
A Secure Authentication Scheme for Telecare Medicine Information Systems
2010 Standout
Robust Face Recognition via Sparse Representation
2009 Standout
Deep learning in neural networks: An overview
2014 Standout
Internet of Things: A survey on the security of IoT frameworks
2017 Standout
Enabling IC Traceability via Blockchain Pegged to Embedded PUF
2019
Provably secure and efficient identification and key agreement protocol with user anonymity
2010
On the approximability of minimizing nonzero variables or unsatisfied relations in linear systems
1998
Secure Anonymous Key Distribution Scheme for Smart Grid
2015
A Survey of SIP Authentication and Key Agreement Schemes
2013 Standout
A taxonomy for privacy enhancing technologies
2015
High-speed high-security signatures
2012
On the generalization of soft margin algorithms
2002
Training a Single Sigmoidal Neuron Is Hard
2002
A threshold of ln n for approximating set cover
1998 Standout
Convexity, Classification, and Risk Bounds
2006
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
2015 Standout
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the gaussian integer method
2002
Kernel Methods for Pattern Analysis
2004 Standout
A polynomial time algorithm for the local testability problem of deterministic finite automata
1991
Gaussian Processes for Machine Learning
2005 Standout
Privacy and Anonymity Protection with Blind Threshold Signatures
2002
A Hybrid BlockChain-Based Identity Authentication Scheme for Multi-WSN
2020 Standout
Estimating the Support of a High-Dimensional Distribution
2001 Standout
The NP-completeness column
2005
False data injection attacks against state estimation in electric power grids
2011 Standout
Authentication Protocols for Internet of Things: A Comprehensive Survey
2017
An Efficient Privacy-Preserving Authentication Scheme for Energy Internet-Based Vehicle-to-Grid Communication
2019 Standout
Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings
2012
Guide to Elliptic Curve Cryptography
2004 Standout
Security of the J-PAKE Password-Authenticated Key Exchange Protocol
2015
Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems
2017 Standout
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
2016 Standout
Physical unclonable functions
2020 Standout
Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers
2010 Standout
On the approximability of minmax (regret) network optimization problems
2008
Distance learning techniques for ontology similarity measuring and ontology mapping
2017 Standout
SPECS: Secure and privacy enhancing communications schemes for VANETs
2010
b-SPECS+: Batch Verification for Secure Pseudonymous Authentication in VANET
2013
Principles and methods of testing finite state machines-a survey
1996 Standout
Ising formulations of many NP problems
2014 Standout
New Support Vector Algorithms
2000 Standout
${\cal CPAS}$: An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks
2012
Proof verification and the hardness of approximation problems
1998
An Identity-based Ring Signature Scheme with Enhanced Privacy
2006
A Survey on Recent Advances in Vehicular Network Security, Trust, and Privacy
2018 Standout
Works of Jacques Stern being referenced
Characterizations of some classes of regular events
1985
Complexity of some problems from the theory of automata
1985
Lattice Reduction: A Toolbox for the Cryptanalyst
1998
Security Arguments for Digital Signatures and Blind Signatures
2000 Standout
Advances in Cryptology — EUROCRYPT ’99
1999
The Hardness of Approximate Optima in Lattices, Codes, and Systems of Linear Equations
1997