登录
Xidian University
中文
0EV
8dp
8eS
rY1
2BR
huK
Gqj
0PR
GrB
MA0
dU4
ynU
ogo
yl3
HOZ
erO
RSV
wVC
ZJl
Afv
Home
Scientific Research
Research Field
Paper Publications
Patents
Published Books
Research Projects
Research Team
Teaching Research
Teaching Resources
Teaching Information
Teaching Achievement
Awards and Honours
Enrollment Information
Student Information
My Album
Blog
Current position:
Home
>>
Scientific Research
>>
Paper Publications
张玉清
Personal Information
Professor
Paper Publications
New bound of algebraic immunity of a class of Boolean function:Tongxin Xuebao/Journal on Communications,2016,37(10):92-98
Detecting Spam albums in online social network:Tongxin Xuebao/Journal on Communications,2016,37(9):82-91
Wang, Zhiqiang ; Zhang, Yuqing ; Liu, Qixu ; Huang, Tingpei ,Algorithm to detect Android malicious behaviors:Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University,2015,42(3):8-14
Zhang, Lili ; Wang, Fei ; Chang, Yanan ; Wang, Jian ,Private set intersection protocol based on threshold scheme in mobile social network:Recent Advances in Electrical and Electronic Engineering,2015,8(2):74-78
Wen, Tao ; Zhang, Yuqing ; Dong, Ying ; Yang, Gang ,A novel automatic severity vulnerability assessment framework:Journal of Communications,2015,10(5):320-329
Zhang, Guanghua ; Zhang, Yuqing ; Liu, Xuefeng ; Yan, Jingbo ,Behavior trust fuzzy evaluation model:Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University,2015,42(1):29-34
Wen, Tao ; Zhang, Yu-Qing ; Liu, Qi-Xu ; Yang, Gang ,UVDA: Design and implementation of automation fusion framework of heterogeneous security vulnerability database:Tongxin Xuebao/Journal on Communications,2015,36(10):235-244
Yan, Jingbo^Zhang, Yuqing^Liu, Xuefeng,Secure Multi-keyword Search Supporting Dynamic Update and Ranked Retrieval:CHINA COMMUNICATIONS,2016,13(10):209-221
Wang, Zhiqiang ; Zhang, Yuqing ; Liu, Qixu ; Huang, Tingpei ,Algorithm for discovering SNMP protocol vulnerability:Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University,2015,42(4):20-26 and 40
Zhang, Yu-Qing ; Lv, Shao-Qing ; Fan, Dan ,Anomaly detection in online social networks:Jisuanji Xuebao/Chinese Journal of Computers,2015,38(10):2011-2027
Efficient conjunctive keyword search over encrypted electronic medical records:Ruan Jian Xue Bao/Journal of Software,2016,27(6):1577-1591
Research on HTML5 application cache poison attack:Tongxin Xuebao/Journal on Communications,2016,37(10):149-157
Wang, Zhi-Qiang ; Liu, Qi-Xu ; Zhang, Yu-Qing ,Research of discovering vulnerabilities of NFC applications on Android platform:Tongxin Xuebao/Journal on Communications,2014,35:117-123
Wen, Tao ; Zhang, Yuqing ; Wu, Qianru ; Yang, Gang ,ASVC: An automatic security vulnerability categorization framework based on novel features of vulnerability data:Journal of Communications,2015,10(2):107-116
Zhang, Guanghua; Chen, Zhenguo; Tian, Liqin; Zhang, Dongwen,Using Trust to Establish a Secure Routing Model in Cognitive Radio Network:PLOS ONE,2015,10(9)
Lv, Shao-Qing ; Fan, Dan ; Zhang, Yu-Qing ,Lightweight detection system of shared spam attacks:Tongxin Xuebao/Journal on Communications,2015,36(7)
TOTAL 16 PIECE 1/1
FIRST
PREVIOUS
NEXT
LAST