Wormhole attack detection algorithms in wireless network coding systems S Ji, T Chen, S Zhong IEEE transactions on mobile computing 14 (3), 660-674, 2014 | 79 | 2014 |
Incentive mechanisms for discretized mobile crowdsensings S Ji, T Chen IEEE Transactions on Wireless Communications 15 (1), 146-161, 2015 | 23 | 2015 |
Efficient interaction-based neural ranking with locality sensitive hashing S Ji, J Shao, T Yang The World Wide Web Conference, 2858-2864, 2019 | 22 | 2019 |
DAWN: Defending against wormhole attacks in wireless network coding systems S Ji, T Chen, S Zhong, S Kak IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 664-672, 2014 | 18 | 2014 |
Privacy-aware ranking with tree ensembles on the cloud S Ji, J Shao, D Agun, T Yang The 41st international ACM SIGIR conference on research & development in …, 2018 | 15 | 2018 |
Refining Approximating Betweenness Centrality Based on Samplings S Ji, Z Yan https://arxiv.org/abs/1608.04472, 2016 | 15 | 2016 |
Image encryption schemes for JPEG and GIF formats based on 3D baker with compound chaotic sequence generator S Ji, X Tong, M Zhang arXiv preprint arXiv:1208.0999, 2012 | 15 | 2012 |
Privacy-aware document ranking with neural signals J Shao, S Ji, T Yang Proceedings of the 42nd International ACM SIGIR Conference on Research and …, 2019 | 12 | 2019 |
On designing collusion-resistant incentive mechanisms for mobile crowdsensing systems S Ji, T Chen 2017 IEEE Trustcom/BigDataSE/ICESS, 162-169, 2017 | 10 | 2017 |
Privacy and Efficiency Tradeoffs for Multiword Top K Search with Linear Additive Rank Scoring D Agun, J Shao, S Ji, S Tessaro, T Yang Proceedings of the 2018 world wide web conference, 1725-1734, 2018 | 8 | 2018 |
Index obfuscation for oblivious document retrieval in a trusted execution environment J Shao, S Ji, AO Glova, Y Qiao, T Yang, T Sherwood Proceedings of the 29th ACM International Conference on Information …, 2020 | 6 | 2020 |
Crowdsensing incentive mechanisms for mobile systems with finite precisions S Ji, T Chen 2014 IEEE International Conference on Communications (ICC), 2544-2549, 2014 | 6 | 2014 |
Window navigation with adaptive probing for executing blockmax wand J Shao, Y Qiao, S Ji, T Yang Proceedings of the 44th international ACM SIGIR conference on research and …, 2021 | 5 | 2021 |
Crowdsourcing with trembles: Incentive mechanisms for mobile phones with uncertain sensing time S Ji, T Chen, F Wu 2015 IEEE International Conference on Communications (ICC), 3546-3551, 2015 | 4 | 2015 |
On the correctness of inverted index based public-key searchable encryption scheme for multi-time search S Ji arXiv preprint arXiv:1608.06753, 2016 | 3 | 2016 |
Adaptive Modular Exponentiation Methods vs Python's Power Function S Ji, K Wan arXiv preprint arXiv:1707.01898, 2017 | 2 | 2017 |
Image encryption schemes for joint photographic experts group and graphics interchange format formats based on three-dimensional baker with compound chaotic sequence generator S Ji, X Tong, M Zhang Journal of Electronic Imaging 22 (1), 013017-013017, 2013 | 2 | 2013 |
Privacy-aware document retrieval with two-level inverted indexing Y Qiao, S Ji, C Wang, J Shao, T Yang Information Retrieval Journal 26 (1), 12, 2023 | 1 | 2023 |
k-Anonymously Private Search over Encrypted Data S Ji, K Wan arXiv preprint arXiv:1703.08269, 2017 | 1 | 2017 |
Privacy-aware Indexing and Ranking for Cloud Document Search S Ji University of California, Santa Barbara, 2020 | | 2020 |