×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [9]
Faculty of Busin... [2]
THE STATE KEY LA... [1]
Faculty of Educa... [1]
Authors
FONG SIMON JAMES [3]
WANG QIAN [2]
JIA WEI JIA [1]
GONG ZHIGUO [1]
PUN CHI MAN [1]
SI YAIN WHAR [1]
More...
Document Type
Journal article [9]
Conference paper [4]
Date Issued
2024 [3]
2023 [1]
2022 [3]
2021 [1]
2020 [1]
2017 [1]
More...
Language
英語English [13]
Source Publication
2007 IEEE Intern... [1]
3rd Internationa... [1]
Blockchain [1]
Fourth Internati... [1]
IEEE Transaction... [1]
IEEE Transaction... [1]
More...
Indexed By
SCIE [9]
CPCI-S [2]
SSCI [2]
其他 [1]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-10 of 13
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation
Journal article
Jiaxin Ran, Dechuan Li, Qixin Zheng, JEROME YEN, Yingjie Xue. Blockchain-enabled cross-border insurance: from legal issues, solution design, to implementation[J]. Blockchain, 2024, 2(1).
Authors:
Jiaxin Ran
;
Dechuan Li
;
Qixin Zheng
;
JEROME YEN
;
Yingjie Xue
Adobe PDF
|
Favorite
|
|
Submit date:2024/09/12
Cross-border Insurance
Blockchain
Cross-chain
Tee
Data Security
Vendor selection in the wake of data breaches: A longitudinal study
Journal article
Wang, Qian, Jiang, Shenyang, Ngai, Eric W.T., Huo, Baofeng. Vendor selection in the wake of data breaches: A longitudinal study[J]. Journal of Operations Management, 2024, 70(4), 568-599.
Authors:
Wang, Qian
;
Jiang, Shenyang
;
Ngai, Eric W.T.
;
Huo, Baofeng
Favorite
|
TC[WOS]:
4
TC[Scopus]:
4
IF:
6.5
/
9.2
|
Submit date:2024/05/16
Attention-based View
Data Breach
Electronic Medical Record Systems
Information Security
Information Technology Outsourcing
Vendor Selection
Predicting Power Outage at Low-Lying Area Substations During Storm Surge Disasters Using Multi-Grained Cascaded Forest
Journal article
Liu, Fengrui, Lao, Keng Weng, Gao, Liang, Lei, Chi Cheng, Hu, Xiaorui, Li, Yang. Predicting Power Outage at Low-Lying Area Substations During Storm Surge Disasters Using Multi-Grained Cascaded Forest[J]. IEEE Transactions on Industry Applications, 2024.
Authors:
Liu, Fengrui
;
Lao, Keng Weng
;
Gao, Liang
;
Lei, Chi Cheng
;
Hu, Xiaorui
; et al.
Favorite
|
TC[Scopus]:
2
IF:
4.2
/
4.5
|
Submit date:2024/05/16
Artificial Intelligence
Data Collection
Data Mining
Digital Twins
Feature Extraction
Power Supplies
Power System Security
Sea Measurements
Storm Surge
Surges
Tropical Cyclones
Urban Areas
Vectors
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT
Journal article
Rezaeibagha, Fatemeh, Mu, Yi, Huang, Ke, Chen, Lanxiang, Zhang, Leyou. Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT[J]. IEEE Transactions on Services Computing, 2023, 16(3), 1664-1672.
Authors:
Rezaeibagha, Fatemeh
;
Mu, Yi
;
Huang, Ke
;
Chen, Lanxiang
;
Zhang, Leyou
Favorite
|
TC[WOS]:
4
TC[Scopus]:
6
IF:
5.5
/
5.9
|
Submit date:2024/01/10
Cloud Computing
Data Security
Homomorphic Encryption
Internet Of Things
Firm diversity and data breach risk: A longitudinal study
Journal article
Wang, Qian, Ngai, Eric W.T.. Firm diversity and data breach risk: A longitudinal study[J]. JOURNAL OF STRATEGIC INFORMATION SYSTEMS, 2022, 31(4), 101743.
Authors:
Wang, Qian
;
Ngai, Eric W.T.
Favorite
|
TC[WOS]:
7
TC[Scopus]:
6
IF:
8.7
/
18.9
|
Submit date:2023/01/30
Data Breach Risk
Diversity Type
Firm Diversity
Information Security
Managerial Ability
Resource-based View
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs
Journal article
Gu, Ke, Dong, Xin Ying, Jia, Wei Jia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2), 1215-1232.
Authors:
Gu, Ke
;
Dong, Xin Ying
;
Jia, Wei Jia
Favorite
|
TC[WOS]:
30
TC[Scopus]:
28
IF:
5.3
/
4.6
|
Submit date:2022/08/05
Data Security
Fog Computing
Malicious Node
Reputation
Vanets
Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud
Journal article
Ullah, Fasee, Pun, Chi Man. Enabling Parity Authenticator-Based Public Auditing With Protection of a Valid User Revocation in Cloud[J]. IEEE Transactions on Computational Social Systems, 2022, 11(3), 3090-3107.
Authors:
Ullah, Fasee
;
Pun, Chi Man
Favorite
|
TC[WOS]:
4
TC[Scopus]:
4
IF:
4.5
/
4.6
|
Submit date:2022/08/05
Auditing
Authenticator
Cloud Computing
Costs
Data Privacy
Dynamics
Error Identification
Organizations
Parity Bits
Privacy
Recovery
Security
Servers
Tag
Time Division Multiplexing
User Revocation.
Secure Data Sequence Query Framework Based on Multiple Fogs
Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Sequence Query Framework Based on Multiple Fogs[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(4), 1883-1900.
Authors:
Gu, Ke
;
Wu, Na
;
Yin, Bo
;
Jia, Weijia
Favorite
|
TC[WOS]:
18
TC[Scopus]:
20
IF:
5.1
/
4.5
|
Submit date:2022/05/13
Data Sequence Query
Fog Computing
Merkle Hashing Tree
Security
Secure Data Query Framework for Cloud and Fog Computing
Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Query Framework for Cloud and Fog Computing[J]. IEEE Transactions on Network and Service Management, 2020, 17(1), 332-345.
Authors:
Gu, Ke
;
Wu, Na
;
Yin, Bo
;
Jia, Weijia
Favorite
|
TC[WOS]:
69
TC[Scopus]:
68
IF:
4.7
/
4.6
|
Submit date:2021/12/06
Cloud Computing
Data Query
Fog Computing
Security
DeMalC: A feature-rich machine learning framework for malicious call detection
Conference paper
Yuhong Li, Dongmei Hou, Aimin Pan, Zhiguo Gong. DeMalC: A feature-rich machine learning framework for malicious call detection[C], 2017, 1559-1567.
Authors:
Yuhong Li
;
Dongmei Hou
;
Aimin Pan
;
Zhiguo Gong
Favorite
|
TC[WOS]:
3
TC[Scopus]:
5
|
Submit date:2019/02/12
Antifraud App
Data Mining For Social Security
Malicious Call Detection