1.5K
Articles
11.9K
Citations
1.9
avg. Impact Factor
45
h-index

Most Cited Articles of School of Mathematics and Computer Science

TitleJournalYearCitations
Securely Outsourcing Attribute-Based Encryption with CheckabilityIEEE Transactions on Parallel and Distributed Systems2014306
Solutions for Quasilinear Schrödinger Equations via the Nehari MethodCommunications in Partial Differential Equations2004291
An Efficient Public Auditing Protocol With Novel Dynamic Structure for Cloud DataIEEE Transactions on Information Forensics and Security2017231
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cardsJournal of Network and Computer Applications2011202
Quantum secure direct communication with χ-type entangled statesPhysical Review A2008198
CVAP: Validation for Cluster AnalysesData Science Journal2009178
New Publicly Verifiable Databases with Efficient UpdatesIEEE Transactions on Dependable and Secure Computing2015177
New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear EquationsIEEE Transactions on Information Forensics and Security2015163
Secure sharing of Personal Health Records in cloud computing: Ciphertext-Policy Attribute-Based SigncryptionFuture Generation Computer Systems2015139
Computation Offloading Toward Edge ComputingProceedings of the IEEE2019127
Can Likert Scales be Treated as Interval Scales?—A Simulation StudyJournal of Social Service Research2017120
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server ArchitecturesIEEE Transactions on Information Forensics and Security2016117
Secure Distributed Deduplication Systems with Improved ReliabilityIEEE Transactions on Computers2015109
ELECTRE II method to deal with probabilistic linguistic term sets and its application to edge computingNonlinear Dynamics2019101
Server-Aided Public Key Encryption With Keyword SearchIEEE Transactions on Information Forensics and Security2016101
Enhancing Privacy and Availability for Data Clustering in Intelligent Electrical Service of IoTIEEE Internet of Things Journal2019100
Verifiable Auditing for Outsourced Database in Cloud ComputingIEEE Transactions on Computers2015100
Weighted Sobolev embedding with unbounded and decaying radial potentialsJournal of Differential Equations2007100
Ground states of nonlinear Schrödinger equations with potentialsAnnales De L'Institut Henri Poincare (C) Analyse Non Lineaire200699
A Personalized Privacy Protection Framework for Mobile Crowdsensing in IIoTIEEE Transactions on Industrial Informatics202094
Certificateless Public Integrity Checking of Group Shared Data on Cloud StorageIEEE Transactions on Services Computing201878
Malicious sequential pattern mining for automatic malware detectionExpert Systems With Applications201678
NONLINEAR SCHRÖDINGER EQUATIONS WITH UNBOUNDED AND DECAYING RADIAL POTENTIALSCommunications in Contemporary Mathematics200774
Provably secure authenticated key agreement scheme for distributed mobile cloud computing servicesFuture Generation Computer Systems201772
Deep4MalDroid: A Deep Learning Framework for Android Malware Detection Based on Linux Kernel System Call Graphs201671