| Hierarchical attribute reduction algorithms for big data using MapReduce J Qian, P Lv, X Yue, C Liu, Z Jing Knowledge-Based Systems 73, 18-31, 2015 | 129 | 2015 |
| Wireless sensor network routing optimization based on improved ant colony algorithm in the Internet of Things H Han, J Tang, Z Jing Heliyon 10 (1), 2024 | 55 | 2024 |
| A practical public key encryption scheme based on learning parity with noise Z Yu, C Gao, Z Jing, BB Gupta, Q Cai IEEE Access 6, 31918-31923, 2018 | 42 | 2018 |
| QoS aware routing protocol through cross-layer approach in asynchronous duty-cycled WSNs P Shi, C Gu, C Ge, Z Jing IEEE Access 7, 57574-57591, 2019 | 21 | 2019 |
| Cryptanalysis of lattice-based key exchange on small integer solution problem and its improvement Z Jing, C Gu, Z Yu, P Shi, C Gao Cluster Computing 22 (Suppl 1), 1717-1727, 2019 | 17 | 2019 |
| Security analysis of indistinguishable obfuscation for internet of medical things applications Z Jing, C Gu, Y Li, M Zhang, G Xu, A Jolfaei, P Shi, C Tan, X Zheng Computer Communications 161, 202-211, 2020 | 16 | 2020 |
| A security‐enhanced equipment predictive maintenance solution for the ETO manufacturing X Cao, Z Jing, X Zhao, X Xu International Journal of Network Management 34 (6), e2263, 2024 | 13 | 2024 |
| Sparse trust data mining P Nie, G Xu, L Jiao, S Liu, J Liu, W Meng, H Wu, M Feng, W Wang, Z Jing, ... IEEE Transactions on Information Forensics and Security 16, 4559-4573, 2021 | 11 | 2021 |
| Dynamical interaction between information and disease spreading in populations of moving agents L Xia, B Song, Z Jing, Y Song, L Zhang Computers, Materials and Continua, 2018 | 11 | 2018 |
| An Atomic Cross‐Chain Swap‐Based Management System in Vehicular Ad Hoc Networks C Tan, S Bei, Z Jing, N Xiong Wireless Communications and Mobile Computing 2021 (1), 6679654, 2021 | 10 | 2021 |
| On the design and implementation of a blockchain-based data management system for ETO manufacturing Z Jing, N Hu, Y Song, B Song, C Gu, L Pan Applied Sciences 12 (18), 9184, 2022 | 8 | 2022 |
| A security-enhanced advertising platform based on blockchain and edge computing in generative AI Z Jing, X Xu, C Gu, Y Zhang, Q Shu Applied Artificial Intelligence 38 (1), 2340395, 2024 | 7 | 2024 |
| Anomaly Detection in Wireless Sensor Networks Based on Improved GM Model H Han, Z Jing Tehnički vjesnik 30 (4), 1265-1273, 2023 | 5 | 2023 |
| A Novel Affective Analysis System Modeling Method Integrating Affective Cognitive Model and Bi‐LSTM Neural Network Z Yang, L Zhou, Z Jing Computational Intelligence and Neuroscience 2022 (1), 1856496, 2022 | 5 | 2022 |
| Cryptanalysis of a public key cryptosystem based on data complexity under quantum environment Z Jing, C Gu, C Ge, P Shi Mobile Networks and Applications 26 (4), 1609-1615, 2021 | 5 | 2021 |
| ID-based multi-receiver signcryption scheme in the standard model Z Yu, Z Jing, H Yang, C Gu International Journal of Internet Protocol Technology 10 (1), 4-12, 2017 | 5 | 2017 |
| Improvement of GGH Multilinear Map C Gu, Z Yu, Z Jing, P Shi, J Qian 2015 10th International Conference on P2P, Parallel, Grid, Cloud and …, 2015 | 5 | 2015 |
| Bring Your Device Group (BYDG): Efficient and Privacy-Preserving User-Device Authentication Protocol in Multi-Access Edge Computing Y Zhang, C Gu, P Shi, Z Jing, B Li, B Liu IEEE Transactions on Information Forensics and Security, 2025 | 3 | 2025 |
| A Verifiable Multi-recipient Encryption Scheme from Multilinear Maps Z Jing, G Jiang, C Gu 2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and …, 2014 | 3 | 2014 |
| A decentralized and security-enhanced professional title evaluation system in universities under mobile Internet of Things M Miao, Z Jing, X Xu, M Xue Heliyon 10 (5), 2024 | 2 | 2024 |