Follow
Cong Tang
Cong Tang
Temi Group and Peking University
Verified email at infosec.pku.edu.cn
Title
Cited by
Cited by
Year
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
Database Systems for Adanced Applications: 16th International Conference …, 2011
1492011
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
1452012
PGC: Decentralized confidential payment system with auditability
Y Chen, X Ma, C Tang, MH Au
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
482020
Evaluating network security with two-layer attack graphs
A Xie, Z Cai, C Tang, J Hu, Z Chen
2009 Annual Computer Security Applications Conference, 127-136, 2009
462009
On scaling and accelerating decentralized private blockchains
W Xin, T Zhang, C Hu, C Tang, C Liu, Z Chen
2017 ieee 3rd international conference on big data security on cloud …, 2017
382017
A hybrid movie recommender based on ontology and neural networks
Y Deng, Z Wu, C Tang, H Si, H Xiong, Z Chen
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010
232010
A holistic mechanism against file pollution in peer-to-peer networks
Z Cai, R Chen, J Feng, C Tang, Z Chen, J Hu
Proceedings of the 2009 ACM symposium on Applied Computing, 28-34, 2009
152009
Need for symmetry: Addressing privacy risks in online social networks
C Tang, Y Wang, H Xiong, T Yang, J Hu, Q Shen, Z Chen
2011 IEEE International Conference on Advanced Information Networking and …, 2011
122011
Pgc: Pretty good decentralized confidential payment system with auditability
Y Chen, X Ma, C Tang, MH Au
Cryptology ePrint Archive, 2019
92019
A novel framework to carry out cloud penetration test
J Hu, C Tang
International journal of computer network and information security 3 (3), 1, 2011
72011
Towards privacy-preserving RFID-based location-based services
W Xin, C Tang, T Yang, H Sun, Z Chen
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
62012
PGC: Pretty Good Confidential Transaction System with Accountability.
Y Chen, X Ma, C Tang, MH Au
IACR Cryptol. ePrint Arch. 2019, 319, 2019
52019
A distance bounding protocol using error state and punishment
W Xin, T Yang, C Tang, J Hu, Z Chen
2011 First International Conference on Instrumentation, Measurement …, 2011
52011
SKIP: A secure key issuing scheme for peer-to-peer networks
C Tang, R Chen, Z Cai, A Xie, J Hu, L Tang, Z Chen
2009 Fifth International Conference on Networking and Services, 296-302, 2009
52009
Themis: Towards decentralized escrow of cryptocurrencies without trusted third parties
H Meng, E Bian, C Tang
2019 Sixth International Conference on Software Defined Systems (SDS), 266-271, 2019
42019
Vulnerabilities scoring approach for cloud SaaS
Z Li, C Tang, J Hu, Z Chen
2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 …, 2015
42015
Difo: discovering faulty obus in vanets
L Huang, H Meng, C Tang, W Song
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
42012
An adjacency matrixes-based model for network security analysis
A Xie, C Tang, N Gui, Z Cai, J Hu, Z Chen
2010 IEEE International Conference on Communications, 1-5, 2010
42010
VLSP: enabling location privacy in vehicular location based services
T Yang, C Tang, L Yu, W Xin, Y Deng, J Hu, Z Chen
2011 First International Conference on Instrumentation, Measurement …, 2011
32011
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture
H Meng, Z Chen, J Hu, C Song, C Tang
China Communications 14 (4), 73-88, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20