Cong Tang
Cong Tang
Temi Group and PKU
Verified email at
Cited by
Cited by
Estimating age privacy leakage in online social networks
R Dey, C Tang, K Ross, N Saxena
2012 proceedings ieee infocom, 2836-2840, 2012
What’s in a name: A study of names, gender inference, and gender behavior in facebook
C Tang, K Ross, N Saxena, R Chen
International Conference on Database Systems for Advanced Applications, 344-356, 2011
Evaluating network security with two-layer attack graphs
A Xie, Z Cai, C Tang, J Hu, Z Chen
2009 Annual Computer Security Applications Conference, 127-136, 2009
On scaling and accelerating decentralized private blockchains
W Xin, T Zhang, C Hu, C Tang, C Liu, Z Chen
2017 ieee 3rd international conference on big data security on cloud …, 2017
A hybrid movie recommender based on ontology and neural networks
Y Deng, Z Wu, C Tang, H Si, H Xiong, Z Chen
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010
A holistic mechanism against file pollution in peer-to-peer networks
Z Cai, R Chen, J Feng, C Tang, Z Chen, J Hu
Proceedings of the 2009 ACM symposium on Applied Computing, 28-34, 2009
Need for symmetry: Addressing privacy risks in online social networks
C Tang, Y Wang, H Xiong, T Yang, J Hu, Q Shen, Z Chen
2011 IEEE International Conference on Advanced Information Networking and …, 2011
PGC: Decentralized confidential payment system with auditability
Y Chen, X Ma, C Tang, MH Au
European Symposium on Research in Computer Security, 591-610, 2020
Towards privacy-preserving RFID-based location-based services
W Xin, C Tang, T Yang, H Sun, Z Chen
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
A novel framework to carry out cloud penetration test
J Hu, C Tang
International Journal of Computer Network and Information Security 3 (3), 1, 2011
A distance bounding protocol using error state and punishment
W Xin, T Yang, C Tang, J Hu, Z Chen
2011 First International Conference on Instrumentation, Measurement …, 2011
SKIP: A secure key issuing scheme for peer-to-peer networks
C Tang, R Chen, Z Cai, A Xie, J Hu, L Tang, Z Chen
2009 Fifth International Conference on Networking and Services, 296-302, 2009
An adjacency matrixes-based model for network security analysis
A Xie, C Tang, N Gui, Z Cai, J Hu, Z Chen
2010 IEEE International Conference on Communications, 1-5, 2010
DIFO: Discovering faulty OBUs in VANETs
L Huang, H Meng, C Tang, W Song
2012 9th International Conference on Fuzzy Systems and Knowledge Discovery …, 2012
VLSP: enabling location privacy in vehicular location based services
T Yang, C Tang, L Yu, W Xin, Y Deng, J Hu, Z Chen
2011 First International Conference on Instrumentation, Measurement …, 2011
Themis: Towards decentralized escrow of cryptocurrencies without trusted third parties
H Meng, E Bian, C Tang
2019 Sixth International Conference on Software Defined Systems (SDS), 266-271, 2019
PGC: Pretty Good Confidential Transaction System with Accountability.
Y Chen, X Ma, C Tang
IACR Cryptol. ePrint Arch. 2019, 319, 2019
Yet Another Certificateless three-party authenticated key agreement protocol
J Hu, H Xiong, Z Guan, C Tang, Y Wang, W Xin, Z Chen
2011 IEEE Ninth International Symposium on Parallel and Distributed …, 2011
On the privacy of peer-assisted distribution of security patches
D Wu, C Tang, P Dhungel, N Saxena, KW Ross
2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), 1-10, 2010
Versatile routing and self-certifying features support for secure mobility in expressive internet architecture
H Meng, Z Chen, J Hu, C Song, C Tang
China Communications 14 (4), 73-88, 2017
The system can't perform the operation now. Try again later.
Articles 1–20