[1] QIN Zhongyuan, PAN Wanpeng, XU Ying, FENG Kerong, and YANG Zhongyun,An Efficient Scheme of Detecting Repackaged Android Applications,ZTE COMMUNICATIONS,2016,14(3),60-66。
[2]秦中元,王志远,吴伏宝,吴颖真,游雁天,徐倩怡,基于多级签名匹配算法的Android恶意应用检测,计算机应用研究,2016,33(3),891-895。
[3] Zhongyuan Qin, Xinshuai Zhang, Kerong Feng, Qunfang Zhang, and Jie Huang,“An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks,”International Journal of Distributed Sensor Networks, vol. 2015。
[4]梁彪,秦中元,沈日胜,陈琦,吕游,强勇,郭爱文,一种虚拟机访问控制安全模型,计算机应用研究,2014,31(1):231-235。
[5] Qin Z, Zhang X, Feng K, Zhang Q, Huang J. An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter. Sensors. 2014; 14(10):17937-17951.
[6] Zhongyuan Qin, Kerong Feng, Shuaiqi Hu, Lei Tao, Zunli Hu,Xinshuai Zhang, Jie Huang, A Novel Identity-based Security Scheme for Wireless Sensor Networks, 10th International Conference on Computational Intelligence and Security,Kunming, Yunnan, China,November 15-16, 2014.
[7] Zhongyuan Qin, Yuying Wang, Hengkang Wang, Jie Huang, A Novel Key Pre-distribution Scheme in Wireless Sensor Networks,10th International Conference on Computational Intelligence and Security,Kunming, Yunnan, China,November 15-16, 2014.
[8] Yuying Wang, Zhongyuan Qin, Hengkang Wang, Jie Huang,A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks,10th International Conference on Computational Intelligence and Security,Kunming, Yunnan, China,November 15-16, 2014.
[9]秦中元,徐毓青,梁彪,张群芳,黄杰,一种Android平台恶意软件静态检测方法.东南大学学报:自然科学版,2013,43(6):1162-1167。
[10] Zhongyuan Qin, Zhongyun Yang, Yuxing Di,Qunfang Zhang , Xinshuai Zhang, Zhiwei Zhang, Detecting Repackaged Android Applications. The 3rd International Conference on Computer Engineering and Network,July 20-21, 2013,Shanghai, China
[11] Zhongyuan Qin , Xinshuai Zhang, Qunfang Zhang, Zhongyun Yang, An Efficient Method of Detecting Repackaged Android Applications. 5th International Conference on Multimedia Information Networking and Security (MINES 2013) , November 1–3, 2013 in Beijing, China.
[12] Zhongyuan Qin, Yuqing Xu, Yuxing Di, Qunfang Zhang, Jie Huang, Android Malware Detection Based On Permission And Behavior Analysis. 5th International Conference on Multimedia Information Networking and Security (MINES 2013) , November 1–3, 2013 in Beijing, China.
[13] Zhongyuan Qin, Yongxin Zheng, Yuying Wang, Jie Huang, RFID Tag Anti-collision Scheme Using Modular Arithmetic. International Conference on Computer Science and Information Technology (CSAIT 2013), September 21-23, 2013, Kunming, China.
[14] Zhongyuan Qin, Yunyan Song, Qunfang Zhang, Jie Huang,Cloud Storage Retrievability Based On Third Party Audit. The International Workshop on Cloud Computing and Information Security (CCIS 2013) , Nov. 9th-11th, 2013, Shanghai, China.
[15] Wan, C.S., Zhang, J., Zhou, L., Qin, Z.Y,Using the pairing function for distributed access control in cloud computing,Volume 774-776, 2013, Pages 1745-1751,2013 International Forum on Mechanical and Material Engineering, IFMME 2013; Guangzhou; China; 13 June 2013--14 June 2013。
[16]秦中元,沈日胜,张群芳,狄予兴。虚拟机系统安全综述,计算机应用研究,2012.29(5):1618-1622
[17] Zhongyuan Qin, Qunfang Zhang, Changsheng Wan, Yuxing Di,State-of-the-art Virtualization Security in Cloud Computing,Journal of Information and Computational Science,2012,Vol.9(6):1487-1497