| Content-based image retrieval at the end of the early years AWM Smeulders, M Worring, S Santini, A Gupta, R Jain IEEE Transactions on Pattern Analysis & Machine Intelligence, 1349-1380, 2000 | 7719 | 2000 |
| Online aggregation JM Hellerstein, PJ Haas, HJ Wang Acm Sigmod Record 26 (2), 171-182, 1997 | 1134 | 1997 |
| Distributing streaming media content using cooperative networking VN Padmanabhan, HJ Wang, PA Chou, K Sripanidkulchai Proceedings of the 12th international workshop on Network and operating …, 2002 | 1114 | 2002 |
| Secondnet: a data center network virtualization architecture with bandwidth guarantees C Guo, G Lu, HJ Wang, S Yang, C Kong, P Sun, W Wu, Y Zhang Proceedings of the 6th International COnference, 15, 2010 | 673 | 2010 |
| Policy-enabled handoffs across heterogeneous wireless networks HJ Wang, RH Katz, J Giese Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and …, 1999 | 655 | 1999 |
| Permission Re-Delegation: Attacks and Defenses. AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin USENIX Security Symposium 30, 88, 2011 | 617 | 2011 |
| Resilient peer-to-peer streaming VN Padmanabhan, HJ Wang, PA Chou 11th IEEE International Conference on Network Protocols, 2003. Proceedings …, 2003 | 608 | 2003 |
| Shield: Vulnerability-driven network filters for preventing known vulnerability exploits HJ Wang, C Guo, DR Simon, A Zugenmaier ACM SIGCOMM Computer Communication Review 34 (4), 193-204, 2004 | 414 | 2004 |
| An evaluation of scalable application-level multicast built using peer-to-peer overlays M Castro, MB Jones, AM Kermarrec, A Rowstron, M Theimer, H Wang, ... IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 372 | 2003 |
| Discoverer: Automatic Protocol Reverse Engineering from Network Traces. W Cui, J Kannan, HJ Wang USENIX Security Symposium, 1-14, 2007 | 356 | 2007 |
| Removal of Cu, Zn, and Cd from aqueous solutions by the dairy manure-derived biochar X Xu, X Cao, L Zhao, H Wang, H Yu, B Gao Environmental Science and Pollution Research 20 (1), 358-368, 2013 | 332 | 2013 |
| BrowserShield: Vulnerability-driven filtering of dynamic HTML C Reis, J Dunagan, HJ Wang, O Dubrovsky, S Esmeir ACM Transactions on the Web (TWEB) 1 (3), 11, 2007 | 308 | 2007 |
| Enabling Security in Cloud Storage SLAs with CloudProof. RA Popa, JR Lorch, D Molnar, HJ Wang, L Zhuang USENIX Annual Technical Conference 242, 355-368, 2011 | 286 | 2011 |
| Automatic Misconfiguration Troubleshooting with PeerPressure. HJ Wang, JC Platt, Y Chen, R Zhang, YM Wang OSDI 4, 245-257, 2004 | 274 | 2004 |
| Magmatic history of the northeastern Tibetan Plateau GE Gehrels, A Yin, XF Wang Journal of Geophysical Research: Solid Earth 108 (B9), 2003 | 264 | 2003 |
| Mechanical properties of high-strength concrete after fire M Li, CX Qian, W Sun Cement and concrete research 34 (6), 1001-1005, 2004 | 261 | 2004 |
| ICEBERG: An Internet core network architecture for integrated communications HJ Wang, B Raman, C Chuah, R Biswas, R Gummadi, B Hohlt, X Hong, ... IEEE Personal Communications 7 (4), 10-19, 2000 | 237 | 2000 |
| Plants vs. cancer: a review on natural phytochemicals in preventing and treating cancers and their druggability H Wang, T Oo Khor, L Shu, ZY Su, F Fuentes, JH Lee, AN Tony Kong Anti-Cancer Agents in Medicinal Chemistry (Formerly Current Medicinal …, 2012 | 236 | 2012 |
| User-driven access control: Rethinking permission granting in modern operating systems F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan 2012 IEEE Symposium on Security and Privacy, 224-238, 2012 | 235 | 2012 |
| The Multi-Principal OS Construction of the Gazelle Web Browser. HJ Wang, C Grier, A Moshchuk, ST King, P Choudhury, H Venter USENIX security symposium 28, 2009 | 227 | 2009 |