Παρακολούθηση
Ning Xi
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα xidian.edu.cn
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
APPLET: A privacy-preserving framework for location-aware recommender system
X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu
Science China Information Sciences 60 (9), 1-16, 2017
472017
ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV
N Xi, W Li, L Jing, J Ma
IEEE Internet of Things Journal 9 (22), 22903-22913, 2022
422022
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
372015
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment
C Tian, Q Jiang, T Li, J Zhang, N Xi, J Ma
Computer Networks 218, 109421, 2022
262022
Personalized privacy-aware task offloading for edge-cloud-assisted industrial internet of things in automated manufacturing
D Wei, N Xi, X Ma, M Shojafar, S Kumari, J Ma
IEEE transactions on industrial informatics 18 (11), 7935-7945, 2022
242022
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
Y Shen, N Xi, Q Pei, J Ma
J. Inf. Sci. Eng. 30 (3), 875-893, 2014
222014
Android malware detection via graph representation learning
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
Mobile Information Systems 2021 (1), 5538841, 2021
202021
Android malware detection based on call graph via graph neural network
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
2020 International Conference on Networking and Network Applications (NaNA …, 2020
202020
Privacy-aware multiagent deep reinforcement learning for task offloading in vanet
D Wei, J Zhang, M Shojafar, S Kumari, N Xi, J Ma
IEEE transactions on intelligent transportation systems 24 (11), 13108-13122, 2022
182022
A universal fairness evaluation framework for resource allocation in cloud computing
D Lu, J Ma, N Xi
China Communications 12 (5), 113-122, 2015
172015
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
172014
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
162013
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21, 185-200, 2018
152018
UAV-assisted privacy-preserving online computation offloading for internet of things
D Wei, N Xi, J Ma, L He
Remote Sensing 13 (23), 4853, 2021
132021
Anonymous lightweight authenticated key agreement protocol for fog-assisted healthcare IoT system
H Qiao, X Dong, Q Jiang, S Ma, C Liu, N Xi, Y Shen
IEEE Internet of Things Journal 10 (19), 16715-16726, 2023
122023
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
122013
Trustworthy service composition in service-oriented mobile social networks
T Zhang, J Ma, N Xi, X Liu, Z Liu, J Xiong
2014 ieee international conference on web services, 684-687, 2014
102014
Distributed storage schemes for controlling data availability in wireless sensor networks
S Yulong, X Ning, P Qingqi, M Jianfeng, X Qijian, W Zuoshun
2011 Seventh International Conference on Computational Intelligence and …, 2011
102011
Private inference for deep neural networks: a secure, adaptive, and efficient realization
K Cheng, N Xi, X Liu, X Zhu, H Gao, Z Zhang, Y Shen
IEEE Transactions on Computers, 2023
92023
Protecting your offloading preference: Privacy-aware online computation offloading in mobile blockchain
D Wei, N Xi, J Ma, J Li
2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021
92021
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20