APPLET: A privacy-preserving framework for location-aware recommender system X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu Science China Information Sciences 60 (9), 1-16, 2017 | 47 | 2017 |
ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV N Xi, W Li, L Jing, J Ma IEEE Internet of Things Journal 9 (22), 22903-22913, 2022 | 42 | 2022 |
Secure service composition with information flow control in service clouds N Xi, C Sun, J Ma, Y Shen Future Generation Computer Systems 49, 142-148, 2015 | 37 | 2015 |
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment C Tian, Q Jiang, T Li, J Zhang, N Xi, J Ma Computer Networks 218, 109421, 2022 | 26 | 2022 |
Personalized privacy-aware task offloading for edge-cloud-assisted industrial internet of things in automated manufacturing D Wei, N Xi, X Ma, M Shojafar, S Kumari, J Ma IEEE transactions on industrial informatics 18 (11), 7935-7945, 2022 | 24 | 2022 |
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks. Y Shen, N Xi, Q Pei, J Ma J. Inf. Sci. Eng. 30 (3), 875-893, 2014 | 22 | 2014 |
Android malware detection via graph representation learning P Feng, J Ma, T Li, X Ma, N Xi, D Lu Mobile Information Systems 2021 (1), 5538841, 2021 | 20 | 2021 |
Android malware detection based on call graph via graph neural network P Feng, J Ma, T Li, X Ma, N Xi, D Lu 2020 International Conference on Networking and Network Applications (NaNA …, 2020 | 20 | 2020 |
Privacy-aware multiagent deep reinforcement learning for task offloading in vanet D Wei, J Zhang, M Shojafar, S Kumari, N Xi, J Ma IEEE transactions on intelligent transportation systems 24 (11), 13108-13122, 2022 | 18 | 2022 |
A universal fairness evaluation framework for resource allocation in cloud computing D Lu, J Ma, N Xi China Communications 12 (5), 113-122, 2015 | 17 | 2015 |
Trust-based service composition in multi-domain environments under time constraint T Zhang, JF Ma, Q Li, N Xi, C Sun Science China Information Sciences 57, 1-16, 2014 | 17 | 2014 |
Service composition in multi-domain environment under time constraint T Zhang, J Ma, C Sun, Q Li, N Xi 2013 IEEE 20th International Conference on Web Services, 227-234, 2013 | 16 | 2013 |
Trustworthy service composition with secure data transmission in sensor networks T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong World Wide Web 21, 185-200, 2018 | 15 | 2018 |
UAV-assisted privacy-preserving online computation offloading for internet of things D Wei, N Xi, J Ma, L He Remote Sensing 13 (23), 4853, 2021 | 13 | 2021 |
Anonymous lightweight authenticated key agreement protocol for fog-assisted healthcare IoT system H Qiao, X Dong, Q Jiang, S Ma, C Liu, N Xi, Y Shen IEEE Internet of Things Journal 10 (19), 16715-16726, 2023 | 12 | 2023 |
Decentralized information flow verification framework for the service chain composition in mobile computing environments N Xi, J Ma, C Sun, T Zhang 2013 IEEE 20th International Conference on Web Services, 563-570, 2013 | 12 | 2013 |
Trustworthy service composition in service-oriented mobile social networks T Zhang, J Ma, N Xi, X Liu, Z Liu, J Xiong 2014 ieee international conference on web services, 684-687, 2014 | 10 | 2014 |
Distributed storage schemes for controlling data availability in wireless sensor networks S Yulong, X Ning, P Qingqi, M Jianfeng, X Qijian, W Zuoshun 2011 Seventh International Conference on Computational Intelligence and …, 2011 | 10 | 2011 |
Private inference for deep neural networks: a secure, adaptive, and efficient realization K Cheng, N Xi, X Liu, X Zhu, H Gao, Z Zhang, Y Shen IEEE Transactions on Computers, 2023 | 9 | 2023 |
Protecting your offloading preference: Privacy-aware online computation offloading in mobile blockchain D Wei, N Xi, J Ma, J Li 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021 | 9 | 2021 |