关注
Ning Xi
Ning Xi
在 xidian.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
APPLET: A privacy-preserving framework for location-aware recommender system
X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu
Science China Information Sciences 60 (9), 1-16, 2017
422017
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
342015
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
Y Shen, N Xi, Q Pei, J Ma
J. Inf. Sci. Eng. 30 (3), 875-893, 2014
222014
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
182014
A universal fairness evaluation framework for resource allocation in cloud computing
D Lu, J Ma, N Xi
China Communications 12 (5), 113-122, 2015
172015
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21, 185-200, 2018
152018
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
152013
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
122013
Android malware detection based on call graph via graph neural network
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
2020 International Conference on Networking and Network Applications (NaNA …, 2020
112020
Trustworthy service composition in service-oriented mobile social networks
T Zhang, J Ma, N Xi, X Liu, Z Liu, J Xiong
2014 ieee international conference on web services, 684-687, 2014
92014
Distributed information flow verification framework for the composition of service chain in wireless sensor network
N Xi, J Ma, C Sun, Y Shen, T Zhang
International Journal of Distributed Sensor Networks 9 (5), 693639, 2013
82013
UAV-assisted privacy-preserving online computation offloading for internet of things
D Wei, N Xi, J Ma, L He
Remote Sensing 13 (23), 4853, 2021
72021
Information flow control on encrypted data for service composition among multiple clouds
N Xi, J Ma, C Sun, D Lu, Y Shen
Distributed and Parallel Databases, 1-17, 2018
72018
Distributed storage schemes for controlling data availability in wireless sensor networks
S Yulong, X Ning, P Qingqi, M Jianfeng, X Qijian, W Zuoshun
2011 Seventh International Conference on Computational Intelligence and …, 2011
72011
The wireless vertical handoff decision algorithm with parameter prediction
Y Shen, N Xi, Q Pei, J Ma, Y Niu
2012 Fourth International Conference on Intelligent Networking and …, 2012
62012
Verifying secure interface composition for component-based system designs
C Sun, N Xi, J Li, Q Yao, J Ma
2014 21st Asia-Pacific Software Engineering Conference 1, 359-366, 2014
52014
ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV
N Xi, W Li, L Jing, J Ma
IEEE Internet of Things Journal 9 (22), 22903-22913, 2022
42022
Protecting your offloading preference: Privacy-aware online computation offloading in mobile blockchain
D Wei, N Xi, J Ma, J Li
2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021
42021
Android malware detection via graph representation learning
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
Mobile Information Systems 2021, 1-14, 2021
42021
Distributed secure service composition with declassification in mobile network
N Xi, C Sun, J Ma, Y Shen, D Lu
2016 International Conference on Networking and Network Applications (NaNA …, 2016
42016
系统目前无法执行此操作,请稍后再试。
文章 1–20