APPLET: A privacy-preserving framework for location-aware recommender system X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu Science China Information Sciences 60 (9), 1-16, 2017 | 42 | 2017 |
Secure service composition with information flow control in service clouds N Xi, C Sun, J Ma, Y Shen Future Generation Computer Systems 49, 142-148, 2015 | 34 | 2015 |
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks. Y Shen, N Xi, Q Pei, J Ma J. Inf. Sci. Eng. 30 (3), 875-893, 2014 | 22 | 2014 |
Trust-based service composition in multi-domain environments under time constraint T Zhang, JF Ma, Q Li, N Xi, C Sun Science China Information Sciences 57, 1-16, 2014 | 18 | 2014 |
A universal fairness evaluation framework for resource allocation in cloud computing D Lu, J Ma, N Xi China Communications 12 (5), 113-122, 2015 | 17 | 2015 |
Trustworthy service composition with secure data transmission in sensor networks T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong World Wide Web 21, 185-200, 2018 | 15 | 2018 |
Service composition in multi-domain environment under time constraint T Zhang, J Ma, C Sun, Q Li, N Xi 2013 IEEE 20th International Conference on Web Services, 227-234, 2013 | 15 | 2013 |
Decentralized information flow verification framework for the service chain composition in mobile computing environments N Xi, J Ma, C Sun, T Zhang 2013 IEEE 20th International Conference on Web Services, 563-570, 2013 | 12 | 2013 |
Android malware detection based on call graph via graph neural network P Feng, J Ma, T Li, X Ma, N Xi, D Lu 2020 International Conference on Networking and Network Applications (NaNA …, 2020 | 11 | 2020 |
Trustworthy service composition in service-oriented mobile social networks T Zhang, J Ma, N Xi, X Liu, Z Liu, J Xiong 2014 ieee international conference on web services, 684-687, 2014 | 9 | 2014 |
Distributed information flow verification framework for the composition of service chain in wireless sensor network N Xi, J Ma, C Sun, Y Shen, T Zhang International Journal of Distributed Sensor Networks 9 (5), 693639, 2013 | 8 | 2013 |
UAV-assisted privacy-preserving online computation offloading for internet of things D Wei, N Xi, J Ma, L He Remote Sensing 13 (23), 4853, 2021 | 7 | 2021 |
Information flow control on encrypted data for service composition among multiple clouds N Xi, J Ma, C Sun, D Lu, Y Shen Distributed and Parallel Databases, 1-17, 2018 | 7 | 2018 |
Distributed storage schemes for controlling data availability in wireless sensor networks S Yulong, X Ning, P Qingqi, M Jianfeng, X Qijian, W Zuoshun 2011 Seventh International Conference on Computational Intelligence and …, 2011 | 7 | 2011 |
The wireless vertical handoff decision algorithm with parameter prediction Y Shen, N Xi, Q Pei, J Ma, Y Niu 2012 Fourth International Conference on Intelligent Networking and …, 2012 | 6 | 2012 |
Verifying secure interface composition for component-based system designs C Sun, N Xi, J Li, Q Yao, J Ma 2014 21st Asia-Pacific Software Engineering Conference 1, 359-366, 2014 | 5 | 2014 |
ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV N Xi, W Li, L Jing, J Ma IEEE Internet of Things Journal 9 (22), 22903-22913, 2022 | 4 | 2022 |
Protecting your offloading preference: Privacy-aware online computation offloading in mobile blockchain D Wei, N Xi, J Ma, J Li 2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021 | 4 | 2021 |
Android malware detection via graph representation learning P Feng, J Ma, T Li, X Ma, N Xi, D Lu Mobile Information Systems 2021, 1-14, 2021 | 4 | 2021 |
Distributed secure service composition with declassification in mobile network N Xi, C Sun, J Ma, Y Shen, D Lu 2016 International Conference on Networking and Network Applications (NaNA …, 2016 | 4 | 2016 |