Follow
Ning Xi
Ning Xi
Verified email at xidian.edu.cn
Title
Cited by
Cited by
Year
APPLET: A privacy-preserving framework for location-aware recommender system
X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu
Science China Information Sciences 60 (9), 1-16, 2017
442017
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
362015
ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV
N Xi, W Li, L Jing, J Ma
IEEE Internet of Things Journal 9 (22), 22903-22913, 2022
262022
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
Y Shen, N Xi, Q Pei, J Ma
J. Inf. Sci. Eng. 30 (3), 875-893, 2014
222014
Personalized privacy-aware task offloading for edge-cloud-assisted industrial internet of things in automated manufacturing
D Wei, N Xi, X Ma, M Shojafar, S Kumari, J Ma
IEEE transactions on industrial informatics 18 (11), 7935-7945, 2022
182022
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57, 1-16, 2014
182014
Android malware detection based on call graph via graph neural network
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
2020 International Conference on Networking and Network Applications (NaNA …, 2020
172020
A universal fairness evaluation framework for resource allocation in cloud computing
D Lu, J Ma, N Xi
China Communications 12 (5), 113-122, 2015
162015
Privacy-aware multiagent deep reinforcement learning for task offloading in vanet
D Wei, J Zhang, M Shojafar, S Kumari, N Xi, J Ma
IEEE transactions on intelligent transportation systems, 2022
152022
Android malware detection via graph representation learning
P Feng, J Ma, T Li, X Ma, N Xi, D Lu
Mobile Information Systems 2021 (1), 5538841, 2021
152021
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21, 185-200, 2018
152018
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
152013
UAV-assisted privacy-preserving online computation offloading for internet of things
D Wei, N Xi, J Ma, L He
Remote Sensing 13 (23), 4853, 2021
132021
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
122013
Trustworthy service composition in service-oriented mobile social networks
T Zhang, J Ma, N Xi, X Liu, Z Liu, J Xiong
2014 ieee international conference on web services, 684-687, 2014
92014
Distributed storage schemes for controlling data availability in wireless sensor networks
S Yulong, X Ning, P Qingqi, M Jianfeng, X Qijian, W Zuoshun
2011 Seventh International Conference on Computational Intelligence and …, 2011
92011
Distributed information flow verification framework for the composition of service chain in wireless sensor network
N Xi, J Ma, C Sun, Y Shen, T Zhang
International Journal of Distributed Sensor Networks 9 (5), 693639, 2013
82013
Protecting your offloading preference: Privacy-aware online computation offloading in mobile blockchain
D Wei, N Xi, J Ma, J Li
2021 IEEE/ACM 29th International Symposium on Quality of Service (IWQOS), 1-10, 2021
72021
Information flow control on encrypted data for service composition among multiple clouds
N Xi, J Ma, C Sun, D Lu, Y Shen
Distributed and Parallel Databases, 1-17, 2018
72018
Trust-based decentralized service composition approach in service-oriented mobile social networks
T Zhang, JF Ma, N Xi, XM Liu, JB Xiong
Tien Tzu Hsueh Pao/Acta Electronica Sinica 44 (2), 258-267, 2016
62016
The system can't perform the operation now. Try again later.
Articles 1–20