Ningning Cui

Orcid: 0000-0002-1940-625X

According to our database1, Ningning Cui authored at least 29 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains.
IEEE Trans. Knowl. Data Eng., June, 2024

Reconnecting the Estranged Relationships: Optimizing the Influence Propagation in Evolving Networks.
IEEE Trans. Knowl. Data Eng., May, 2024

Effective Individual Fairest Community Search over Heterogeneous Information Networks.
CoRR, 2024

CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection.
Comput. J., 2024

2023
Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database.
IEEE Trans. Knowl. Data Eng., September, 2023

Towards multi-dimensional knowledge-aware approach for effective community detection in LBSN.
World Wide Web (WWW), July, 2023

KPDFI: Efficient data flow integrity based on key property against data corruption attack.
Comput. Secur., May, 2023

Group homophily based facility location selection in geo-social networks.
World Wide Web (WWW), January, 2023

BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Keyword-based Socially Tenuous Group Queries.
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee.
Proceedings of the Database Systems for Advanced Applications, 2023

Code Property Graph based Vulnerability Type Identification with Fusion Representation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain Adaptation.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
An Effective Data Fusion Model for Detecting the Risk of Transmission Line in Smart Grid.
IEEE Internet Things J., 2022

Secure Boolean Spatial Keyword Query With Lightweight Access Control in Cloud Environments.
IEEE Internet Things J., 2022

The most tenuous group query.
Frontiers Comput. Sci., 2022

BERT-Based Vulnerability Type Identification with Effective Program Representation.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2022

A Highly Reliable and Low Power RHBD Flip-Flop Cell for Aerospace Applications.
Proceedings of the 40th IEEE VLSI Test Symposium, 2022

BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Inductive Vulnerability Detection via Gated Graph Neural Network.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

2021
A Trust-Based Security System for Data Collection in Smart City.
IEEE Trans. Ind. Informatics, 2021

A Sextuple Cross-Coupled Dual-Interlocked-Storage-Cell based Multiple-Node-Upset Self-Recoverable Latch.
Proceedings of the IEEE/ACM International Symposium on Nanoscale Architectures, 2021

Parallel DICE Cells and Dual-Level CEs based 3-Node-Upset Tolerant Latch Design for Highly Robust Computing.
Proceedings of the IEEE International Test Conference in Asia, 2021

2020
Secure range query over encrypted data in outsourced environments.
World Wide Web, 2020

Efficient Strategy Mining for Football Social Network.
Complex., 2020

SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform<sup>*</sup>.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
When Geo-Text Meets Security: Privacy-Preserving Boolean Spatial Keyword Queries.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

2018
Secure Range Query over Encrypted Data in Outsourced Environments.
Proceedings of the Database Systems for Advanced Applications, 2018

2016
A Novel Spatial Cloaking Scheme Using Hierarchical Hilbert Curve for Location-Based Services.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016


  Loading...