Ming Xian
Orcid: 0000-0002-4683-9763
According to our database1,
Ming Xian
authored at least 44 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
A comprehensive intrusion detection method for the internet of vehicles based on federated learning architecture.
Comput. Secur., 2024
2023
Proceedings of the 4th International Conference on Computer Engineering and Intelligent Control, 2023
The Effect of Matching Block Resolution on IP Softcore Hardware Trojans Map Detection.
Proceedings of the 15th IEEE International Conference on Advanced Infocomm Technology, 2023
2022
Secure Data Sharing With Flexible User Access Privilege Update in Cloud-Assisted IoMT.
IEEE Trans. Emerg. Top. Comput., 2022
Proceedings of the 3rd International Conference on Computer Engineering and Intelligent Control Virtual Event, 2022
Construction of network security domain knowledge graph for network attack detection.
Proceedings of the 2022 6th International Conference on Electronic Information Technology and Computer Engineering, 2022
2021
Efficient privacy-preserving frequent itemset query over semantically secure encrypted cloud database.
World Wide Web, 2021
Secure and Efficient Outsourced k-Means Clustering using Fully Homomorphic Encryption With Ciphertext Packing Technique.
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Circuits Syst. II Express Briefs, 2021
2020
IEEE Internet Things J., 2020
Int. J. Artif. Intell. Tools, 2020
Lightweight edge-based kNN privacy-preserving classification scheme in cloud computing circumstance.
Concurr. Comput. Pract. Exp., 2020
Toward fault-tolerant and secure frequent itemset mining outsourcing in hybrid cloud environment.
Comput. Secur., 2020
Research on Blockchain Smart Contracts Vulnerability and A Code Audit Tool based on Matching Rules.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Privacy preserving k-nearest neighbor classification over encrypted database in outsourced cloud environments.
World Wide Web, 2019
Improved Upper Bounds on Systematic-Length for Linear Minimum Storage Regenerating Codes.
IEEE Trans. Inf. Theory, 2019
Comput. Networks, 2019
IEEE Access, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
PPolyNets: Achieving High Prediction Accuracy and Efficiency With Parametric Polynomial Activations.
IEEE Access, 2018
Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database.
IEEE Access, 2018
Verifiable and Privacy-Preserving Association Rule Mining in Hybrid Cloud Environment.
Proceedings of the Green, Pervasive, and Cloud Computing - 13th International Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
2017
IEEE Trans. Inf. Theory, 2017
Privacy-Preserving <i>k</i>-Means Clustering under Multiowner Setting in Distributed Cloud Environments.
Secur. Commun. Networks, 2017
Efficient Privacy-Preserving Building Blocks in Cloud Environments under Multiple Keys.
J. Inf. Sci. Eng., 2017
Outsourced k-Means Clustering over Encrypted Data Under Multiple Keys in Spark Framework.
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Network and System Security - 11th International Conference, 2017
2016
IEEE Trans. Inf. Theory, 2016
Reliable and confidential cloud storage with efficient data forwarding functionality.
IET Commun., 2016
IEEE Access, 2016
Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Privacy-Preserving Scalar Product Computation in Cloud Environments Under Multiple Keys.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2016, 2016
Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud Environment.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016
2015
Characterization of Secrecy Capacity for General MSR Codes under Passive Eavesdropping Model.
CoRR, 2015
Proceedings of the IEEE International Conference on Communication, 2015
WindTalker: An Efficient and Robust Protocol of Cloud Covert Channel Based on Memory Deduplication.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
2014
Securing the cloud storage audit service: defending against frame and collude attacks of third party auditor.
IET Commun., 2014
Proceedings of the IEEE International Conference on Communications, 2014
2013
J. Comput. Chem., 2013
Time-Stealer: A Stealthy Threat for Virtualization Scheduler and Its Countermeasures.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2011
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011