Mingxing He
Orcid: 0000-0003-4170-2378
According to our database1,
Mingxing He
authored at least 50 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Serv. Comput., 2024
2023
An efficient and privacy-preserving query scheme in intelligent transportation systems.
Inf. Sci., November, 2023
Sensors, October, 2023
A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.
Sensors, February, 2023
Self-Calibration Sensor for Contactless Voltage Measurement Based on Dynamic Capacitance.
Sensors, 2023
2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022
Research on a Non-Contact Multi-Electrode Voltage Sensor and Signal Processing Algorithm.
Sensors, 2022
Strong consistency of the MLE under two-parameter Gamma mixture models with a structural scale parameter.
Adv. Data Anal. Classif., 2022
A Blockchain-Based Decentralized Privacy-Preserving Mobile Payment Scheme Using Anonymous Credentials.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2020
Secur. Commun. Networks, 2020
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix.
Multim. Tools Appl., 2020
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy.
Inf. Sci., 2020
Int. J. Netw. Secur., 2020
IEEE Access, 2020
High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique.
IEEE Access, 2020
2019
山洞环境中声信号的传播模型及其性能研究 (Acoustic Signal Propagation Model and Its Performance in Cave Environment).
计算机科学, 2019
Int. J. Netw. Secur., 2019
IEEE Access, 2019
2018
Wirel. Pers. Commun., 2018
Proceedings of the 15th International Symposium on Pervasive Systems, 2018
2017
Peer-to-Peer Netw. Appl., 2017
应用于认知无线电频谱预测的小波神经网络模型 (Wavelet Neural Network Model for Cognitive Radio Spectrum Prediction).
计算机科学, 2017
Proceedings of the Provable Security, 2017
2016
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016
2015
Proceedings of the 10th International Conference on Information, 2015
2013
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013
2011
Informatica (Slovenia), 2011
A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization.
Expert Syst. Appl., 2011
Expert Syst. Appl., 2011
Expert Syst. Appl., 2011
2010
Pattern Recognit., 2010
J. Convergence Inf. Technol., 2010
Proceedings of the International Conference on E-Business and E-Government, 2010
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks.
IEEE Trans. Wirel. Commun., 2009
IEEE Geosci. Remote. Sens. Lett., 2009
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009
2008
Int. J. Netw. Secur., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks.
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
2006
Proceedings of the Information Security Practice and Experience, 2006
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006
2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
2003
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003