Ning Xi

Orcid: 0000-0003-0690-5321

Affiliations:
  • Xidian University, School of Computer Science and Technology / School of Cyber Engineering, Xi'an, China (PhD 2014)


According to our database1, Ning Xi authored at least 58 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems.
IEEE Trans. Knowl. Data Eng., September, 2024

A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles.
IEEE Trans. Veh. Technol., June, 2024

Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings.
IEEE Trans. Inf. Forensics Secur., 2024

DawnGNN: Documentation augmented windows malware detection using graph neural network.
Comput. Secur., 2024

CToMP: a cycle-task-oriented memory protection scheme for unmanned systems.
Sci. China Inf. Sci., 2024

Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2024

Action-Driven UAV Fingerprint Verification with Perception Data.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers, December, 2023

Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET.
IEEE Trans. Intell. Transp. Syst., November, 2023

Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J., October, 2023

BejaGNN: behavior-based Java malware detection via graph neural network.
J. Supercomput., September, 2023

Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
IEEE Internet Things J., August, 2023

A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag Data.
Proceedings of the International Conference on Networking and Network Applications, 2023

Physical-Sensing Inconsistency Vulnerability Mitigation for Multi-UAV Crowdsensing.
Proceedings of the International Conference on Networking and Network Applications, 2023

SEBD: Sensor Emulation Based Backdoor for Autopilot.
Proceedings of the 13th International Conference on the Internet of Things, 2023

TEE-Assisted Time-Scale Database Management System on IoT devices.
Proceedings of the 13th International Conference on the Internet of Things, 2023

2022
Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.
IEEE Trans. Ind. Informatics, 2022

ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV.
IEEE Internet Things J., 2022

Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment.
Comput. Networks, 2022

Decentralized Access Control for Secure Microservices Cooperation with Blockchain.
Proceedings of the Network and System Security - 16th International Conference, 2022

Self-Anomaly-Detection Model Training via Initialized Meta Model.
Proceedings of the International Conference on Networking and Network Applications, 2022

2021
UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things.
Remote. Sens., 2021

Android Malware Detection via Graph Representation Learning.
Mob. Inf. Syst., 2021

Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR, 2021

A Lightweight Android Malware Detection Framework Based on Knowledge Distillation.
Proceedings of the Network and System Security - 15th International Conference, 2021

NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

2020
A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models.
Proceedings of the Network and System Security - 14th International Conference, 2020

Android Malware Detection Based on Call Graph via Graph Neural Network.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.
Entropy, 2019

Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Compositional Information Flow Verification for Inter Application Communications in Android System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

A Fully Anonymous Authentication Scheme Based on Medical Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng., 2018

Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases, 2018

2017
Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mob. Inf. Syst., 2017

APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci., 2017

Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci., 2017

Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access, 2017

Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
Proceedings of the International Conference on Networking and Network Applications, 2017

PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
Proceedings of the International Conference on Networking and Network Applications, 2017

Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Distributed Secure Service Composition with Declassification in Mobile Network.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
Secure service composition with information flow control in service clouds.
Future Gener. Comput. Syst., 2015

2014
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng., 2014

Trust-based service composition in multi-domain environments under time constraint.
Sci. China Inf. Sci., 2014

Automated enforcement for relaxed information release with reference points.
Sci. China Inf. Sci., 2014

Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Verifying Secure Interface Composition for Component-Based System Designs.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2013

Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Service Composition in Multi-domain Environment under Time Constraint.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

2012
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011


  Loading...