Xinxin Niu
Orcid: 0000-0001-9020-8021
According to our database1,
Xinxin Niu
authored at least 90 papers
between 1997 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Coordinated Multicast and Unicast Robust Transmission in C-V2V Massive MIMO With Imperfect CSI.
IEEE Trans. Veh. Technol., November, 2024
Precoding Design for Coordinated Multicast and Unicast Transmission in C-V2V Massive MIMO With Imperfect CSI.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024
2022
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022
Sci. China Inf. Sci., 2022
2021
IEEE Trans. Syst. Man Cybern. Syst., 2021
Secur. Commun. Networks, 2021
Image Vis. Comput., 2021
Int. J. Pattern Recognit. Artif. Intell., 2021
2020
Searching for optimal quantum secret sharing scheme based on local distinguishability.
Quantum Inf. Process., 2020
Appl. Soft Comput., 2020
Phase Shift Adjustable Pilots for Channel Acquisition in Vehicle-to-Vehicle Underlay Wideband Massive MIMO.
IEEE Access, 2020
2019
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks.
Secur. Commun. Networks, 2019
Internet Things, 2019
Sci. China Inf. Sci., 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018
Quantum Inf. Process., 2018
Peer-to-Peer Netw. Appl., 2018
IEEE Netw., 2018
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems.
KSII Trans. Internet Inf. Syst., 2018
Fundam. Informaticae, 2018
Comput. J., 2018
Proceedings of the IEEE Globecom Workshops, 2018
2017
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution.
IEEE Trans. Inf. Forensics Secur., 2017
Secur. Commun. Networks, 2017
Research on watermarking payload under the condition of keeping JPEG image transparency.
Multim. Tools Appl., 2017
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017
IEEE Internet Things J., 2017
Int. J. Distributed Sens. Networks, 2017
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017
Int. J. Distributed Sens. Networks, 2017
IET Inf. Secur., 2017
Concurr. Comput. Pract. Exp., 2017
IEEE Access, 2017
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016
Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud.
Concurr. Comput. Pract. Exp., 2016
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016
Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Advances on Broad-Band Wireless Computing, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015
2014
Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise.
Quantum Inf. Process., 2014
KSII Trans. Internet Inf. Syst., 2014
2013
Multi-party quantum secret sharing with the single-particle quantum state to encode the information.
Quantum Inf. Process., 2013
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management.
J. Softw., 2013
J. Comput., 2013
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013
2012
Quantum Inf. Process., 2012
J. Networks, 2012
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012
2011
EURASIP J. Inf. Secur., 2011
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011
Proceedings of the Applied Informatics and Communication - International Conference, 2011
2010
Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010
2009
Int. J. Distributed Sens. Networks, 2009
Proceedings of the Advances in Information Security and Assurance, 2009
Proceedings of the Advances in Neural Networks, 2009
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Proceedings of the International Symposium on Information Processing, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
2007
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2003
1997
IEEE Trans. Commun., 1997