Xinxin Niu

Orcid: 0000-0001-9020-8021

According to our database1, Xinxin Niu authored at least 90 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Coordinated Multicast and Unicast Robust Transmission in C-V2V Massive MIMO With Imperfect CSI.
IEEE Trans. Veh. Technol., November, 2024

Precoding Design for Coordinated Multicast and Unicast Transmission in C-V2V Massive MIMO With Imperfect CSI.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

2022
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs.
Int. J. Intell. Syst., 2022

Coordinated multicast and unicast transmission in V2V underlay massive MIMO.
Sci. China Inf. Sci., 2022

2021
Game Theoretic Suppression of Forged Messages in Online Social Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Representativeness-Based Instance Selection for Intrusion Detection.
Secur. Commun. Networks, 2021

Generating facial expression adversarial examples based on saliency map.
Image Vis. Comput., 2021

Adv-Emotion: The Facial Expression Adversarial Attack.
Int. J. Pattern Recognit. Artif. Intell., 2021

2020
Searching for optimal quantum secret sharing scheme based on local distinguishability.
Quantum Inf. Process., 2020

SLBRS: Network Virus Propagation Model based on Safety Entropy.
Appl. Soft Comput., 2020

Phase Shift Adjustable Pilots for Channel Acquisition in Vehicle-to-Vehicle Underlay Wideband Massive MIMO.
IEEE Access, 2020

2019
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks.
Secur. Commun. Networks, 2019

Capacity of blockchain based Internet-of-Things: Testbed and analysis.
Internet Things, 2019

Survey on blockchain for Internet of Things.
Comput. Commun., 2019

Efficient quantum state transmission via perfect quantum network coding.
Sci. China Inf. Sci., 2019

SMOTETomek-Based Resampling for Personality Recognition.
IEEE Access, 2019

2018
The Impact of Link Duration on the Integrity of Distributed Mobile Networks.
IEEE Trans. Inf. Forensics Secur., 2018

Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.
Soft Comput., 2018

Rational protocol of quantum secure multi-party computation.
Quantum Inf. Process., 2018

General Theory of security and a study of hacker's behavior in big data era.
Peer-to-Peer Netw. Appl., 2018

A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.
IEEE Netw., 2018

New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems.
KSII Trans. Internet Inf. Syst., 2018

Image captioning with triple-attention and stack parallel LSTM.
Neurocomputing, 2018

Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others.
Fundam. Informaticae, 2018

An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.
Comput. J., 2018

A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain.
IEEE Access, 2018

Attack and Defence of Ethereum Remote APIs.
Proceedings of the IEEE Globecom Workshops, 2018

2017
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution.
IEEE Trans. Inf. Forensics Secur., 2017

Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection.
Secur. Commun. Networks, 2017

Research on watermarking payload under the condition of keeping JPEG image transparency.
Multim. Tools Appl., 2017

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection.
KSII Trans. Internet Inf. Syst., 2017

General Theory of Security and a Study Case in Internet of Things.
IEEE Internet Things J., 2017

Pairing-free equality test over short ciphertexts.
Int. J. Distributed Sens. Networks, 2017

Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.
Int. J. Distributed Sens. Networks, 2017

Efficient data possession-checking protocol with deduplication in cloud.
Int. J. Distributed Sens. Networks, 2017

Defending shilling attacks in recommender systems using soft co-clustering.
IET Inf. Secur., 2017

Dynamic data integrity auditing for secure outsourcing in the cloud.
Concurr. Comput. Pract. Exp., 2017

Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing.
IEEE Access, 2017

Analytic model on data security in VANETs.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

2016
Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks.
IEEE Trans. Inf. Forensics Secur., 2016

A steganalysis method in the DCT domain.
Multim. Tools Appl., 2016

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016

Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.
Int. J. Distributed Sens. Networks, 2016

Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud.
Concurr. Comput. Pract. Exp., 2016

A Star-Topological Privacy Encryption for Telecare Medical Information Systems.
Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems, 2016

Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Oblivious Transfer Protocols Based on Group Factoring Problem.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
Defense Strategy of Network Security based on Dynamic Classification.
KSII Trans. Internet Inf. Syst., 2015

Secure Data Transmission and Modelling in Vehicular Ad Hoc Networks.
Proceedings of the 2015 IEEE Globecom Workshops, San Diego, CA, USA, December 6-10, 2015, 2015

2014
Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise.
Quantum Inf. Process., 2014

A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure.
KSII Trans. Internet Inf. Syst., 2014

2013
Expansible quantum secret sharing network.
Quantum Inf. Process., 2013

Multi-party quantum secret sharing with the single-particle quantum state to encode the information.
Quantum Inf. Process., 2013

Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management.
J. Softw., 2013

Security Protocol for RFID System Conforming to EPC-C1G2 Standard.
J. Comput., 2013

Guest Editorial.
J. Comput., 2013

A Semi-supervised Ensemble Approach for Mining Data Streams.
J. Comput., 2013

Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing.
J. Comput., 2013

Non-uniform Quantization in Breaking HUGO.
Proceedings of the Digital-Forensics and Watermarking - 12th International Workshop, 2013

2012
Experimental architecture of joint remote state preparation.
Quantum Inf. Process., 2012

A Video Watermarking Algorithm of H.264/AVC for Content Authentication.
J. Networks, 2012

A Novel Mapping Scheme for Steganalysis.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

A correlation analysis method of network security events based on rough set theory.
Proceedings of the 3rd IEEE International Conference on Network Infrastructure and Digital Content, 2012

2011
Research of Spatial Domain Image Digital Watermarking Payload.
EURASIP J. Inf. Secur., 2011

Multiple-image compressed encryption and decryption by compressive holography.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

An Anti-JPEG Compression Image Perceptual Hashing Algorithm.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
Conjugate adjoining problem in braid groups and new design of braid-based signatures.
Sci. China Inf. Sci., 2010

Secure network coding in the presence of eavesdroppers.
Sci. China Inf. Sci., 2010

A color image watermarking algorithm resistant to print-scan.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

A near reversible image watermarking algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Towards Hierarchical-User RBAC model.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

2009
A Novel Identity-Based Multi-Signcryption Scheme.
Int. J. Distributed Sens. Networks, 2009

An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle.
Proceedings of the Advances in Neural Networks, 2009

Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency.
Proceedings of the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), 2009

Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Classify the Majority of the Total Bytes on the Internet.
Proceedings of the International Symposium on Information Processing, 2008

Multiplicative Watermark Detection Using Locally Optimum Nonlinearity.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A Novel Relational Database Watermarking Algorithm for Joint Ownership.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

2007
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Security Mechanism Research of EMV2000.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

Improved Remote User Authentication Scheme Preserving User Anonymity.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

A Quantitative Security Model of IMS System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

Secure and Flexible Digital Rights Management in a Pervasive Usage Mode.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Analysis of Current Steganography Tools: Classifications & Features.
Proceedings of the Second International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), 2006

Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2003
New Efficient Timed Commitment Schemes.
Int. J. Inf. Technol. Decis. Mak., 2003

1997
Counterexample of truncated Costas optical orthogonal codes.
IEEE Trans. Commun., 1997


  Loading...