Dongqing Xie

According to our database1, Dongqing Xie authored at least 72 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage.
Security and Communication Networks, 2018

Hypercube-Based Crowding Differential Evolution with Neighborhood Mutation for Multimodal Optimization.
IJSIR, 2018

Heterogeneous Differential Evolution with Memory Enhanced Brownian and Quantum Individuals for Dynamic Optimization Problems.
IJPRAI, 2018

On the performance of three-dimensionalantenna arrays in millimetre wave propagation environments.
IET Communications, 2018

Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links.
IEEE Access, 2018

A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding.
IEEE Access, 2018

Spectral and Energy Efficiency of Massive MIMO for Hybrid Architectures Based on Phase Shifters.
IEEE Access, 2018

Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks.
IEEE Access, 2018

High Quality Participant Recruitment of Mobile Crowdsourcing over Big Data.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges.
IEEE Network, 2017

Social influence modeling using information theory in mobile social networks.
Inf. Sci., 2017

A high-level exploration tool for three-dimensional network-on-chip.
IJCSE, 2017

Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures.
Concurrency and Computation: Practice and Experience, 2017

Generalized Pair-Counting Similarity Measures for Clustering and Cluster Ensembles.
IEEE Access, 2017

DF Relaying Networks With Randomly Distributed Interferers.
IEEE Access, 2017

Joint User and Relay Selection for Cooperative NOMA Networks.
IEEE Access, 2017

Hybrid cache placement for improving physical layer security in cooperative networks.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

DF relaying networks in randomly distributed interference environments.
Proceedings of the 9th International Conference on Wireless Communications and Signal Processing, 2017

Exploring user topic influence for group recommendation on learning resources.
Proceedings of the 2017 IEEE SmartWorld, 2017

Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study.
Proceedings of the 2017 IEEE SmartWorld, 2017

Data-Driven Influence Learning in Social Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Using Deep Neural Networks to Simulate Human Body.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Certificateless Cryptography with KGC Trust Level 3 Revisited.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Secure Auditing and Deduplicating Data in Cloud.
IEEE Trans. Computers, 2016

Round-optimal ID-based dynamic authenticated group key agreement.
IJHPSA, 2016

Fuzzy and Semantic Search over Encrypted Data in the Cloud.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016

An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings.
Proceedings of the 10th International Conference on Complex, 2016

Putative protein interaction analysis for human embryonic stem cell derived cardiomyocytes.
Proceedings of the 9th International Congress on Image and Signal Processing, 2016

Maximizing the Spread of Positive Influence Under LT-MLA Model.
Proceedings of the Advances in Services Computing, 2016

2015
Component-Based Verification Model of Sequential Programs.
JSW, 2015

Gene set enrichment ensemble using fold change data only.
Journal of Biomedical Informatics, 2015

Energy-Balanced Data Gathering and Aggregating in WSNs: A Compressed Sensing Scheme.
IJDSN, 2015

Real-time Network Risk Evaluation Paradigm-inspired by Immune.
Proceedings of the 11th International Conference on Natural Computation, 2015

Adaptive metric selection for clustering based on consensus affinity.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Unsupervised evaluation of cluster ensemble solutions.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

An approximate optimal coverage set algorithm in wireless sensor networks.
Proceedings of the Seventh International Conference on Advanced Computational Intelligence, 2015

Semi-supervised clustering with associative-link constraints for 3D models.
Proceedings of the 12th International Conference on Fuzzy Systems and Knowledge Discovery, 2015

2014
Semi-supervised clustering with pairwise and size constraints.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

AORS: Affinity-based outlier ranking score.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

2013
An Internet behavior management system based on Android.
JSW, 2013

Controllable Ring Signatures and Its Application to E-Prosecution.
JCP, 2013

Data Gathering and Processing for Large-Scale Wireless Sensor Networks.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Cost Evaluation of Three-Dimensional Network-on-Chip.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Cost Evaluation of Three-Dimensional Many-Core Processors.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

The Systematic Form of a Class of Regular Structured LDPC Codes.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Server-Aided Hierarchical Identity-Based Encryption.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2012
Faster Computation of Self-Pairings.
IEEE Trans. Information Theory, 2012

A New Unsupervised Feature Ranking Method for Gene Expression Data Based on Consensus Affinity.
IEEE/ACM Trans. Comput. Biology Bioinform., 2012

An Immune-inspired Adaptive Automated Intrusion Response System Model.
Int. J. Comput. Intell. Syst., 2012

Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Information Security Practice and Experience, 2012

Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

2011
Computing bilinear pairings on elliptic curves with automorphisms.
Des. Codes Cryptogr., 2011

Minimal privacy authorization in web services collaboration.
Computer Standards & Interfaces, 2011

PrChord: A probability routing structured P2P protocol.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

Multi-authority ciphertext-policy attribute-based encryption with accountability.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Faster Computation of Self-pairings.
IACR Cryptology ePrint Archive, 2010

A robust watermarking scheme for 3D point cloud models using self-similarity partition.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

Attribute-based signature and its applications.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
A Novel Distributed Detection Scheme against DDoS Attack.
JNW, 2009

How to construct efficient on-line/off-line threshold signature schemes through the simulation approach.
Concurrency and Computation: Practice and Experience, 2009

Improved Implementations of Cryptosystems Based on Tate Pairing.
Proceedings of the Advances in Information Security and Assurance, 2009

Divisible On-Line/Off-Line Signatures.
Proceedings of the Topics in Cryptology, 2009

2008
Reducing the Complexity of the Weil Pairing Computation.
IACR Cryptology ePrint Archive, 2008

Computing Bilinear Pairings on Elliptic Curves with Automorphisms.
IACR Cryptology ePrint Archive, 2008

A Deployment Algorithm to Achieve both Connectivity and Coverage in Grid Sensor Networks.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Decreasing System Load by Caching in Structured P2P Systems.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications, 2008

2007
Chameleon Hashes Without Key Exposure Based on Factoring.
J. Comput. Sci. Technol., 2007

The Analysis of Fault Tolerance in Triangular Topology Sensor Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, 2007

2006
Controllable Ring Signatures.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

A Probabilistic Certificate Updating Protocol for MANET.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Designing a Secure Trust Intermediary Service (STIS) for Web Services: a WS-Trust Approach.
Proceedings of The 2005 International Conference on Security and Management, 2005


  Loading...