Hui Xia

According to our database1, Hui Xia authored at least 65 papers between 2006 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
A Novel Light-Weight Subjective Trust Inference Framework in MANETs.
IEEE Trans. Sustain. Comput., 2020

A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems.
IEEE Trans. Netw. Sci. Eng., 2020

Security Access Solution of Cloud Services for Trusted Mobile Terminals Based on TrustZone.
I. J. Network Security, 2020

Improve the Resilience of Multilayer Supply Chain Networks.
Complexity, 2020

Privacy Protection: An Anti-Fraud Scheme Based on Improved Bayesian Game Model in Multimedia Communication System.
IEEE Access, 2020

A Novel Community Detection Algorithm Based on Paring, Splitting and Aggregating in Internet of Things.
IEEE Access, 2020

Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things.
IEEE Access, 2020

2019
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Veh. Technol., 2019

DC-Biased Magnetization Based Eddy Current Thermography for Subsurface Defect Detection.
IEEE Trans. Ind. Informatics, 2019

Research on a Mechanism of Transparent Separation of Trusted Cloud Tenants.
I. J. Network Security, 2019

A Semantic Expansion Model for VGI Retrieval.
ISPRS Int. J. Geo-Information, 2019

An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Comput. Networks, 2019

DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

A Trend Filtering Based Prediction Model on Network Traffic.
Proceedings of the Advances in Natural Computation, Fuzzy Systems and Knowledge Discovery - Proceedings of the 15th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD 2019), Kunming, China, July 20-22, 2019, 2019

2018
Fast and Accurate Finite Transducer Analysis Method for Wireless Passive Impedance-Loaded SAW Sensors.
Sensors, 2018

Towards a Novel Trust-Based Multicast Routing for VANETs.
Security and Communication Networks, 2018

Secure Cloud Storage Model Based on TPKE and ECE.
J. Inf. Hiding Multim. Signal Process., 2018

Implicit Privacy Protection in Spatio-temporal Data Distribution.
J. Inf. Hiding Multim. Signal Process., 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

A BasisEvolution framework for network traffic anomaly detection.
Comput. Networks, 2018

A Novel Recommendation-Based Trust Inference Model for MANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A Reputation Management Framework for MANETs.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks.
Proceedings of the 2018 International Conference on Identification, 2018

Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Planar-coil-based Micro-detection in Nuclear Magnetic Resonance Spectroscopy.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
An Online MFL Sensing Method for Steel Pipe Based on the Magnetic Guiding Effect.
Sensors, 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Netw. Comput. Appl., 2017

A bibliometric and visual analysis of global geo-ontology research.
Comput. Geosci., 2017

Design and control of entrainer-assisted reactive distillation for N-propyl propionate production.
Comput. Chem. Eng., 2017

Sensor instrumentation for micro magnetic resonance imaging towards tissue biopsies.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wireless Personal Communications, 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wirel. Networks, 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Netw. Comput. Appl., 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
Int. J. Wirel. Inf. Networks, 2016

Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest.
Entropy, 2016

Node Trust Prediction Framework in Mobile Ad Hoc Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Magneto-Acousto-Electrical Tomography With Magnetic Induction for Conductivity Reconstruction.
IEEE Trans. Biomed. Engineering, 2015

Temporal-Spatial Evolution Analysis of Lake Size-Distribution in the Middle and Lower Yangtze River Basin Using Landsat Imagery Data.
Remote. Sens., 2015

A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique.
Inf. Sci., 2015

A method of extracting human facial feature points based on 3D laser scanning point cloud data.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
Multi-channel atomic magnetometer for magnetoencephalography: A configuration study.
NeuroImage, 2014

Applying link stability estimation mechanism to multicast routing in MANETs.
J. Syst. Archit., 2014

Research of trust model based on fuzzy theory in mobile ad hoc networks.
IET Information Security, 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks.
Comput. Commun., 2013

Trust prediction and trust-based source routing in mobile ad hoc networks.
Ad Hoc Networks, 2013

Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering.
Proceedings of the 12th IEEE International Conference on Trust, 2013

TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model.
Comput. Commun., 2012

Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

LQ-based optimization for linear impulsive control systems mixed with continuous-time controls and fixed-time impulses.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory.
IET Wireless Sensor Systems, 2011

Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

2010
An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Soil water division by SPSS statistics analysis software in Hebei Province.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Prediction of annual precipitation based on fuzzy and grey Markov process.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

A Method for Dam Safety Evaluation Based on Dempster-Shafer Theory.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2007
A Method of Requirement Inconsistency Analysis.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Physically Based Animation of Tongue on Fire in a Periodic Domain.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006


  Loading...