Hui Xia

According to our database1, Hui Xia authored at least 52 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
An Attack-Resistant Trust Inference Model for Securing Routing in Vehicular Ad Hoc Networks.
IEEE Trans. Vehicular Technology, 2019

An efficient social-like semantic-aware service discovery mechanism for large-scale Internet of Things.
Computer Networks, 2019

DDSEIR: A Dynamic Rumor Spreading Model in Online Social Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Trustworthiness Inference Framework in the Social Internet of Things: A Context-Aware Approach.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019

2018
Fast and Accurate Finite Transducer Analysis Method for Wireless Passive Impedance-Loaded SAW Sensors.
Sensors, 2018

Towards a Novel Trust-Based Multicast Routing for VANETs.
Security and Communication Networks, 2018

Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction.
Inf. Sci., 2018

A BasisEvolution framework for network traffic anomaly detection.
Computer Networks, 2018

A Novel Recommendation-Based Trust Inference Model for MANETs.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

A Reputation Management Framework for MANETs.
Proceedings of the 2018 IEEE Symposium on Privacy-Aware Computing, 2018

An attack-Resistant Reputation Management System For Mobile Ad Hoc Networks.
Proceedings of the 2018 International Conference on Identification, 2018

Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Planar-coil-based Micro-detection in Nuclear Magnetic Resonance Spectroscopy.
Proceedings of the 5th International Conference on Systems and Informatics, 2018

Developing Offloading-Enabled Application Development Frameworks for Android Mobile Devices.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
An Online MFL Sensing Method for Steel Pipe Based on the Magnetic Guiding Effect.
Sensors, 2017

Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium.
J. Network and Computer Applications, 2017

A bibliometric and visual analysis of global geo-ontology research.
Computers & Geosciences, 2017

Design and control of entrainer-assisted reactive distillation for N-propyl propionate production.
Computers & Chemical Engineering, 2017

Sensor instrumentation for micro magnetic resonance imaging towards tissue biopsies.
Proceedings of the 10th International Congress on Image and Signal Processing, 2017

2016
Forward-Secure Identity-Based Signature Scheme in Untrusted Update Environments.
Wireless Personal Communications, 2016

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks.
Wireless Networks, 2016

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks.
J. Network and Computer Applications, 2016

Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor Networks.
IJWIN, 2016

Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest.
Entropy, 2016

Node Trust Prediction Framework in Mobile Ad Hoc Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A flexible and scalable implementation of elliptic curve cryptography over GF(p) based on ASIP.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model".
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Magneto-Acousto-Electrical Tomography With Magnetic Induction for Conductivity Reconstruction.
IEEE Trans. Biomed. Engineering, 2015

Temporal-Spatial Evolution Analysis of Lake Size-Distribution in the Middle and Lower Yangtze River Basin Using Landsat Imagery Data.
Remote Sensing, 2015

A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique.
Inf. Sci., 2015

A method of extracting human facial feature points based on 3D laser scanning point cloud data.
Proceedings of the 23rd International Conference on Geoinformatics, 2015

2014
Multi-channel atomic magnetometer for magnetoencephalography: A configuration study.
NeuroImage, 2014

Applying link stability estimation mechanism to multicast routing in MANETs.
Journal of Systems Architecture - Embedded Systems Design, 2014

Research of trust model based on fuzzy theory in mobile ad hoc networks.
IET Information Security, 2014

Trust-Enhanced Multicast Routing Protocol Based on Node's Behavior Assessment for MANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks.
Computer Communications, 2013

Trust prediction and trust-based source routing in mobile ad hoc networks.
Ad Hoc Networks, 2013

Context-Aware Routing Algorithm for WSNs Based on Unequal Clustering.
Proceedings of the 12th IEEE International Conference on Trust, 2013

TimSim: A Timestep-Based Wireless Ad-Hoc Network Simulator.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and Markov SCGM(1, 1) model.
Computer Communications, 2012

Link Stability Evaluation and Stability Based Multicast Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

LQ-based optimization for linear impulsive control systems mixed with continuous-time controls and fixed-time impulses.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

2011
Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory.
IET Wireless Sensor Systems, 2011

Multicast Trusted Routing with QoS Multi-constraints in Wireless Ad Hoc Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules.
Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom), 2011

2010
An Architecture for the Agricultural Machinery Intelligent Scheduling in Cross-Regional Work Based on Cloud Computing and Internet of Things.
Proceedings of the Computer and Computing Technologies in Agriculture IV, 2010

Soil water division by SPSS statistics analysis software in Hebei Province.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

Prediction of annual precipitation based on fuzzy and grey Markov process.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2010

A Method for Dam Safety Evaluation Based on Dempster-Shafer Theory.
Proceedings of the Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence, 2010

Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2007
A Method of Requirement Inconsistency Analysis.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

2006
Physically Based Animation of Tongue on Fire in a Periodic Domain.
Proceedings of the 16th International Conference on Artificial Reality and Telexistence, 2006


  Loading...