Mande Xie

Orcid: 0000-0002-7152-1327

According to our database1, Mande Xie authored at least 59 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Enhancing Robustness of Memristor Crossbar-Based Spiking Neural Networks against Nonidealities: A Hybrid Approach for Neuromorphic Computing in Noisy Environments.
Adv. Intell. Syst., November, 2023

DLPM: A dynamic location protection mechanism supporting continuous queries.
Concurr. Comput. Pract. Exp., 2023

Bab: A novel algorithm for training clean model based on poisoned data.
Proceedings of the Workshop on Artificial Intelligence Safety 2023 (SafeAI 2023) co-located with the Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023), 2023

2022
Edge-Based Communication Optimization for Distributed Federated Learning.
IEEE Trans. Netw. Sci. Eng., 2022

A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices.
J. Parallel Distributed Comput., 2022

A CCA secure public key encryption scheme based on finite groups of Lie type.
Sci. China Inf. Sci., 2022

PriHorus: Privacy-Preserving RSS-Based Indoor Positioning.
Proceedings of the IEEE International Conference on Communications, 2022

2021
A parallel joint optimized relay selection protocol for wake-up radio enabled WSNs.
Phys. Commun., 2021

A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices.
Future Gener. Comput. Syst., 2021

Adaptive Contention Window MAC Protocol in a Global View for Emerging Trends Networks.
IEEE Access, 2021

A Novel Protection Method of Continuous Location Sharing Based on Local Differential Privacy and Conditional Random Field.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT.
IEEE Trans. Ind. Informatics, 2020

MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2020

Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles.
IEEE Trans. Ind. Informatics, 2020

Edge-based differential privacy computing for sensor-cloud systems.
J. Parallel Distributed Comput., 2020

A novel trust mechanism based on Fog Computing in Sensor-Cloud System.
Future Gener. Comput. Syst., 2020

Fast Multicast With Adjusting Transmission Power and Active Slots in Software Define IoT.
IEEE Access, 2020

A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing.
ACM Trans. Intell. Syst. Technol., 2019

When Sensor-Cloud Meets Mobile Edge Computing.
Sensors, 2019

Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications.
Peer-to-Peer Netw. Appl., 2019

UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City.
Peer-to-Peer Netw. Appl., 2019

Coupling resource management based on fog computing in smart city systems.
J. Netw. Comput. Appl., 2019

Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT.
EURASIP J. Wirel. Commun. Netw., 2019

A low redundancy data collection scheme to maximize lifetime using matrix completion technique.
EURASIP J. Wirel. Commun. Netw., 2019

A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.
Comput. J., 2019

To Reduce Delay, Energy Consumption and Collision through Optimization Duty-Cycle and Size of Forwarding Node Set in WSNs.
IEEE Access, 2019

Reducing Delay and Maximizing Lifetime for Wireless Sensor Networks With Dynamic Traffic Patterns.
IEEE Access, 2019

An Efficient Information Maximization Based Adaptive Congestion Control Scheme in Wireless Sensor Network.
IEEE Access, 2019

A Game-Based Economic Model for Price Decision Making in Cyber-Physical-Social Systems.
IEEE Access, 2019

A Certificateless Verifiable Strong Designated Verifier Signature Scheme.
IEEE Access, 2019

2018
Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks.
Sensors, 2018

Differentiated Data Aggregation Routing Scheme for Energy Conserving and Delay Sensitive Wireless Sensor Networks.
Sensors, 2018

Data Security and Privacy in Fog Computing.
IEEE Netw., 2018

CCA-secure ABE with outsourced decryption for fog computing.
Future Gener. Comput. Syst., 2018

Fog-based storage technology to fight with cyber threat.
Future Gener. Comput. Syst., 2018

Energy-efficient relay tracking with multiple mobile camera sensors.
Comput. Networks, 2018

2017
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.
Inf. Sci., 2017

2016
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications.
Mob. Inf. Syst., 2016

Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
An Adaptive Aggregation Scheduling Algorithm Based on the Grid Partition in Large-Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2015

Social role-based secure large data objects dissemination in mobile sensing environment.
Comput. Commun., 2015

An Energy-Efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
The Optimal Partition Algorithm for Multiple Video Sequences in Streaming Media System.
J. Networks, 2014

The Degree-Constrained Adaptive Algorithm Based on the Data Aggregation Tree.
Int. J. Distributed Sens. Networks, 2014

Wireless Sensor Networks Energy Effectively Distributed Target Detection.
Int. J. Distributed Sens. Networks, 2014

A Topology Construct and Control Model with Small-World and Scale-Free Concepts for Heterogeneous Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

2012
Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks.
Comput. Electr. Eng., 2012

2011
The Design and Implementation of the Digital Down Converter Based on the Improved DDS and DSPBuilder Techniques.
J. Digit. Inf. Manag., 2011

The Design and Challenges of Online Reprogramming System for Wireless Sensor Networks.
J. Digit. Inf. Manag., 2011

Unidirectional Identity-Based Proxy Re-Signature.
Proceedings of IEEE International Conference on Communications, 2011

Identity-Based Conditional Proxy Re-Encryption.
Proceedings of IEEE International Conference on Communications, 2011

2010
An Efficient Architecture for Semi-real-Time Graphical Simulation Based on Mobile Computing Devices in Wireless WMS system.
Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, 2010

2009
A Budget-Based Cost-Effective Incentive Model.
Proceedings of the ICPPW 2009, 2009

2008
An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...