Mingxing He

Orcid: 0000-0003-4170-2378

According to our database1, Mingxing He authored at least 49 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An efficient and privacy-preserving query scheme in intelligent transportation systems.
Inf. Sci., November, 2023

Non-Contact Adaptive Voltage Sensor Based on Electric Field Coupling Principle.
Sensors, October, 2023

A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services.
Sensors, February, 2023

Self-Calibration Sensor for Contactless Voltage Measurement Based on Dynamic Capacitance.
Sensors, 2023

2022
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services.
IEEE Trans. Cloud Comput., 2022

Research on a Non-Contact Multi-Electrode Voltage Sensor and Signal Processing Algorithm.
Sensors, 2022

Strong consistency of the MLE under two-parameter Gamma mixture models with a structural scale parameter.
Adv. Data Anal. Classif., 2022

A Blockchain-Based Decentralized Privacy-Preserving Mobile Payment Scheme Using Anonymous Credentials.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2020
Efficient Hierarchical Authentication Protocol for Multiserver Architecture.
Secur. Commun. Networks, 2020

A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix.
Multim. Tools Appl., 2020

A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy.
Inf. Sci., 2020

Anonymous Transaction of Digital Currency Based on Blockchain.
Int. J. Netw. Secur., 2020

A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods.
IEEE Access, 2020

High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique.
IEEE Access, 2020

2019
山洞环境中声信号的传播模型及其性能研究 (Acoustic Signal Propagation Model and Its Performance in Cave Environment).
计算机科学, 2019

Secure High Capacity Data Hiding Scheme based on Reference Matrix.
Int. J. Netw. Secur., 2019

A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload.
IEEE Access, 2019

2018
New Approach for Privacy-Aware Location-Based Service Communications.
Wirel. Pers. Commun., 2018

Image Style Transfer with Multi-target Loss for loT Applications.
Proceedings of the 15th International Symposium on Pervasive Systems, 2018

2017
Concurrently deniable ring authentication and its application to LBS in VANETs.
Peer-to-Peer Netw. Appl., 2017

应用于认知无线电频谱预测的小波神经网络模型 (Wavelet Neural Network Model for Cognitive Radio Spectrum Prediction).
计算机科学, 2017

Deniable Ring Authentication Based on Projective Hash Functions.
Proceedings of the Provable Security, 2017

2016
Privacy-preserving location-based service based on deniable authentication.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

2015
Universally composable asymmetric group key agreement protocol.
Proceedings of the 10th International Conference on Information, 2015

2013
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2011
Improved ID-based Ring Signature Scheme with Constant-size Signatures.
Informatica (Slovenia), 2011

A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization.
Expert Syst. Appl., 2011

Mutual funds trading strategy based on particle swarm optimization.
Expert Syst. Appl., 2011

An efficient phishing webpage detector.
Expert Syst. Appl., 2011

A fast RFID tag identification algorithm based on counter and stack.
Expert Syst. Appl., 2011

2010
Performance evaluation of score level fusion in multimodal biometric systems.
Pattern Recognit., 2010

Improvement of a Secure Convex Hull Two-Party Computation Protocol.
J. Convergence Inf. Technol., 2010

Improved Efficient Forward Secure Signature Scheme.
Proceedings of the International Conference on E-Business and E-Government, 2010

Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks.
IEEE Trans. Wirel. Commun., 2009

Comments on "Modified Hough Transform for Searching Radar Detection".
IEEE Geosci. Remote. Sens. Lett., 2009

Design of Power Quality Monitoring System Based on DSP.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009

2008
A Self-healing Key Distribution Scheme with Novel Properties.
Int. J. Netw. Secur., 2008

An Improved Distributed Key Management Scheme in Wireless Sensor Networks.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks.
Proceedings of the Provable Security, Second International Conference, 2008

An Improved Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group.
Proceedings of the The Third International Conference on Availability, 2008

2006
A Protocol of Member-Join in a Secret Sharing Scheme.
Proceedings of the Information Security Practice and Experience, 2006

Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2004
Group Key Agreement Protocol Based on GH-KEP.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

2003
Group Oriented Digital Certificate Architecture.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003


  Loading...