Xinsheng Ji

According to our database1, Xinsheng Ji authored at least 33 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2022
Discussion on a new paradigm of endogenous security towards 6G networks.
Frontiers Inf. Technol. Electron. Eng., 2022

2021
A Novel Pilot Spoofing Scheme via Intelligent Reflecting Surface Based on Statistical CSI.
IEEE Trans. Veh. Technol., 2021

Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface.
Secur. Commun. Networks, 2021

Research on SSTI attack defense technology based on instruction set randomization.
Proceedings of the ICAIIS 2021: 2021 2nd International Conference on Artificial Intelligence and Information Systems, Chongqing, China, May 28, 2021

2020
Toward Latency-Optimal Placement and Autoscaling of Monitoring Functions in MEC.
IEEE Access, 2020

MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator's Network.
IEEE Access, 2020

Link Prediction in Directed Networks Utilizing the Role of Reciprocal Links.
IEEE Access, 2020

Link Prediction Based on Information Preference Connection for Directed Network.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

2019
一种基于差分隐私的数据查询分级控制策略 (Hierarchical Control Strategy for Data Querying Based on Differential Privacy).
计算机科学, 2019

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks.
KSII Trans. Internet Inf. Syst., 2019

Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet.
IET Commun., 2019

MIN: Co-Governing Multi-Identifier Network Architecture and its Prototype on Operator's Network.
CoRR, 2019

The Prototype of Decentralized Multilateral Co-Governing Post-IP Internet Architecture and Its Testing on Operator Networks.
CoRR, 2019

Artificial Noise Aided Hybrid Analog-Digital Beamforming for Secure Transmission in MIMO Millimeter Wave Relay Systems.
IEEE Access, 2019

2018
Link Quality Analysis Based Channel Selection in High-Frequency Asynchronous Automatic Link Establishment: A Matrix Completion Approach.
IEEE Syst. J., 2018

Minimizing secrecy outage probability in D2D-enabled cellular networks: Access control with power optimization.
Trans. Emerg. Telecommun. Technol., 2018

Physical layer security in multi-antenna cognitive heterogeneous cellular networks: a unified secrecy performance analysis.
Sci. China Inf. Sci., 2018

A proactive defense mechanism for mobile communication user data.
Sci. China Inf. Sci., 2018

Overview of 5G security technology.
Sci. China Inf. Sci., 2018

Opportunistic access control for enhancing security in D2D-enabled cellular networks.
Sci. China Inf. Sci., 2018

2017
AKA-PLA: Enhanced AKA Based on Physical Layer Authentication.
KSII Trans. Internet Inf. Syst., 2017

Correction to: Artificial noise-assisted physical layer security in D2D-enabled cellular networks.
EURASIP J. Wirel. Commun. Netw., 2017

Artificial noise-assisted physical layer security in D2D-enabled cellular networks.
EURASIP J. Wirel. Commun. Netw., 2017

Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Physical layer security in D2D-enabled cellular networks: Artificial noise assisted.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

2016
Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers.
Proceedings of the 19th International Symposium on Wireless Personal Multimedia Communications, 2016

A novel method of Wi-Fi indoor localization based on channel state information.
Proceedings of the 8th International Conference on Wireless Communications & Signal Processing, 2016

Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted.
Proceedings of the IEEE 84th Vehicular Technology Conference, 2016

2015
A physical-layer authentication scheme based on hash method.
Proceedings of the 2015 IEEE/CIC International Conference on Communications in China, 2015

2014
Achieving strong security based on fountain code with coset pre-coding.
IET Commun., 2014

A Study on Networking Scheme of Indoor Visible Light Communication Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

2011
Analysis of Abnormal Events in IMS and Research on the Strategy of Detection.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2008
A Transmission Scheme for Encrypted Speech over GSM Network.
Proceedings of the 2008 International Symposium on Computer Science and Computational Technology, 2008


  Loading...