default search action
Ning Xi 0002
Person information
- affiliation (PhD 2014): Xidian University, School of Computer Science and Technology / School of Cyber Engineering, Xi'an, China
Other persons with the same name
- Ning Xi — disambiguation page
- Ning Xi 0001 — University of Hong Kong, Department of Industrial and Manufacturing Systems Engineering, Hong Kong (and 3 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j29]Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, Jianfeng Ma:
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems. Sci. China Inf. Sci. 67(6) (2024) - [j28]Pengbin Feng, Le Gai, Li Yang, Qin Wang, Teng Li, Ning Xi, Jian Feng Ma:
DawnGNN: Documentation augmented windows malware detection using graph neural network. Comput. Secur. 140: 103788 (2024) - [j27]Chuang Tian, Jianfeng Ma, Teng Li, Junwei Zhang, Chengyan Ma, Ning Xi:
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings. IEEE Trans. Inf. Forensics Secur. 19: 4448-4463 (2024) - [j26]Chengyan Ma, Di Lu, Chaoyue Lv, Ning Xi, Xiaohong Jiang, Yulong Shen, Jianfeng Ma:
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems. IEEE Trans. Knowl. Data Eng. 36(9): 4472-4485 (2024) - [j25]Zhiwei Zhang, Zehan Chen, Yulong Shen, Xuewen Dong, Ning Xi:
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles. IEEE Trans. Veh. Technol. 73(6): 7532-7546 (2024) - 2023
- [j24]Ke Cheng, Jiaxuan Fu, Yulong Shen, Haichang Gao, Ning Xi, Zhiwei Zhang, Xinghui Zhu:
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT. IEEE Internet Things J. 10(16): 14856-14872 (2023) - [j23]Hui Qiao, Xuewen Dong, Qi Jiang, Siqi Ma, Chao Liu, Ning Xi, Yulong Shen:
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System. IEEE Internet Things J. 10(19): 16715-16726 (2023) - [j22]Ke Cheng, Ning Xi, Ximeng Liu, Xinghui Zhu, Haichang Gao, Zhiwei Zhang, Yulong Shen:
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization. IEEE Trans. Computers 72(12): 3519-3531 (2023) - [j21]Dawei Wei, Junying Zhang, Mohammad Shojafar, Saru Kumari, Ning Xi, Jianfeng Ma:
Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET. IEEE Trans. Intell. Transp. Syst. 24(11): 13108-13122 (2023) - [j20]Pengbin Feng, Li Yang, Di Lu, Ning Xi, Jian-Feng Ma:
BejaGNN: behavior-based Java malware detection via graph neural network. J. Supercomput. 79(14): 15390-15414 (2023) - 2022
- [j19]Chuang Tian, Qi Jiang, Teng Li, Junwei Zhang, Ning Xi, Jianfeng Ma:
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment. Comput. Networks 218: 109421 (2022) - [j18]Ning Xi, Weihui Li, Lv Jing, Jianfeng Ma:
ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV. IEEE Internet Things J. 9(22): 22903-22913 (2022) - [j17]Dawei Wei, Ning Xi, Xindi Ma, Mohammad Shojafar, Saru Kumari, Jianfeng Ma:
Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing. IEEE Trans. Ind. Informatics 18(11): 7935-7945 (2022) - 2021
- [j16]Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu:
Android Malware Detection via Graph Representation Learning. Mob. Inf. Syst. 2021: 5538841:1-5538841:14 (2021) - [j15]Dawei Wei, Ning Xi, Jianfeng Ma, Lei He:
UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things. Remote. Sens. 13(23): 4853 (2021) - 2019
- [j14]Ning Xi, Jing Lv, Cong Sun, Jianfeng Ma:
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments. Entropy 21(8): 753 (2019) - 2018
- [j13]Ning Xi, Jianfeng Ma, Cong Sun, Di Lu, Yulong Shen:
Information flow control on encrypted data for service composition among multiple clouds. Distributed Parallel Databases 36(3): 511-527 (2018) - [j12]Teng Li, Jianfeng Ma, Cong Sun, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. J. Inf. Sci. Eng. 34(4): 943-960 (2018) - [j11]Tao Zhang, Lele Zheng, Yongzhi Wang, Yulong Shen, Ning Xi, Jianfeng Ma, Jianming Yong:
Trustworthy service composition with secure data transmission in sensor networks. World Wide Web 21(1): 185-200 (2018) - 2017
- [j10]Di Lu, Jianfeng Ma, Cong Sun, Qixuan Wu, Zhaochang Sun, Ning Xi:
Building a Secure Scheme for a Trusted Hardware Sharing Environment. IEEE Access 5: 20260-20271 (2017) - [j9]Di Lu, Jianfeng Ma, Cong Sun, XinDi Ma, Ning Xi:
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing. Sci. China Inf. Sci. 60(5): 52103:1-52103:17 (2017) - [j8]XinDi Ma, Hui Li, Jianfeng Ma, Qi Jiang, Sheng Gao, Ning Xi, Di Lu:
APPLET: a privacy-preserving framework for location-aware recommender system. Sci. China Inf. Sci. 60(9): 92101 (2017) - [j7]Ning Xi, Di Lu, Cong Sun, Jianfeng Ma, Yulong Shen:
Distributed Secure Service Composition with Declassification in Mobile Clouds. Mob. Inf. Syst. 2017: 7469342:1-7469342:13 (2017) - 2015
- [j6]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen:
Secure service composition with information flow control in service clouds. Future Gener. Comput. Syst. 49: 142-148 (2015) - 2014
- [j5]Tao Zhang, Jianfeng Ma, Qi Li, Ning Xi, Cong Sun:
Trust-based service composition in multi-domain environments under time constraint. Sci. China Inf. Sci. 57(9): 1-16 (2014) - [j4]Cong Sun, Ning Xi, Sheng Gao, Zhong Chen, Jianfeng Ma:
Automated enforcement for relaxed information release with reference points. Sci. China Inf. Sci. 57(11): 1-19 (2014) - [j3]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma:
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks. J. Inf. Sci. Eng. 30(3): 875-893 (2014) - 2013
- [j2]Ning Xi, Jianfeng Ma, Cong Sun, Yulong Shen, Tao Zhang:
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j1]Yulong Shen, Xiaowei Dang, Min Shu, Ning Xi, Jianfeng Ma:
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012)
Conference and Workshop Papers
- 2024
- [c28]Yuxin Liu, Ning Xi, Ruidong Han, Yuanzhao Li, Jian Feng Ma, Yulong Shen:
Action-Driven UAV Fingerprint Verification with Perception Data. ACISP (3) 2024: 303-322 - [c27]Xin Liu, Ning Xi, Ke Cheng, Jiaxuan Fu, Xinghui Zhu, Yulong Shen, Jianfeng Ma:
Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction. ICASSP 2024: 4530-4534 - 2023
- [c26]Jinjin Wang, Yizhou Du, Xiangyu Wang, Chengyan Ma, Di Lu, Ning Xi:
TEE-Assisted Time-Scale Database Management System on IoT devices. IoT 2023: 253-259 - [c25]Yue Wang, Chao Yang, Ning Xi, Yulong Shen, Jianfeng Ma:
SEBD: Sensor Emulation Based Backdoor for Autopilot. IoT 2023: 265-269 - [c24]Han Li, Zhiwei Zhang, Hao Duan, Yi He, Ning Xi:
A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag Data. NaNA 2023: 46-51 - [c23]Yujuan Cao, Zhao Liu, Wuhe Axi, Dawei Wei, Ning Xi:
Physical-Sensing Inconsistency Vulnerability Mitigation for Multi-UAV Crowdsensing. NaNA 2023: 705-710 - 2022
- [c22]XinDi Ma, Cunzhu Su, Jianfeng Ma, Qi Jiang, Ning Xi, Sheng Gao, Kang Xie:
Self-Anomaly-Detection Model Training via Initialized Meta Model. NaNA 2022: 471-476 - [c21]Ning Xi, Yajie Li, Jin Liu:
Decentralized Access Control for Secure Microservices Cooperation with Blockchain. NSS 2022: 598-614 - 2021
- [c20]Dawei Wei, Ning Xi, Jianfeng Ma, Jiayi Li:
Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain. IWQoS 2021: 1-10 - [c19]Yuanqing Liu, Ning Xi, Yongbo Zhi:
NLEU: A Semantic-based Taint Analysis for Vetting Apps in Android. NaNA 2021: 327-333 - [c18]Yongbo Zhi, Ning Xi, Yuanqing Liu, Honglei Hui:
A Lightweight Android Malware Detection Framework Based on Knowledge Distillation. NSS 2021: 116-130 - 2020
- [c17]Pengbin Feng, Jianfeng Ma, Teng Li, Xindi Ma, Ning Xi, Di Lu:
Android Malware Detection Based on Call Graph via Graph Neural Network. NaNA 2020: 368-374 - [c16]Honglei Hui, Yongbo Zhi, Ning Xi, Yuanqing Liu:
A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models. NSS 2020: 63-78 - 2019
- [c15]Jing Lv, Ning Xi, Xue Rao:
A Fully Anonymous Authentication Scheme Based on Medical Environment. ICA3PP (1) 2019: 484-498 - [c14]Xue Rao, Ning Xi, Jing Lv, Pengbin Feng:
Compositional Information Flow Verification for Inter Application Communications in Android System. ML4CS 2019: 239-252 - [c13]Ning Xi, Cong Sun, Jianfeng Ma, Jing Lv:
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds. TrustCom/BigDataSE 2019: 200-207 - 2017
- [c12]Cong Sun, Ning Xi, Jianfeng Ma:
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition. COMPSAC (1) 2017: 586-595 - [c11]Teng Li, Jianfeng Ma, Cong Sun, Dawei Wei, Ning Xi:
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. NaNA 2017: 5-10 - [c10]Ning Xi, Cong Sun, Di Lu, Yulong Shen:
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds. NaNA 2017: 286-291 - 2016
- [c9]Ning Xi, Cong Sun, Jianfeng Ma, Yulong Shen, Di Lu:
Distributed Secure Service Composition with Declassification in Mobile Network. NaNA 2016: 254-259 - 2014
- [c8]Cong Sun, Ning Xi, Jinku Li, Qingsong Yao, Jianfeng Ma:
Verifying Secure Interface Composition for Component-Based System Designs. APSEC (1) 2014: 359-366 - [c7]Tao Zhang, Jianfeng Ma, Ning Xi, Ximeng Liu, Zhiquan Liu, Jinbo Xiong:
Trustworthy Service Composition in Service-Oriented Mobile Social Networks. ICWS 2014: 684-687 - 2013
- [c6]Tao Zhang, Jianfeng Ma, Cong Sun, Qi Li, Ning Xi:
Service Composition in Multi-domain Environment under Time Constraint. ICWS 2013: 227-234 - [c5]Ning Xi, Jianfeng Ma, Cong Sun, Tao Zhang:
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments. ICWS 2013: 563-570 - [c4]Di Lu, Jianfeng Ma, Yichuan Wang, Ning Xi:
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing. INCoS 2013: 1-8 - 2012
- [c3]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Yudi Niu:
The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction. INCoS 2012: 185-192 - 2011
- [c2]Yulong Shen, Ning Xi, Qingqi Pei, Jianfeng Ma, Qijian Xu, Zuoshun Wu:
Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks. CIS 2011: 545-549 - [c1]Yulong Shen, Qingqi Pei, Ning Xi, Jianfeng Ma, Qijian Xu, Hao Yin:
HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks. INCoS 2011: 320-327
Informal and Other Publications
- 2023
- [i2]Chengyan Ma, Ning Xi, Di Lu, Yebo Feng, Jianfeng Ma:
CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems. CoRR abs/2309.05978 (2023) - 2021
- [i1]Ning Xi, Chao Chen, Jun Zhang, Cong Sun, Shigang Liu, Pengbin Feng, Jianfeng Ma:
Information flow based defensive chain for data leakage detection and prevention: a survey. CoRR abs/2106.04951 (2021)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint