default search action
Xinxin Niu
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Xinxin Niu, Li You, An-An Lu, Xiqi Gao:
Coordinated Multicast and Unicast Robust Transmission in C-V2V Massive MIMO With Imperfect CSI. IEEE Trans. Veh. Technol. 73(11): 17106-17121 (2024) - [c31]Xinxin Niu, Li You, An-An Lu, Xiqi Gao:
Precoding Design for Coordinated Multicast and Unicast Transmission in C-V2V Massive MIMO With Imperfect CSI. VTC Spring 2024: 1-6 - 2022
- [j58]Xinxin Niu, Li You, Xiqi Gao:
Coordinated multicast and unicast transmission in V2V underlay massive MIMO. Sci. China Inf. Sci. 65(3) (2022) - [j57]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int. J. Intell. Syst. 37(2): 1204-1221 (2022) - 2021
- [j56]Yudao Sun, Chunhua Wu, Kangfeng Zheng, Xinxin Niu:
Adv-Emotion: The Facial Expression Adversarial Attack. Int. J. Pattern Recognit. Artif. Intell. 35(11): 2152016:1-2152016:23 (2021) - [j55]Yudao Sun, Juan Yin, Chunhua Wu, Kangfeng Zheng, Xinxin Niu:
Generating facial expression adversarial examples based on saliency map. Image Vis. Comput. 116: 104318 (2021) - [j54]Fei Zhao, Yang Xin, Kai Zhang, Xinxin Niu:
Representativeness-Based Instance Selection for Intrusion Detection. Secur. Commun. Networks 2021: 6638134:1-6638134:13 (2021) - [j53]Xu Wang, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Game Theoretic Suppression of Forged Messages in Online Social Networks. IEEE Trans. Syst. Man Cybern. Syst. 51(3): 1601-1611 (2021) - [i1]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. CoRR abs/2109.13774 (2021) - 2020
- [j52]Xinxin Niu, Li You, Xiqi Gao:
Phase Shift Adjustable Pilots for Channel Acquisition in Vehicle-to-Vehicle Underlay Wideband Massive MIMO. IEEE Access 8: 203793-203803 (2020) - [j51]Wei Tang, Yu-Jun Liu, Yu-Ling Chen, Yi-Xian Yang, Xinxin Niu:
SLBRS: Network Virus Propagation Model based on Safety Entropy. Appl. Soft Comput. 97(Part): 106784 (2020) - [j50]Zhao Dou, Gang Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang, Yu Yang:
Searching for optimal quantum secret sharing scheme based on local distinguishability. Quantum Inf. Process. 19(10): 368 (2020)
2010 – 2019
- 2019
- [j49]Zhe Wang, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Xiujuan Wang:
SMOTETomek-Based Resampling for Personality Recognition. IEEE Access 7: 129678-129689 (2019) - [j48]Zhen-Zhen Li, Gang Xu, Xiu-Bo Chen, Zhiguo Qu, Xinxin Niu, Yi-Xian Yang:
Efficient quantum state transmission via perfect quantum network coding. Sci. China Inf. Sci. 62(1): 12501:1-12501:14 (2019) - [j47]Xu Wang, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Survey on blockchain for Internet of Things. Comput. Commun. 136: 10-29 (2019) - [j46]Xu Wang, Guangsheng Yu, Xuan Zha, Wei Ni, Ren Ping Liu, Y. Jay Guo, Kangfeng Zheng, Xinxin Niu:
Capacity of blockchain based Internet-of-Things: Testbed and analysis. Internet Things 8 (2019) - [j45]Xu Wang, Bo Song, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks. Secur. Commun. Networks 2019: 1657164:1-1657164:9 (2019) - 2018
- [j44]Yulong Gao, Xiu-Bo Chen, Yu-Ling Chen, Ying Sun, Xinxin Niu, Yi-Xian Yang:
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain. IEEE Access 6: 27205-27213 (2018) - [j43]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. Comput. J. 61(4): 526-538 (2018) - [j42]Jing Li, Licheng Wang, Xinxin Niu, Lize Gu, Zhiguo Qu:
Star-Topological Encryption: Talking to the Sever but Hiding Identities to Others. Fundam. Informaticae 157(1-2): 29-46 (2018) - [j41]Xinxin Zhu, Lixiang Li, Jing Liu, Ziyi Li, Haipeng Peng, Xinxin Niu:
Image captioning with triple-attention and stack parallel LSTM. Neurocomputing 319: 55-65 (2018) - [j40]Huijun Zhu, Licheng Wang, Shuming Qiu, Xinxin Niu:
New Public Key Encryption with Equality Test Based on non-Abelian Factorization Problems. KSII Trans. Internet Inf. Syst. 12(2): 764-785 (2018) - [j39]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng:
A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 14-19 (2018) - [j38]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng, Jingfeng Ren, Haochun Qi:
General Theory of security and a study of hacker's behavior in big data era. Peer-to-Peer Netw. Appl. 11(2): 210-219 (2018) - [j37]Zhao Dou, Gang Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang:
Rational protocol of quantum secure multi-party computation. Quantum Inf. Process. 17(8): 199 (2018) - [j36]Jing Li, Xiong Li, Licheng Wang, Debiao He, Haseeb Ahmad, Xinxin Niu:
Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption. Soft Comput. 22(3): 707-714 (2018) - [j35]Xuan Zha, Wei Ni, Xu Wang, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
The Impact of Link Duration on the Integrity of Distributed Mobile Networks. IEEE Trans. Inf. Forensics Secur. 13(9): 2240-2255 (2018) - [c30]Xu Wang, Xuan Zha, Yu Gu, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Attack and Defence of Ethereum Remote APIs. GLOBECOM Workshops 2018: 1-6 - 2017
- [j34]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu:
Key-Policy Attribute-Based Encryption With Equality Test in Cloud Computing. IEEE Access 5: 20428-20439 (2017) - [j33]Jinxia Wei, Ru Zhang, Jianyi Liu, Jing Li, Xinxin Niu, Yuangang Yao:
Dynamic data integrity auditing for secure outsourcing in the cloud. Concurr. Comput. Pract. Exp. 29(12) (2017) - [j32]Li Yang, Wei Huang, Xinxin Niu:
Defending shilling attacks in recommender systems using soft co-clustering. IET Inf. Secur. 11(6): 319-325 (2017) - [j31]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Yixian Yang:
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets. Int. J. Distributed Sens. Networks 13(4) (2017) - [j30]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Xinxin Niu:
Pairing-free equality test over short ciphertexts. Int. J. Distributed Sens. Networks 13(6) (2017) - [j29]Jinxia Wei, Xinxin Niu, Ru Zhang, Jianyi Liu, Yuangang Yao:
Efficient data possession-checking protocol with deduplication in cloud. Int. J. Distributed Sens. Networks 13(8) (2017) - [j28]Yixian Yang, Haipeng Peng, Lixiang Li, Xinxin Niu:
General Theory of Security and a Study Case in Internet of Things. IEEE Internet Things J. 4(2): 592-600 (2017) - [j27]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Tianling Lu:
Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection. KSII Trans. Internet Inf. Syst. 11(9): 4658-4679 (2017) - [j26]Jiafa Mao, Weiguo Sheng, Yahong Hu, Gang Xiao, Zhiguo Qu, Xinxin Niu, Li-Nan Zhu:
Research on watermarking payload under the condition of keeping JPEG image transparency. Multim. Tools Appl. 76(6): 8423-8448 (2017) - [j25]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xu Wang, Xinxin Niu, Tianliang Lu:
Computing Adaptive Feature Weights with PSO to Improve Android Malware Detection. Secur. Commun. Networks 2017: 3284080:1-3284080:14 (2017) - [j24]Xuan Zha, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Xinxin Niu:
Collaborative Authentication in Decentralized Dense Mobile Networks With Key Predistribution. IEEE Trans. Inf. Forensics Secur. 12(10): 2261-2275 (2017) - [c29]Xuan Zha, Xu Wang, Wei Ni, Ren Ping Liu, Y. Jay Guo, Xinxin Niu, Kangfeng Zheng:
Analytic model on data security in VANETs. ISCIT 2017: 1-6 - 2016
- [j23]Lingwei Song, Jinxia Wei, Licheng Wang, Chenlei Cao, Xinxin Niu:
Identity-based storage management and integrity verify protocol for secure outsourcing in multi-cloud. Concurr. Comput. Pract. Exp. 28(6): 1930-1945 (2016) - [j22]Jinxia Wei, Jianyi Liu, Ru Zhang, Xinxin Niu:
Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems. Int. J. Distributed Sens. Networks 12(1): 1894713:1-1894713:11 (2016) - [j21]Weixin Liu, Kangfeng Zheng, Bin Wu, Chunhua Wu, Xinxin Niu:
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining. KSII Trans. Internet Inf. Syst. 10(6): 2781-2800 (2016) - [j20]Jiafa Mao, Xinxin Niu, Gang Xiao, Weiguo Sheng, Na-Na Zhang:
A steganalysis method in the DCT domain. Multim. Tools Appl. 75(10): 5999-6019 (2016) - [j19]Xu Wang, Wei Ni, Kangfeng Zheng, Ren Ping Liu, Xinxin Niu:
Virus Propagation Modeling and Convergence Analysis in Large-Scale Networks. IEEE Trans. Inf. Forensics Secur. 11(10): 2241-2254 (2016) - [c28]Jing Li, Xiong Li, Licheng Wang, Debiao He, Xinxin Niu:
Oblivious Transfer Protocols Based on Group Factoring Problem. BWCCA 2016: 885-892 - [c27]Jing Li, Licheng Wang, Zonghua Zhang, Xinxin Niu:
Novel Constructions of Cramer-Shoup Like Cryptosystems Based on Index Exchangeable Family. AsiaCCS 2016: 895-900 - [c26]Xu Wang, Kangfeng Zheng, Xinxin Niu, Bin Wu, Chunhua Wu:
Detection of command and control in advanced persistent threat based on independent access. ICC 2016: 1-6 - [c25]Jing Li, Licheng Wang, Xinxin Niu:
A Star-Topological Privacy Encryption for Telecare Medical Information Systems. INCoS 2016: 311-317 - 2015
- [j18]Jinxia Wei, Ru Zhang, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. KSII Trans. Internet Inf. Syst. 9(12): 5116-5134 (2015) - [c24]Xuan Zha, Wei Ni, Ren Ping Liu, Kangfeng Zheng, Xinxin Niu:
Secure Data Transmission and Modelling in Vehicular Ad Hoc Networks. GLOBECOM Workshops 2015: 1-6 - 2014
- [j17]Jing Li, Licheng Wang, Jianhua Yan, Xinxin Niu, Yixian Yang:
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure. KSII Trans. Internet Inf. Syst. 8(12): 4552-4567 (2014) - [j16]Xiubo Chen, Yuan Su, Xinxin Niu, Yixian Yang:
Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. 13(1): 101-112 (2014) - 2013
- [j15]Feng Xiao, Yajian Zhou, Jingxian Zhou, Hongliang Zhu, Xinxin Niu:
Security Protocol for RFID System Conforming to EPC-C1G2 Standard. J. Comput. 8(3): 605-612 (2013) - [j14]Xinxin Niu, Peng Cao:
Guest Editorial. J. Comput. 8(11): 2731-2734 (2013) - [j13]Qinlong Huang, Zhaofeng Ma, Jingyi Fu, Xinxin Niu, Yixian Yang:
Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing. J. Comput. 8(11): 2776-2781 (2013) - [j12]Jing Liu, Guosheng Xu, Da Xiao, Lize Gu, Xinxin Niu:
A Semi-supervised Ensemble Approach for Mining Data Streams. J. Comput. 8(11): 2873-2879 (2013) - [j11]Zhaofeng Ma, Jianqing Huang, Yixian Yang, Xinxin Niu:
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management. J. Softw. 8(6): 1526-1535 (2013) - [j10]Xiu-Bo Chen, Xinxin Niu, Xinjie Zhou, Yixian Yang:
Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12(1): 365-380 (2013) - [j9]Ying Sun, Shengwei Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang:
Expansible quantum secret sharing network. Quantum Inf. Process. 12(8): 2877-2888 (2013) - [c23]Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu:
Non-uniform Quantization in Breaking HUGO. IWDW 2013: 48-62 - 2012
- [j8]Weiwei Zhang, Ru Zhang, Xianyi Liu, Chunhua Wu, Xinxin Niu:
A Video Watermarking Algorithm of H.264/AVC for Content Authentication. J. Networks 7(8): 1150-1154 (2012) - [j7]Mingxing Luo, Xiu-Bo Chen, Yi-Xian Yang, Xinxin Niu:
Experimental architecture of joint remote state preparation. Quantum Inf. Process. 11(3): 751-767 (2012) - [c22]Jing Liu, Lize Gu, Guosheng Xu, Xinxin Niu:
A correlation analysis method of network security events based on rough set theory. IC-NIDC 2012: 517-520 - [c21]Licong Chen, Yun Q. Shi, Patchara Sutthiwan, Xinxin Niu:
A Novel Mapping Scheme for Steganalysis. IWDW 2012: 19-33 - 2011
- [j6]Jiafa Mao, Ru Zhang, Xinxin Niu, Yixian Yang, Linna Zhou:
Research of Spatial Domain Image Digital Watermarking Payload. EURASIP J. Inf. Secur. 2011 (2011) - [c20]Bin Zhang, Yang Xin, Xinxin Niu, Kaiguo Yuan, Bin Zhang:
An Anti-JPEG Compression Image Perceptual Hashing Algorithm. ICAIC (2) 2011: 397-406 - [c19]Hong Di, Kangfeng Zheng, Xinxin Niu, Xin Zhang:
Multiple-image compressed encryption and decryption by compressive holography. VCIP 2011: 1-4 - 2010
- [j5]Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu:
Conjugate adjoining problem in braid groups and new design of braid-based signatures. Sci. China Inf. Sci. 53(3): 524-536 (2010) - [j4]Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu:
Secure network coding in the presence of eavesdroppers. Sci. China Inf. Sci. 53(3): 648-658 (2010) - [c18]Bin Zhang, Yang Xin, Xinxin Niu, Kaiguo Yuan, Hui-Bai Jiang:
A near reversible image watermarking algorithm. ICMLC 2010: 2824-2828 - [c17]Chuan-Lun Ren, Xiao-Hui Zuo, Zhong-Xian Li, Xinxin Niu, Yixian Yang:
Towards Hierarchical-User RBAC model. ICMLC 2010: 2870-2874 - [c16]Chengqing Guo, Guoai Xu, Xinxin Niu, Yixian Yang, Yang Li:
A color image watermarking algorithm resistant to print-scan. WCNIS 2010: 518-521
2000 – 2009
- 2009
- [j3]Jianhong Zhang, Yixian Yang, Xinxin Niu:
A Novel Identity-Based Multi-Signcryption Scheme. Int. J. Distributed Sens. Networks 5(1): 28 (2009) - [c15]Ming Chen, Fan-fan Liu, Ru Zhang, Xinxin Niu, Yixian Yang:
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis. CSIE (6) 2009: 490-494 - [c14]Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang:
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. IIH-MSP 2009: 348-352 - [c13]Jianhong Zhang, Yixian Yang, Xinxin Niu:
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. ISNN (3) 2009: 318-327 - [c12]Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng:
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. ISA 2009: 588-597 - 2008
- [c11]Tianyu Ye, Yu Fu, Zhiguo Qu, Xinxin Niu, Yixian Yang:
Multiplicative Watermark Detection Using Locally Optimum Nonlinearity. IIH-MSP 2008: 481-484 - [c10]Yu Fu, Tianyu Ye, Zhiguo Qu, Xinxin Niu, Yixian Yang:
A Novel Relational Database Watermarking Algorithm for Joint Ownership. IIH-MSP 2008: 985-988 - [c9]Jiao Wang, Yajian Zhou, Yixian Yang, Xinxin Niu:
Classify the Majority of the Total Bytes on the Internet. ISIP 2008: 68-72 - 2007
- [c8]Xiaofeng Qiu, Ning Zhi, Xinxin Niu:
A Quantitative Security Model of IMS System. CIS 2007: 829-832 - [c7]Zhaofeng Ma, Yixian Yang, Xinxin Niu:
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. CIS 2007: 863-867 - [c6]Lanlan Hu, Yixian Yang, Xinxin Niu:
Improved Remote User Authentication Scheme Preserving User Anonymity. CNSR 2007: 323-328 - [c5]Ming-hui Liu, Xin Yang, Yixian Yang, Xinxin Niu:
Security Mechanism Research of EMV2000. Web Intelligence/IAT Workshops 2007: 307-310 - [c4]Guosheng Xu, Yixian Yang, Lize Gu, Xinxin Niu:
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. Web Intelligence/IAT Workshops 2007: 315-318 - [c3]Lanlan Hu, Xinxin Niu, Yixian Yang:
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards. MUE 2007: 903-907 - 2006
- [c2]Nan Jiang, Jian Wang, Xinxin Niu, Yixian Yang:
Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. ICICIC (3) 2006: 661-664 - [c1]Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features. IIH-MSP 2006: 384-387 - 2003
- [j2]Wang Tao, Yixian Yang, Xinxin Niu:
New Efficient Timed Commitment Schemes. Int. J. Inf. Technol. Decis. Mak. 2(2): 287-297 (2003)
1990 – 1999
- 1997
- [j1]Yixian Yang, Xinxin Niu, Chengqian Xu:
Counterexample of truncated Costas optical orthogonal codes. IEEE Trans. Commun. 45(6): 640-643 (1997)
Coauthor Index
aka: Yi-Xian Yang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint