Ning Xi
Ning Xi
Verified email at xidian.edu.cn
Title
Cited by
Cited by
Year
Secure service composition with information flow control in service clouds
N Xi, C Sun, J Ma, Y Shen
Future Generation Computer Systems 49, 142-148, 2015
252015
APPLET: a privacy-preserving framework for location-aware recommender system
X Ma, H Li, J Ma, Q Jiang, S Gao, N Xi, D Lu
Science China Information Sciences 60 (9), 092101, 2017
222017
Service composition in multi-domain environment under time constraint
T Zhang, J Ma, C Sun, Q Li, N Xi
2013 IEEE 20th International Conference on Web Services, 227-234, 2013
142013
Trustworthy service composition with secure data transmission in sensor networks
T Zhang, L Zheng, Y Wang, Y Shen, N Xi, J Ma, J Yong
World Wide Web 21 (1), 185-200, 2018
122018
Trust-based service composition in multi-domain environments under time constraint
T Zhang, JF Ma, Q Li, N Xi, C Sun
Science China Information Sciences 57 (9), 1-16, 2014
122014
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
Y Shen, N Xi, Q Pei, J Ma
J. Inf. Sci. Eng. 30 (3), 875-893, 2014
122014
A universal fairness evaluation framework for resource allocation in cloud computing
D Lu, J Ma, N Xi
China Communications 12 (5), 113-122, 2015
102015
Decentralized information flow verification framework for the service chain composition in mobile computing environments
N Xi, J Ma, C Sun, T Zhang
2013 IEEE 20th International Conference on Web Services, 563-570, 2013
102013
Distributed information flow verification framework for the composition of service chain in wireless sensor network
N Xi, J Ma, C Sun, Y Shen, T Zhang
International Journal of Distributed Sensor Networks 9 (5), 693639, 2013
82013
Trustworthy service composition in service-oriented mobile social networks
T Zhang, J Ma, N Xi, X Liu, Z Liu, J Xiong
2014 ieee international conference on web services, 684-687, 2014
72014
Distributed storage schemes for controlling data availability in wireless sensor networks
S Yulong, X Ning, P Qingqi, M Jianfeng, X Qijian, W Zuoshun
2011 Seventh International Conference on Computational Intelligence and …, 2011
72011
Distributed information flow verification for secure service composition in smart sensor network
N Xi, C Sun, J Ma, X Chen, Y Shen
China Communications 13 (4), 119-130, 2016
52016
Distributed secure service composition with declassification in mobile network
N Xi, C Sun, J Ma, Y Shen, D Lu
2016 International Conference on Networking and Network Applications (NaNA …, 2016
42016
The wireless vertical handoff decision algorithm with parameter prediction
Y Shen, N Xi, Q Pei, J Ma, Y Niu
2012 Fourth International Conference on Intelligent Networking and …, 2012
42012
Hgrp: Hybrid grid routing protocol for heterogeneous hierarchical wireless networks
Y Shen, Q Pei, N Xi, J Ma, Q Xu, H Yin
2011 Third International Conference on Intelligent Networking and …, 2011
42011
Information flow control on encrypted data for service composition among multiple clouds
N Xi, J Ma, C Sun, D Lu, Y Shen
Distributed and Parallel Databases, 1-17, 2018
32018
Verifying secure interface composition for component-based system designs
C Sun, N Xi, J Li, Q Yao, J Ma
2014 21st Asia-Pacific Software Engineering Conference 1, 359-366, 2014
32014
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing
D Lu, J Ma, C Sun, X Ma, N Xi
Science China Information Sciences 60 (5), 52103, 2017
22017
Distributed secure service composition with declassification in mobile clouds
N Xi, D Lu, C Sun, J Ma, Y Shen
Mobile Information Systems 2017, 2017
22017
Two-layer storage scheme and repair method of failure data in wireless sensor networks
Y Shen, X Dang, M Shu, N Xi, J Ma
International Journal of Distributed Sensor Networks 8 (10), 868943, 2012
22012
The system can't perform the operation now. Try again later.
Articles 1–20