default search action
Dongqing Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Fei Li, Dongqing Xie, Wei Gao, Kefei Chen, Guilin Wang, Roberto Metere:
A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+. J. Ambient Intell. Humaniz. Comput. 15(2): 1317-1326 (2024) - 2022
- [j32]Jun Liu, Yuwei Zhang, Jing Wang, Tao Cui, Lin Zhang, Chao Li, Kai Chen, Huang Huang, Xuan Zhou, Wei Zhou, Zhao Wang, Sun Li, Suili Feng, Dongqing Xie, Dahua Fan, Jianghong Ou, Jiangtao Ou, Yun Li, Haige Xiang, Kaimeno Dube, Abbarbas Muazu, Nakilavai Rono, Yajuan Tang:
Intelligent Bi-directional Relaying Communication for Edge Intelligence based Industrial IoT Networks. EAI Endorsed Trans. Ind. Networks Intell. Syst. 9(32): 4 (2022)
2010 – 2019
- 2018
- [j31]Dongqing Xie, Xiazhi Lai, Xianfu Lei, Lisheng Fan:
Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links. IEEE Access 6: 5596-5606 (2018) - [j30]Fang Shi, Weiqiang Tan, Junjuan Xia, Dongqing Xie, Lisheng Fan, Xin Liu:
Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks. IEEE Access 6: 8098-8108 (2018) - [j29]Weiqiang Tan, Dongqing Xie, Junjuan Xia, Weijie Tan, Lisheng Fan, Shi Jin:
Spectral and Energy Efficiency of Massive MIMO for Hybrid Architectures Based on Phase Shifters. IEEE Access 6: 11751-11759 (2018) - [j28]Yuan-Gen Wang, Dongqing Xie, Brij B. Gupta:
A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding. IEEE Access 6: 15816-15822 (2018) - [j27]Weiqiang Tan, Xiao Li, Dongqing Xie, Weijie Tan, Lisheng Fan, Shi Jin:
On the performance of three-dimensionalantenna arrays in millimetre wave propagation environments. IET Commun. 12(14): 1743-1750 (2018) - [j26]Weizu Wu, Dongqing Xie, Liqun Liu:
Heterogeneous Differential Evolution with Memory Enhanced Brownian and Quantum Individuals for Dynamic Optimization Problems. Int. J. Pattern Recognit. Artif. Intell. 32(2): 1859003:1-1859003:18 (2018) - [j25]Haihuang Huang, Liwei Jiang, Xue Yu, Dongqing Xie:
Hypercube-Based Crowding Differential Evolution with Neighborhood Mutation for Multimodal Optimization. Int. J. Swarm Intell. Res. 9(2): 15-27 (2018) - [j24]Run Xie, Chanlian He, Dongqing Xie, Chongzhi Gao, Xiaojun Zhang:
A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage. Secur. Commun. Networks 2018: 7254305:1-7254305:7 (2018) - [c39]Shu Li, Jie Zhang, Dongqing Xie, Shui Yu, Wanchun Dou:
High Quality Participant Recruitment of Mobile Crowdsourcing over Big Data. GLOBECOM 2018: 1-6 - 2017
- [j23]Shaohong Zhang, Zongbao Yang, Xiaofei Xing, Ying Gao, Dongqing Xie, Hau-San Wong:
Generalized Pair-Counting Similarity Measures for Clustering and Cluster Ensembles. IEEE Access 5: 16904-16918 (2017) - [j22]Xiazhi Lai, Wanxin Zou, Dongqing Xie, Xutao Li, Lisheng Fan:
DF Relaying Networks With Randomly Distributed Interferers. IEEE Access 5: 18909-18917 (2017) - [j21]Dan Deng, Lisheng Fan, Xianfu Lei, Weiqiang Tan, Dongqing Xie:
Joint User and Relay Selection for Cooperative NOMA Networks. IEEE Access 5: 20220-20227 (2017) - [j20]Shuhong Chen, Guojun Wang, Guofeng Yan, Dongqing Xie:
Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures. Concurr. Comput. Pract. Exp. 29(7) (2017) - [j19]Ji Wu, Dongqing Xie, Lin Tang:
A high-level exploration tool for three-dimensional network-on-chip. Int. J. Comput. Sci. Eng. 14(2): 164-178 (2017) - [j18]Sancheng Peng, Aimin Yang, Lihong Cao, Shui Yu, Dongqing Xie:
Social influence modeling using information theory in mobile social networks. Inf. Sci. 379: 146-159 (2017) - [j17]Weizu Wu, Liqun Liu, Dongqing Xie:
基于神经网络的异构网络向量化表示方法 (Vectorized Representation of Heterogeneous Network Based on Neural Networks). 计算机科学 44(5): 272-275 (2017) - [j16]Sancheng Peng, Guojun Wang, Dongqing Xie:
Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges. IEEE Netw. 31(1): 11-17 (2017) - [c38]Fei Li, Wei Gao, Dongqing Xie, Chunming Tang:
Certificateless Cryptography with KGC Trust Level 3 Revisited. ICCCS (2) 2017: 292-304 - [c37]Yinglong Dai, Guojun Wang, Sihong Chen, Dongqing Xie, Shuhong Chen:
Using Deep Neural Networks to Simulate Human Body. ISPA/IUCC 2017: 959-966 - [c36]Feng Wang, Wenjun Jiang, Guojun Wang, Dongqing Xie:
Data-Driven Influence Learning in Social Networks. ISPA/IUCC 2017: 1179-1185 - [c35]Haroon Elahi, Guojun Wang, Dongqing Xie:
Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - [c34]Feng Wang, Wenjun Jiang, Shuhong Chen, Dongqing Xie, Guojun Wang:
Exploring user topic influence for group recommendation on learning resources. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c33]Xiazhi Lai, Wanxin Zou, Dongqing Xie, Lisheng Fan:
DF relaying networks in randomly distributed interference environments. WCSP 2017: 1-6 - [c32]Fang Shi, Dongqing Xie, Weiqiang Tan, Xianfu Lei, Lisheng Fan:
Hybrid cache placement for improving physical layer security in cooperative networks. WCSP 2017: 1-6 - 2016
- [j15]Fei Li, Dongqing Xie, Wei Gao, Jianhua Yan, Xu An Wang:
Round-optimal ID-based dynamic authenticated group key agreement. Int. J. High Perform. Syst. Archit. 6(3): 153-161 (2016) - [j14]Jingwei Li, Jin Li, Dongqing Xie, Zhang Cai:
Secure Auditing and Deduplicating Data in Cloud. IEEE Trans. Computers 65(8): 2386-2396 (2016) - [c31]Feng Wang, Guojun Wang, Dongqing Xie:
Maximizing the Spread of Positive Influence Under LT-MLA Model. APSCC 2016: 450-463 - [c30]Shaohong Zhang, Hai Huang, Jiqiao Li, Baoying Zeng, Wenxiao Qiu, Dongqing Xie:
Putative protein interaction analysis for human embryonic stem cell derived cardiomyocytes. CISP-BMEI 2016: 1837-1842 - [c29]Fei Li, Dongqing Xie, Wei Gao, Xu An Wang, Jianhua Yan:
An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings. CISIS 2016: 468-472 - [c28]Xiaoyu Zhu, Guojun Wang, Dongqing Xie:
Fuzzy and Semantic Search over Encrypted Data in the Cloud. SpaCCS Workshops 2016: 332-341 - 2015
- [j13]Xiaofei Xing, Dongqing Xie, Guojun Wang:
Energy-Balanced Data Gathering and Aggregating in WSNs: A Compressed Sensing Scheme. Int. J. Distributed Sens. Networks 11: 585191:1-585191:10 (2015) - [j12]Hai Huang, Shaohong Zhang, Wen-Jun Shen, Hau-San Wong, Dongqing Xie:
Gene set enrichment ensemble using fold change data only. J. Biomed. Informatics 57: 189-203 (2015) - [j11]Pei He, Achun Hu, Dongqing Xie, Zhiping Fan:
Component-Based Verification Model of Sequential Programs. J. Softw. 10(11): 1319-1326 (2015) - [c27]Shaohong Zhang, Jing Wang, Xiaoqiang Wu, Baoying Zeng, Wenxiao Qiu, Dongqing Xie:
Semi-supervised clustering with associative-link constraints for 3D models. FSKD 2015: 1665-1669 - [c26]Shaohong Zhang, Liu Yang, Dongqing Xie:
Unsupervised evaluation of cluster ensemble solutions. ICACI 2015: 101-106 - [c25]Shaohong Zhang, Liu Yang, Dongqing Xie:
Adaptive metric selection for clustering based on consensus affinity. ICACI 2015: 183-188 - [c24]Xiaofei Xing, Dongqing Xie, Zeyu Sun:
An approximate optimal coverage set algorithm in wireless sensor networks. ICACI 2015: 300-305 - [c23]Hai Huang, Dongqing Xie:
Real-time Network Risk Evaluation Paradigm-inspired by Immune. ICNC 2015: 786-790 - 2014
- [c22]Shaohong Zhang, Hau-San Wong, Wen-Jun Shen, Dongqing Xie:
AORS: Affinity-based outlier ranking score. IJCNN 2014: 1020-1027 - [c21]Shaohong Zhang, Hau-San Wong, Dongqing Xie:
Semi-supervised clustering with pairwise and size constraints. IJCNN 2014: 2450-2457 - 2013
- [j10]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures and Its Application to E-Prosecution. J. Comput. 8(4): 833-841 (2013) - [j9]Miao Liu, Gengtong Hou, Ying Gao, Chunming Tang, Dongqing Xie:
An Internet behavior management system based on Android. J. Softw. 8(8): 1932-1942 (2013) - [c20]Ji Wu, Dongqing Xie, Lin Tang, Hao Wang:
Cost Evaluation of Three-Dimensional Many-Core Processors. EIDWT 2013: 130-132 - [c19]Ji Wu, Dongqing Xie, Lin Tang, Hao Wang:
Cost Evaluation of Three-Dimensional Network-on-Chip. EIDWT 2013: 133-136 - [c18]Jin Li, Dongqing Xie, Xiaofeng Chen:
Server-Aided Hierarchical Identity-Based Encryption. EIDWT 2013: 643-647 - [c17]Xiuni Wang, Dongqing Xie:
The Systematic Form of a Class of Regular Structured LDPC Codes. EIDWT 2013: 648-651 - [c16]Xiaofei Xing, Dongqing Xie, Guojun Wang:
Data Gathering and Processing for Large-Scale Wireless Sensor Networks. MSN 2013: 354-358 - 2012
- [j8]Lingxi Peng, Dongqing Xie, Ying Gao, Wenbin Chen, Fufang Li, Wu Wen, Jue Wu:
An Immune-inspired Adaptive Automated Intrusion Response System Model. Int. J. Comput. Intell. Syst. 5(5): 808-815 (2012) - [j7]Shaohong Zhang, Hau-San Wong, Ying Shen, Dongqing Xie:
A New Unsupervised Feature Ranking Method for Gene Expression Data Based on Consensus Affinity. IEEE ACM Trans. Comput. Biol. Bioinform. 9(4): 1257-1263 (2012) - [j6]Changan Zhao, Fangguo Zhang, Dongqing Xie:
Faster Computation of Self-Pairings. IEEE Trans. Inf. Theory 58(5): 3266-3272 (2012) - [c15]Chong-zhi Gao, Dongqing Xie, Jin Li, Baodian Wei, Haibo Tian:
Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack. INCoS 2012: 377-384 - [c14]Chong-zhi Gao, Dongqing Xie, Baodian Wei:
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack. ISPEC 2012: 46-62 - 2011
- [j5]LinYuan Liu, Haibin Zhu, Zhiqiu Huang, Dongqing Xie:
Minimal privacy authorization in web services collaboration. Comput. Stand. Interfaces 33(3): 332-343 (2011) - [j4]Changan Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Binglong Chen:
Computing bilinear pairings on elliptic curves with automorphisms. Des. Codes Cryptogr. 58(1): 35-44 (2011) - [c13]Jin Li, Qiong Huang, Xiaofeng Chen, Sherman S. M. Chow, Duncan S. Wong, Dongqing Xie:
Multi-authority ciphertext-policy attribute-based encryption with accountability. AsiaCCS 2011: 386-390 - [c12]Wei Xiong, Dongqing Xie, Lingxi Peng, Jie Liu:
PrChord: A probability routing structured P2P protocol. EMEIT 2011: 3142-3145 - 2010
- [c11]Jin Li, Man Ho Au, Willy Susilo, Dongqing Xie, Kui Ren:
Attribute-based signature and its applications. AsiaCCS 2010: 60-69 - [c10]Jin Li, Gansen Zhao, Xiaofeng Chen, Dongqing Xie, Chunming Rong, Wenjun Li, Lianzhang Tang, Yong Tang:
Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing. CloudCom 2010: 89-96 - [c9]Qi Ke, Dongqing Xie, Dafang Zhang:
A robust watermarking scheme for 3D point cloud models using self-similarity partition. WCNIS 2010: 287-291 - [i4]Changan Zhao, Fangguo Zhang, Dongqing Xie:
Faster Computation of Self-pairings. IACR Cryptol. ePrint Arch. 2010: 399 (2010)
2000 – 2009
- 2009
- [j3]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
How to construct efficient on-line/off-line threshold signature schemes through the simulation approach. Concurr. Comput. Pract. Exp. 21(10): 1351-1372 (2009) - [j2]Zaihong Zhou, Dongqing Xie, Wei Xiong:
A Novel Distributed Detection Scheme against DDoS Attack. J. Networks 4(9): 921-928 (2009) - [c8]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
Divisible On-Line/Off-Line Signatures. CT-RSA 2009: 148-163 - [c7]Changan Zhao, Dongqing Xie, Fangguo Zhang, Chong-zhi Gao, Jingwei Zhang:
Improved Implementations of Cryptosystems Based on Tate Pairing. ISA 2009: 145-151 - 2008
- [c6]Wei Xiong, Dongqing Xie, Zaihong Zhou, Jie Liu:
Decreasing System Load by Caching in Structured P2P Systems. HPCC 2008: 234-241 - [c5]Diwen Wu, Dongqing Xie, Lupeng Wang:
A Deployment Algorithm to Achieve both Connectivity and Coverage in Grid Sensor Networks. ICYCS 2008: 522-526 - [i3]Changan Zhao, Dongqing Xie, Fangguo Zhang, Jingwei Zhang, Binglong Chen:
Computing Bilinear Pairings on Elliptic Curves with Automorphisms. IACR Cryptol. ePrint Arch. 2008: 209 (2008) - [i2]Changan Zhao, Fangguo Zhang, Dongqing Xie:
Reducing the Complexity of the Weil Pairing Computation. IACR Cryptol. ePrint Arch. 2008: 212 (2008) - [i1]Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang:
Divisible On-line/Off-line Signatures. IACR Cryptol. ePrint Arch. 2008: 447 (2008) - 2007
- [j1]Wei Gao, Xueli Wang, Dongqing Xie:
Chameleon Hashes Without Key Exposure Based on Factoring. J. Comput. Sci. Technol. 22(1): 109-113 (2007) - [c4]Diwen Wu, Dongqing Xie:
The Analysis of Fault Tolerance in Triangular Topology Sensor Networks. ADHOC-NOW 2007: 248-261 - 2006
- [c3]Dongqing Xie, Han Zhou:
A Probabilistic Certificate Updating Protocol for MANET. AINA (2) 2006: 147-154 - [c2]Wei Gao, Guilin Wang, Xueli Wang, Dongqing Xie:
Controllable Ring Signatures. WISA 2006: 1-14 - 2005
- [c1]Kibaya Erisania, Dongqing Xie:
Designing a Secure Trust Intermediary Service (STIS) for Web Services: a WS-Trust Approach. Security and Management 2005: 201-207
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 01:44 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint