BibTeX records: Dongqing Xie

download as .bib file

@article{DBLP:journals/jaihc/LiXGCWM24,
  author       = {Fei Li and
                  Dongqing Xie and
                  Wei Gao and
                  Kefei Chen and
                  Guilin Wang and
                  Roberto Metere},
  title        = {A certificateless signature scheme and a certificateless public auditing
                  scheme with authority trust level 3+},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {1317--1326},
  year         = {2024},
  url          = {https://doi.org/10.1007/s12652-017-0553-x},
  doi          = {10.1007/S12652-017-0553-X},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/LiXGCWM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/inis/LiuZWCZLCHZZWLF22,
  author       = {Jun Liu and
                  Yuwei Zhang and
                  Jing Wang and
                  Tao Cui and
                  Lin Zhang and
                  Chao Li and
                  Kai Chen and
                  Huang Huang and
                  Xuan Zhou and
                  Wei Zhou and
                  Zhao Wang and
                  Sun Li and
                  Suili Feng and
                  Dongqing Xie and
                  Dahua Fan and
                  Jianghong Ou and
                  Jiangtao Ou and
                  Yun Li and
                  Haige Xiang and
                  Kaimeno Dube and
                  Abbarbas Muazu and
                  Nakilavai Rono and
                  Yajuan Tang},
  title        = {Intelligent Bi-directional Relaying Communication for Edge Intelligence
                  based Industrial IoT Networks},
  journal      = {{EAI} Endorsed Trans. Ind. Networks Intell. Syst.},
  volume       = {9},
  number       = {32},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.4108/eetinis.v9i32.1909},
  doi          = {10.4108/EETINIS.V9I32.1909},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/inis/LiuZWCZLCHZZWLF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/XieLLF18,
  author       = {Dongqing Xie and
                  Xiazhi Lai and
                  Xianfu Lei and
                  Lisheng Fan},
  title        = {Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying
                  System With Direct Links},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {5596--5606},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2017.2776953},
  doi          = {10.1109/ACCESS.2017.2776953},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/XieLLF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ShiTXXFL18,
  author       = {Fang Shi and
                  Weiqiang Tan and
                  Junjuan Xia and
                  Dongqing Xie and
                  Lisheng Fan and
                  Xin Liu},
  title        = {Hybrid Cache Placement for Physical-Layer Security in Cooperative
                  Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {8098--8108},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2791992},
  doi          = {10.1109/ACCESS.2018.2791992},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ShiTXXFL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TanXXTFJ18,
  author       = {Weiqiang Tan and
                  Dongqing Xie and
                  Junjuan Xia and
                  Weijie Tan and
                  Lisheng Fan and
                  Shi Jin},
  title        = {Spectral and Energy Efficiency of Massive {MIMO} for Hybrid Architectures
                  Based on Phase Shifters},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {11751--11759},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2796571},
  doi          = {10.1109/ACCESS.2018.2796571},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TanXXTFJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangXG18,
  author       = {Yuan{-}Gen Wang and
                  Dongqing Xie and
                  Brij B. Gupta},
  title        = {A Study on the Collusion Security of LUT-Based Client-Side Watermark
                  Embedding},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {15816--15822},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2802928},
  doi          = {10.1109/ACCESS.2018.2802928},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangXG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-com/TanLXTFJ18,
  author       = {Weiqiang Tan and
                  Xiao Li and
                  Dongqing Xie and
                  Weijie Tan and
                  Lisheng Fan and
                  Shi Jin},
  title        = {On the performance of three-dimensionalantenna arrays in millimetre
                  wave propagation environments},
  journal      = {{IET} Commun.},
  volume       = {12},
  number       = {14},
  pages        = {1743--1750},
  year         = {2018},
  url          = {https://doi.org/10.1049/iet-com.2017.1071},
  doi          = {10.1049/IET-COM.2017.1071},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-com/TanLXTFJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijprai/WuXL18,
  author       = {Weizu Wu and
                  Dongqing Xie and
                  Liqun Liu},
  title        = {Heterogeneous Differential Evolution with Memory Enhanced Brownian
                  and Quantum Individuals for Dynamic Optimization Problems},
  journal      = {Int. J. Pattern Recognit. Artif. Intell.},
  volume       = {32},
  number       = {2},
  pages        = {1859003:1--1859003:18},
  year         = {2018},
  url          = {https://doi.org/10.1142/S0218001418590036},
  doi          = {10.1142/S0218001418590036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijprai/WuXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsir/HuangJYX18,
  author       = {Haihuang Huang and
                  Liwei Jiang and
                  Xue Yu and
                  Dongqing Xie},
  title        = {Hypercube-Based Crowding Differential Evolution with Neighborhood
                  Mutation for Multimodal Optimization},
  journal      = {Int. J. Swarm Intell. Res.},
  volume       = {9},
  number       = {2},
  pages        = {15--27},
  year         = {2018},
  url          = {https://doi.org/10.4018/IJSIR.2018040102},
  doi          = {10.4018/IJSIR.2018040102},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsir/HuangJYX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XieHXGZ18,
  author       = {Run Xie and
                  Chanlian He and
                  Dongqing Xie and
                  Chongzhi Gao and
                  Xiaojun Zhang},
  title        = {A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile
                  Devices in Cloud Storage},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {7254305:1--7254305:7},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/7254305},
  doi          = {10.1155/2018/7254305},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XieHXGZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LiZXYD18,
  author       = {Shu Li and
                  Jie Zhang and
                  Dongqing Xie and
                  Shui Yu and
                  Wanchun Dou},
  title        = {High Quality Participant Recruitment of Mobile Crowdsourcing over
                  Big Data},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi,
                  United Arab Emirates, December 9-13, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/GLOCOM.2018.8647720},
  doi          = {10.1109/GLOCOM.2018.8647720},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/LiZXYD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangYXGXW17,
  author       = {Shaohong Zhang and
                  Zongbao Yang and
                  Xiaofei Xing and
                  Ying Gao and
                  Dongqing Xie and
                  Hau{-}San Wong},
  title        = {Generalized Pair-Counting Similarity Measures for Clustering and Cluster
                  Ensembles},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {16904--16918},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2741221},
  doi          = {10.1109/ACCESS.2017.2741221},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/ZhangYXGXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LaiZXLF17,
  author       = {Xiazhi Lai and
                  Wanxin Zou and
                  Dongqing Xie and
                  Xutao Li and
                  Lisheng Fan},
  title        = {{DF} Relaying Networks With Randomly Distributed Interferers},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {18909--18917},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2751105},
  doi          = {10.1109/ACCESS.2017.2751105},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LaiZXLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DengFLTX17,
  author       = {Dan Deng and
                  Lisheng Fan and
                  Xianfu Lei and
                  Weiqiang Tan and
                  Dongqing Xie},
  title        = {Joint User and Relay Selection for Cooperative {NOMA} Networks},
  journal      = {{IEEE} Access},
  volume       = {5},
  pages        = {20220--20227},
  year         = {2017},
  url          = {https://doi.org/10.1109/ACCESS.2017.2751503},
  doi          = {10.1109/ACCESS.2017.2751503},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DengFLTX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/ChenWYX17,
  author       = {Shuhong Chen and
                  Guojun Wang and
                  Guofeng Yan and
                  Dongqing Xie},
  title        = {Multi-dimensional fuzzy trust evaluation for mobile social networks
                  based on dynamic community structures},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {7},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3901},
  doi          = {10.1002/CPE.3901},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/ChenWYX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/WuXT17,
  author       = {Ji Wu and
                  Dongqing Xie and
                  Lin Tang},
  title        = {A high-level exploration tool for three-dimensional network-on-chip},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {14},
  number       = {2},
  pages        = {164--178},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJCSE.2017.10003830},
  doi          = {10.1504/IJCSE.2017.10003830},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/WuXT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/PengYCYX17,
  author       = {Sancheng Peng and
                  Aimin Yang and
                  Lihong Cao and
                  Shui Yu and
                  Dongqing Xie},
  title        = {Social influence modeling using information theory in mobile social
                  networks},
  journal      = {Inf. Sci.},
  volume       = {379},
  pages        = {146--159},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.08.023},
  doi          = {10.1016/J.INS.2016.08.023},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/PengYCYX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/WuLX18,
  author       = {Weizu Wu and
                  Liqun Liu and
                  Dongqing Xie},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{31070}}{\unicode{32463}}{\unicode{32593}}{\unicode{32476}}{\unicode{30340}}{\unicode{24322}}{\unicode{26500}}{\unicode{32593}}{\unicode{32476}}{\unicode{21521}}{\unicode{37327}}{\unicode{21270}}{\unicode{34920}}{\unicode{31034}}{\unicode{26041}}{\unicode{27861}}
                  (Vectorized Representation of Heterogeneous Network Based on Neural
                  Networks)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {44},
  number       = {5},
  pages        = {272--275},
  year         = {2017},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2017.05.049},
  doi          = {10.11896/J.ISSN.1002-137X.2017.05.049},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/WuLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/PengWX17,
  author       = {Sancheng Peng and
                  Guojun Wang and
                  Dongqing Xie},
  title        = {Social Influence Analysis in Social Networking Big Data: Opportunities
                  and Challenges},
  journal      = {{IEEE} Netw.},
  volume       = {31},
  number       = {1},
  pages        = {11--17},
  year         = {2017},
  url          = {https://doi.org/10.1109/MNET.2016.1500104NM},
  doi          = {10.1109/MNET.2016.1500104NM},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/PengWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiGXT17,
  author       = {Fei Li and
                  Wei Gao and
                  Dongqing Xie and
                  Chunming Tang},
  editor       = {Xingming Sun and
                  Han{-}Chieh Chao and
                  Xingang You and
                  Elisa Bertino},
  title        = {Certificateless Cryptography with {KGC} Trust Level 3 Revisited},
  booktitle    = {Cloud Computing and Security - Third International Conference, {ICCCS}
                  2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10603},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68542-7\_24},
  doi          = {10.1007/978-3-319-68542-7\_24},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiGXT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/DaiWCXC17,
  author       = {Yinglong Dai and
                  Guojun Wang and
                  Sihong Chen and
                  Dongqing Xie and
                  Shuhong Chen},
  title        = {Using Deep Neural Networks to Simulate Human Body},
  booktitle    = {2017 {IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications and 2017 {IEEE} International Conference on Ubiquitous
                  Computing and Communications (ISPA/IUCC), Guangzhou, China, December
                  12-15, 2017},
  pages        = {959--966},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISPA/IUCC.2017.00147},
  doi          = {10.1109/ISPA/IUCC.2017.00147},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/DaiWCXC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/WangJWX17,
  author       = {Feng Wang and
                  Wenjun Jiang and
                  Guojun Wang and
                  Dongqing Xie},
  title        = {Data-Driven Influence Learning in Social Networks},
  booktitle    = {2017 {IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications and 2017 {IEEE} International Conference on Ubiquitous
                  Computing and Communications (ISPA/IUCC), Guangzhou, China, December
                  12-15, 2017},
  pages        = {1179--1185},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ISPA/IUCC.2017.00177},
  doi          = {10.1109/ISPA/IUCC.2017.00177},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/WangJWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/ElahiWX17,
  author       = {Haroon Elahi and
                  Guojun Wang and
                  Dongqing Xie},
  title        = {Assessing privacy behaviors of smartphone users in the context of
                  data over-collection problem: An exploratory study},
  booktitle    = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco,
                  CA, USA, August 4-8, 2017},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/UIC-ATC.2017.8397613},
  doi          = {10.1109/UIC-ATC.2017.8397613},
  timestamp    = {Thu, 30 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/ElahiWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/WangJCXW17,
  author       = {Feng Wang and
                  Wenjun Jiang and
                  Shuhong Chen and
                  Dongqing Xie and
                  Guojun Wang},
  title        = {Exploring user topic influence for group recommendation on learning
                  resources},
  booktitle    = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco,
                  CA, USA, August 4-8, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/UIC-ATC.2017.8397541},
  doi          = {10.1109/UIC-ATC.2017.8397541},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/WangJCXW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/LaiZXF17,
  author       = {Xiazhi Lai and
                  Wanxin Zou and
                  Dongqing Xie and
                  Lisheng Fan},
  title        = {{DF} relaying networks in randomly distributed interference environments},
  booktitle    = {9th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WCSP.2017.8170899},
  doi          = {10.1109/WCSP.2017.8170899},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/wcsp/LaiZXF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcsp/ShiXTLF17,
  author       = {Fang Shi and
                  Dongqing Xie and
                  Weiqiang Tan and
                  Xianfu Lei and
                  Lisheng Fan},
  title        = {Hybrid cache placement for improving physical layer security in cooperative
                  networks},
  booktitle    = {9th International Conference on Wireless Communications and Signal
                  Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/WCSP.2017.8170904},
  doi          = {10.1109/WCSP.2017.8170904},
  timestamp    = {Tue, 12 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcsp/ShiXTLF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijhpsa/LiXGYW16,
  author       = {Fei Li and
                  Dongqing Xie and
                  Wei Gao and
                  Jianhua Yan and
                  Xu An Wang},
  title        = {Round-optimal ID-based dynamic authenticated group key agreement},
  journal      = {Int. J. High Perform. Syst. Archit.},
  volume       = {6},
  number       = {3},
  pages        = {153--161},
  year         = {2016},
  url          = {https://doi.org/10.1504/IJHPSA.2016.10001542},
  doi          = {10.1504/IJHPSA.2016.10001542},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijhpsa/LiXGYW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Li0XC16,
  author       = {Jingwei Li and
                  Jin Li and
                  Dongqing Xie and
                  Zhang Cai},
  title        = {Secure Auditing and Deduplicating Data in Cloud},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {8},
  pages        = {2386--2396},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2015.2389960},
  doi          = {10.1109/TC.2015.2389960},
  timestamp    = {Wed, 08 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/Li0XC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/apscc/WangWX16,
  author       = {Feng Wang and
                  Guojun Wang and
                  Dongqing Xie},
  editor       = {Guojun Wang and
                  Yanbo Han and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Maximizing the Spread of Positive Influence Under {LT-MLA} Model},
  booktitle    = {Advances in Services Computing - 10th Asia-Pacific Services Computing
                  Conference, {APSCC} 2016, Zhangjiajie, China, November 16-18, 2016,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10065},
  pages        = {450--463},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49178-3\_34},
  doi          = {10.1007/978-3-319-49178-3\_34},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/apscc/WangWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmei/ZhangHLZQX16,
  author       = {Shaohong Zhang and
                  Hai Huang and
                  Jiqiao Li and
                  Baoying Zeng and
                  Wenxiao Qiu and
                  Dongqing Xie},
  editor       = {Yaoli Wang and
                  Jiancheng An and
                  Lipo Wang and
                  Qingli Li and
                  Gaowei Van and
                  Qing Chang},
  title        = {Putative protein interaction analysis for human embryonic stem cell
                  derived cardiomyocytes},
  booktitle    = {9th International Congress on Image and Signal Processing, BioMedical
                  Engineering and Informatics, {CISP-BMEI} 2016, Datong, China, October
                  15-17, 2016},
  pages        = {1837--1842},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISP-BMEI.2016.7853016},
  doi          = {10.1109/CISP-BMEI.2016.7853016},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/bmei/ZhangHLZQX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisis/LiXGWY16,
  author       = {Fei Li and
                  Dongqing Xie and
                  Wei Gao and
                  Xu An Wang and
                  Jianhua Yan},
  title        = {An ID-based Dynamic Authenticated Group Key Agreement Scheme with
                  Optimal Round Complexity from Pairings},
  booktitle    = {10th International Conference on Complex, Intelligent, and Software
                  Intensive Systems, {CISIS} 2016, Fukuoka, Japan, July 6-8, 2016},
  pages        = {468--472},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CISIS.2016.63},
  doi          = {10.1109/CISIS.2016.63},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisis/LiXGWY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/ZhuWX16,
  author       = {Xiaoyu Zhu and
                  Guojun Wang and
                  Dongqing Xie},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Jos{\'{e}} M. Alcaraz Calero and
                  Sabu M. Thampi},
  title        = {Fuzzy and Semantic Search over Encrypted Data in the Cloud},
  booktitle    = {Security, Privacy and Anonymity in Computation, Communication and
                  Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE,
                  DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10067},
  pages        = {332--341},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49145-5\_33},
  doi          = {10.1007/978-3-319-49145-5\_33},
  timestamp    = {Wed, 24 Apr 2024 14:55:54 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/ZhuWX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/XingXW15,
  author       = {Xiaofei Xing and
                  Dongqing Xie and
                  Guojun Wang},
  title        = {Energy-Balanced Data Gathering and Aggregating in WSNs: {A} Compressed
                  Sensing Scheme},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {11},
  pages        = {585191:1--585191:10},
  year         = {2015},
  url          = {https://doi.org/10.1155/2015/585191},
  doi          = {10.1155/2015/585191},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/XingXW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jbi/HuangZSWX15,
  author       = {Hai Huang and
                  Shaohong Zhang and
                  Wen{-}Jun Shen and
                  Hau{-}San Wong and
                  Dongqing Xie},
  title        = {Gene set enrichment ensemble using fold change data only},
  journal      = {J. Biomed. Informatics},
  volume       = {57},
  pages        = {189--203},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.jbi.2015.07.019},
  doi          = {10.1016/J.JBI.2015.07.019},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jbi/HuangZSWX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/HeHXF15,
  author       = {Pei He and
                  Achun Hu and
                  Dongqing Xie and
                  Zhiping Fan},
  title        = {Component-Based Verification Model of Sequential Programs},
  journal      = {J. Softw.},
  volume       = {10},
  number       = {11},
  pages        = {1319--1326},
  year         = {2015},
  url          = {https://doi.org/10.17706/jsw.10.11.1319-1326},
  doi          = {10.17706/JSW.10.11.1319-1326},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/HeHXF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fskd/ZhangWWZQX15,
  author       = {Shaohong Zhang and
                  Jing Wang and
                  Xiaoqiang Wu and
                  Baoying Zeng and
                  Wenxiao Qiu and
                  Dongqing Xie},
  title        = {Semi-supervised clustering with associative-link constraints for 3D
                  models},
  booktitle    = {12th International Conference on Fuzzy Systems and Knowledge Discovery,
                  {FSKD} 2015, Zhangjiajie, China, August 15-17, 2015},
  pages        = {1665--1669},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/FSKD.2015.7382195},
  doi          = {10.1109/FSKD.2015.7382195},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fskd/ZhangWWZQX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaci/ZhangYX15,
  author       = {Shaohong Zhang and
                  Liu Yang and
                  Dongqing Xie},
  title        = {Unsupervised evaluation of cluster ensemble solutions},
  booktitle    = {Seventh International Conference on Advanced Computational Intelligence,
                  {ICACI} 2015, Wuyi, China, March 27-29, 2015},
  pages        = {101--106},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICACI.2015.7184757},
  doi          = {10.1109/ICACI.2015.7184757},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icaci/ZhangYX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaci/ZhangYX15a,
  author       = {Shaohong Zhang and
                  Liu Yang and
                  Dongqing Xie},
  title        = {Adaptive metric selection for clustering based on consensus affinity},
  booktitle    = {Seventh International Conference on Advanced Computational Intelligence,
                  {ICACI} 2015, Wuyi, China, March 27-29, 2015},
  pages        = {183--188},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICACI.2015.7184774},
  doi          = {10.1109/ICACI.2015.7184774},
  timestamp    = {Sun, 10 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaci/ZhangYX15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaci/XingXS15,
  author       = {Xiaofei Xing and
                  Dongqing Xie and
                  Zeyu Sun},
  title        = {An approximate optimal coverage set algorithm in wireless sensor networks},
  booktitle    = {Seventh International Conference on Advanced Computational Intelligence,
                  {ICACI} 2015, Wuyi, China, March 27-29, 2015},
  pages        = {300--305},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICACI.2015.7184718},
  doi          = {10.1109/ICACI.2015.7184718},
  timestamp    = {Wed, 22 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaci/XingXS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnc/HuangX15,
  author       = {Hai Huang and
                  Dongqing Xie},
  title        = {Real-time Network Risk Evaluation Paradigm-inspired by Immune},
  booktitle    = {11th International Conference on Natural Computation, {ICNC} 2015,
                  Zhangjiajie, China, August 15-17, 2015},
  pages        = {786--790},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICNC.2015.7378091},
  doi          = {10.1109/ICNC.2015.7378091},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/icnc/HuangX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ZhangWSX14,
  author       = {Shaohong Zhang and
                  Hau{-}San Wong and
                  Wen{-}Jun Shen and
                  Dongqing Xie},
  title        = {{AORS:} Affinity-based outlier ranking score},
  booktitle    = {2014 International Joint Conference on Neural Networks, {IJCNN} 2014,
                  Beijing, China, July 6-11, 2014},
  pages        = {1020--1027},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IJCNN.2014.6889551},
  doi          = {10.1109/IJCNN.2014.6889551},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/ZhangWSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/ZhangWX14,
  author       = {Shaohong Zhang and
                  Hau{-}San Wong and
                  Dongqing Xie},
  title        = {Semi-supervised clustering with pairwise and size constraints},
  booktitle    = {2014 International Joint Conference on Neural Networks, {IJCNN} 2014,
                  Beijing, China, July 6-11, 2014},
  pages        = {2450--2457},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IJCNN.2014.6889553},
  doi          = {10.1109/IJCNN.2014.6889553},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/ZhangWX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcp/GaoWWX13,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Dongqing Xie},
  title        = {Controllable Ring Signatures and Its Application to E-Prosecution},
  journal      = {J. Comput.},
  volume       = {8},
  number       = {4},
  pages        = {833--841},
  year         = {2013},
  url          = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=67\&\#38;id=761},
  doi          = {10.4304/JCP.8.4.833-841},
  timestamp    = {Thu, 25 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcp/GaoWWX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/LiuHGTX13,
  author       = {Miao Liu and
                  Gengtong Hou and
                  Ying Gao and
                  Chunming Tang and
                  Dongqing Xie},
  title        = {An Internet behavior management system based on Android},
  journal      = {J. Softw.},
  volume       = {8},
  number       = {8},
  pages        = {1932--1942},
  year         = {2013},
  url          = {https://doi.org/10.4304/jsw.8.8.1932-1942},
  doi          = {10.4304/JSW.8.8.1932-1942},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsw/LiuHGTX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/WuXTW13,
  author       = {Ji Wu and
                  Dongqing Xie and
                  Lin Tang and
                  Hao Wang},
  title        = {Cost Evaluation of Three-Dimensional Many-Core Processors},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {130--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.27},
  doi          = {10.1109/EIDWT.2013.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/WuXTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/WuXTW13a,
  author       = {Ji Wu and
                  Dongqing Xie and
                  Lin Tang and
                  Hao Wang},
  title        = {Cost Evaluation of Three-Dimensional Network-on-Chip},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {133--136},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.28},
  doi          = {10.1109/EIDWT.2013.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/WuXTW13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/LiXC13,
  author       = {Jin Li and
                  Dongqing Xie and
                  Xiaofeng Chen},
  title        = {Server-Aided Hierarchical Identity-Based Encryption},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {643--647},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.141},
  doi          = {10.1109/EIDWT.2013.141},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/LiXC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eidwt/WangX13,
  author       = {Xiuni Wang and
                  Dongqing Xie},
  title        = {The Systematic Form of a Class of Regular Structured {LDPC} Codes},
  booktitle    = {2013 Fourth International Conference on Emerging Intelligent Data
                  and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013},
  pages        = {648--651},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIDWT.2013.116},
  doi          = {10.1109/EIDWT.2013.116},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eidwt/WangX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/msn/XingXW13,
  author       = {Xiaofei Xing and
                  Dongqing Xie and
                  Guojun Wang},
  title        = {Data Gathering and Processing for Large-Scale Wireless Sensor Networks},
  booktitle    = {{IEEE} 9th International Conference on Mobile Ad-hoc and Sensor Networks,
                  Dalian, {MSN} 2013, China, December 11-13, 2013},
  pages        = {354--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/MSN.2013.56},
  doi          = {10.1109/MSN.2013.56},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/msn/XingXW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcisys/PengXGCLWW12,
  author       = {Lingxi Peng and
                  Dongqing Xie and
                  Ying Gao and
                  Wenbin Chen and
                  Fufang Li and
                  Wu Wen and
                  Jue Wu},
  title        = {An Immune-inspired Adaptive Automated Intrusion Response System Model},
  journal      = {Int. J. Comput. Intell. Syst.},
  volume       = {5},
  number       = {5},
  pages        = {808--815},
  year         = {2012},
  url          = {https://doi.org/10.1080/18756891.2012.733205},
  doi          = {10.1080/18756891.2012.733205},
  timestamp    = {Fri, 03 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcisys/PengXGCLWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/ZhangWSX12,
  author       = {Shaohong Zhang and
                  Hau{-}San Wong and
                  Ying Shen and
                  Dongqing Xie},
  title        = {A New Unsupervised Feature Ranking Method for Gene Expression Data
                  Based on Consensus Affinity},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {9},
  number       = {4},
  pages        = {1257--1263},
  year         = {2012},
  url          = {https://doi.org/10.1109/TCBB.2012.34},
  doi          = {10.1109/TCBB.2012.34},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/ZhangWSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZhaoZX12,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Faster Computation of Self-Pairings},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {58},
  number       = {5},
  pages        = {3266--3272},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIT.2012.2184850},
  doi          = {10.1109/TIT.2012.2184850},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/ZhaoZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/GaoXLWT12,
  author       = {Chong{-}zhi Gao and
                  Dongqing Xie and
                  Jin Li and
                  Baodian Wei and
                  Haibo Tian},
  editor       = {Fatos Xhafa and
                  Leonard Barolli and
                  Florin Pop and
                  Xiaofeng Chen and
                  Valentin Cristea},
  title        = {Deniably Information-Hiding Encryptions Secure against Adaptive Chosen
                  Ciphertext Attack},
  booktitle    = {2012 Fourth International Conference on Intelligent Networking and
                  Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21,
                  2012},
  pages        = {377--384},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/iNCoS.2012.88},
  doi          = {10.1109/INCOS.2012.88},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/GaoXLWT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/GaoXW12,
  author       = {Chong{-}zhi Gao and
                  Dongqing Xie and
                  Baodian Wei},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {46--62},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_4},
  doi          = {10.1007/978-3-642-29101-2\_4},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/GaoXW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LiuZHX11,
  author       = {LinYuan Liu and
                  Haibin Zhu and
                  Zhiqiu Huang and
                  Dongqing Xie},
  title        = {Minimal privacy authorization in web services collaboration},
  journal      = {Comput. Stand. Interfaces},
  volume       = {33},
  number       = {3},
  pages        = {332--343},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.csi.2010.09.001},
  doi          = {10.1016/J.CSI.2010.09.001},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/LiuZHX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoXZZC11,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Jingwei Zhang and
                  Binglong Chen},
  title        = {Computing bilinear pairings on elliptic curves with automorphisms},
  journal      = {Des. Codes Cryptogr.},
  volume       = {58},
  number       = {1},
  pages        = {35--44},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9383-y},
  doi          = {10.1007/S10623-010-9383-Y},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoXZZC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiHCCWX11,
  author       = {Jin Li and
                  Qiong Huang and
                  Xiaofeng Chen and
                  Sherman S. M. Chow and
                  Duncan S. Wong and
                  Dongqing Xie},
  editor       = {Bruce S. N. Cheung and
                  Lucas Chi Kwong Hui and
                  Ravi S. Sandhu and
                  Duncan S. Wong},
  title        = {Multi-authority ciphertext-policy attribute-based encryption with
                  accountability},
  booktitle    = {Proceedings of the 6th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24,
                  2011},
  pages        = {386--390},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1966913.1966964},
  doi          = {10.1145/1966913.1966964},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiHCCWX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emeit/XiongXPL11,
  author       = {Wei Xiong and
                  Dongqing Xie and
                  Lingxi Peng and
                  Jie Liu},
  title        = {PrChord: {A} probability routing structured {P2P} protocol},
  booktitle    = {International Conference on Electronic and Mechanical Engineering
                  and Information Technology, {EMEIT} 2011, Harbin, Heilongjiang, China,
                  12-14 August, 2011},
  pages        = {3142--3145},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/EMEIT.2011.6023753},
  doi          = {10.1109/EMEIT.2011.6023753},
  timestamp    = {Mon, 09 Aug 2021 14:53:48 +0200},
  biburl       = {https://dblp.org/rec/conf/emeit/XiongXPL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiASXR10,
  author       = {Jin Li and
                  Man Ho Au and
                  Willy Susilo and
                  Dongqing Xie and
                  Kui Ren},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Attribute-based signature and its applications},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {60--69},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755697},
  doi          = {10.1145/1755688.1755697},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LiASXR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/LiZCXRLTT10,
  author       = {Jin Li and
                  Gansen Zhao and
                  Xiaofeng Chen and
                  Dongqing Xie and
                  Chunming Rong and
                  Wenjun Li and
                  Lianzhang Tang and
                  Yong Tang},
  title        = {Fine-Grained Data Access Control Systems with User Accountability
                  in Cloud Computing},
  booktitle    = {Cloud Computing, Second International Conference, CloudCom 2010, November
                  30 - December 3, 2010, Indianapolis, Indiana, USA, Proceedings},
  pages        = {89--96},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CloudCom.2010.44},
  doi          = {10.1109/CLOUDCOM.2010.44},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cloudcom/LiZCXRLTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnis/KeXZ10,
  author       = {Qi Ke and
                  Dongqing Xie and
                  Dafang Zhang},
  title        = {A robust watermarking scheme for 3D point cloud models using self-similarity
                  partition},
  booktitle    = {Proceedings of the {IEEE} International Conference on Wireless Communications,
                  Networking and Information Security, {WCNIS} 2010, 25-27 June 2010,
                  Beijing, China},
  pages        = {287--291},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/WCINS.2010.5541785},
  doi          = {10.1109/WCINS.2010.5541785},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnis/KeXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZX10,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Faster Computation of Self-pairings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {399},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/399},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/GaoWXT09,
  author       = {Chong{-}zhi Gao and
                  Baodian Wei and
                  Dongqing Xie and
                  Chunming Tang},
  title        = {How to construct efficient on-line/off-line threshold signature schemes
                  through the simulation approach},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {21},
  number       = {10},
  pages        = {1351--1372},
  year         = {2009},
  url          = {https://doi.org/10.1002/cpe.1438},
  doi          = {10.1002/CPE.1438},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/GaoWXT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnw/ZhouXX09,
  author       = {Zaihong Zhou and
                  Dongqing Xie and
                  Wei Xiong},
  title        = {A Novel Distributed Detection Scheme against DDoS Attack},
  journal      = {J. Networks},
  volume       = {4},
  number       = {9},
  pages        = {921--928},
  year         = {2009},
  url          = {https://doi.org/10.4304/jnw.4.9.921-928},
  doi          = {10.4304/JNW.4.9.921-928},
  timestamp    = {Tue, 15 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnw/ZhouXX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GaoWXT09,
  author       = {Chong{-}zhi Gao and
                  Baodian Wei and
                  Dongqing Xie and
                  Chunming Tang},
  editor       = {Marc Fischlin},
  title        = {Divisible On-Line/Off-Line Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {148--163},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_10},
  doi          = {10.1007/978-3-642-00862-7\_10},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GaoWXT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sersc-isa/ZhaoXZGZ09,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Chong{-}zhi Gao and
                  Jingwei Zhang},
  editor       = {Jong Hyuk Park and
                  Hsiao{-}Hwa Chen and
                  Mohammed Atiquzzaman and
                  Changhoon Lee and
                  Tai{-}Hoon Kim and
                  Sang{-}Soo Yeo},
  title        = {Improved Implementations of Cryptosystems Based on Tate Pairing},
  booktitle    = {Advances in Information Security and Assurance, Third International
                  Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5576},
  pages        = {145--151},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02617-1\_15},
  doi          = {10.1007/978-3-642-02617-1\_15},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sersc-isa/ZhaoXZGZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/XiongXZL08,
  author       = {Wei Xiong and
                  Dongqing Xie and
                  Zaihong Zhou and
                  Jie Liu},
  title        = {Decreasing System Load by Caching in Structured {P2P} Systems},
  booktitle    = {10th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2008, 25-27 Sept. 2008, Dalian, China},
  pages        = {234--241},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HPCC.2008.112},
  doi          = {10.1109/HPCC.2008.112},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/XiongXZL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icycs/WuXW08,
  author       = {Diwen Wu and
                  Dongqing Xie and
                  Lupeng Wang},
  title        = {A Deployment Algorithm to Achieve both Connectivity and Coverage in
                  Grid Sensor Networks},
  booktitle    = {Proceedings of the 9th International Conference for Young Computer
                  Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21,
                  2008},
  pages        = {522--526},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICYCS.2008.120},
  doi          = {10.1109/ICYCS.2008.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icycs/WuXW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoXZZC08,
  author       = {Changan Zhao and
                  Dongqing Xie and
                  Fangguo Zhang and
                  Jingwei Zhang and
                  Binglong Chen},
  title        = {Computing Bilinear Pairings on Elliptic Curves with Automorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {209},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/209},
  timestamp    = {Thu, 12 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoXZZC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhaoZX08,
  author       = {Changan Zhao and
                  Fangguo Zhang and
                  Dongqing Xie},
  title        = {Reducing the Complexity of the Weil Pairing Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {212},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/212},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhaoZX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GaoWXT08,
  author       = {Chong{-}zhi Gao and
                  Baodian Wei and
                  Dongqing Xie and
                  Chunming Tang},
  title        = {Divisible On-line/Off-line Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/447},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GaoWXT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcst/GaoWX07,
  author       = {Wei Gao and
                  Xueli Wang and
                  Dongqing Xie},
  title        = {Chameleon Hashes Without Key Exposure Based on Factoring},
  journal      = {J. Comput. Sci. Technol.},
  volume       = {22},
  number       = {1},
  pages        = {109--113},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11390-007-9015-9},
  doi          = {10.1007/S11390-007-9015-9},
  timestamp    = {Sat, 09 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcst/GaoWX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/WuX07,
  author       = {Diwen Wu and
                  Dongqing Xie},
  editor       = {Evangelos Kranakis and
                  Jaroslav Opatrny},
  title        = {The Analysis of Fault Tolerance in Triangular Topology Sensor Networks},
  booktitle    = {Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference,
                  {ADHOC-NOW} 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4686},
  pages        = {248--261},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74823-6\_19},
  doi          = {10.1007/978-3-540-74823-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/WuX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/XieZ06,
  author       = {Dongqing Xie and
                  Han Zhou},
  title        = {A Probabilistic Certificate Updating Protocol for {MANET}},
  booktitle    = {20th International Conference on Advanced Information Networking and
                  Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria},
  pages        = {147--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/AINA.2006.49},
  doi          = {10.1109/AINA.2006.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/XieZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/GaoWWX06,
  author       = {Wei Gao and
                  Guilin Wang and
                  Xueli Wang and
                  Dongqing Xie},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Controllable Ring Signatures},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_1},
  doi          = {10.1007/978-3-540-71093-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/GaoWWX06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ErisaniaD05,
  author       = {Kibaya Erisania and
                  Dongqing Xie},
  editor       = {Hamid R. Arabnia},
  title        = {Designing a Secure Trust Intermediary Service {(STIS)} for Web Services:
                  a WS-Trust Approach},
  booktitle    = {Proceedings of The 2005 International Conference on Security and Management,
                  {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005},
  pages        = {201--207},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Sat, 27 Aug 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ErisaniaD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics