Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dongqing Xie
@article{DBLP:journals/jaihc/LiXGCWM24, author = {Fei Li and Dongqing Xie and Wei Gao and Kefei Chen and Guilin Wang and Roberto Metere}, title = {A certificateless signature scheme and a certificateless public auditing scheme with authority trust level 3+}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {15}, number = {2}, pages = {1317--1326}, year = {2024}, url = {https://doi.org/10.1007/s12652-017-0553-x}, doi = {10.1007/S12652-017-0553-X}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/LiXGCWM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inis/LiuZWCZLCHZZWLF22, author = {Jun Liu and Yuwei Zhang and Jing Wang and Tao Cui and Lin Zhang and Chao Li and Kai Chen and Huang Huang and Xuan Zhou and Wei Zhou and Zhao Wang and Sun Li and Suili Feng and Dongqing Xie and Dahua Fan and Jianghong Ou and Jiangtao Ou and Yun Li and Haige Xiang and Kaimeno Dube and Abbarbas Muazu and Nakilavai Rono and Yajuan Tang}, title = {Intelligent Bi-directional Relaying Communication for Edge Intelligence based Industrial IoT Networks}, journal = {{EAI} Endorsed Trans. Ind. Networks Intell. Syst.}, volume = {9}, number = {32}, pages = {4}, year = {2022}, url = {https://doi.org/10.4108/eetinis.v9i32.1909}, doi = {10.4108/EETINIS.V9I32.1909}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/inis/LiuZWCZLCHZZWLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/XieLLF18, author = {Dongqing Xie and Xiazhi Lai and Xianfu Lei and Lisheng Fan}, title = {Cognitive Multiuser Energy Harvesting Decode-and-Forward Relaying System With Direct Links}, journal = {{IEEE} Access}, volume = {6}, pages = {5596--5606}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2017.2776953}, doi = {10.1109/ACCESS.2017.2776953}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/XieLLF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShiTXXFL18, author = {Fang Shi and Weiqiang Tan and Junjuan Xia and Dongqing Xie and Lisheng Fan and Xin Liu}, title = {Hybrid Cache Placement for Physical-Layer Security in Cooperative Networks}, journal = {{IEEE} Access}, volume = {6}, pages = {8098--8108}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2791992}, doi = {10.1109/ACCESS.2018.2791992}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShiTXXFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TanXXTFJ18, author = {Weiqiang Tan and Dongqing Xie and Junjuan Xia and Weijie Tan and Lisheng Fan and Shi Jin}, title = {Spectral and Energy Efficiency of Massive {MIMO} for Hybrid Architectures Based on Phase Shifters}, journal = {{IEEE} Access}, volume = {6}, pages = {11751--11759}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2796571}, doi = {10.1109/ACCESS.2018.2796571}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TanXXTFJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangXG18, author = {Yuan{-}Gen Wang and Dongqing Xie and Brij B. Gupta}, title = {A Study on the Collusion Security of LUT-Based Client-Side Watermark Embedding}, journal = {{IEEE} Access}, volume = {6}, pages = {15816--15822}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2802928}, doi = {10.1109/ACCESS.2018.2802928}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangXG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-com/TanLXTFJ18, author = {Weiqiang Tan and Xiao Li and Dongqing Xie and Weijie Tan and Lisheng Fan and Shi Jin}, title = {On the performance of three-dimensionalantenna arrays in millimetre wave propagation environments}, journal = {{IET} Commun.}, volume = {12}, number = {14}, pages = {1743--1750}, year = {2018}, url = {https://doi.org/10.1049/iet-com.2017.1071}, doi = {10.1049/IET-COM.2017.1071}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-com/TanLXTFJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijprai/WuXL18, author = {Weizu Wu and Dongqing Xie and Liqun Liu}, title = {Heterogeneous Differential Evolution with Memory Enhanced Brownian and Quantum Individuals for Dynamic Optimization Problems}, journal = {Int. J. Pattern Recognit. Artif. Intell.}, volume = {32}, number = {2}, pages = {1859003:1--1859003:18}, year = {2018}, url = {https://doi.org/10.1142/S0218001418590036}, doi = {10.1142/S0218001418590036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijprai/WuXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsir/HuangJYX18, author = {Haihuang Huang and Liwei Jiang and Xue Yu and Dongqing Xie}, title = {Hypercube-Based Crowding Differential Evolution with Neighborhood Mutation for Multimodal Optimization}, journal = {Int. J. Swarm Intell. Res.}, volume = {9}, number = {2}, pages = {15--27}, year = {2018}, url = {https://doi.org/10.4018/IJSIR.2018040102}, doi = {10.4018/IJSIR.2018040102}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsir/HuangJYX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XieHXGZ18, author = {Run Xie and Chanlian He and Dongqing Xie and Chongzhi Gao and Xiaojun Zhang}, title = {A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {7254305:1--7254305:7}, year = {2018}, url = {https://doi.org/10.1155/2018/7254305}, doi = {10.1155/2018/7254305}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XieHXGZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiZXYD18, author = {Shu Li and Jie Zhang and Dongqing Xie and Shui Yu and Wanchun Dou}, title = {High Quality Participant Recruitment of Mobile Crowdsourcing over Big Data}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8647720}, doi = {10.1109/GLOCOM.2018.8647720}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiZXYD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangYXGXW17, author = {Shaohong Zhang and Zongbao Yang and Xiaofei Xing and Ying Gao and Dongqing Xie and Hau{-}San Wong}, title = {Generalized Pair-Counting Similarity Measures for Clustering and Cluster Ensembles}, journal = {{IEEE} Access}, volume = {5}, pages = {16904--16918}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2741221}, doi = {10.1109/ACCESS.2017.2741221}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ZhangYXGXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LaiZXLF17, author = {Xiazhi Lai and Wanxin Zou and Dongqing Xie and Xutao Li and Lisheng Fan}, title = {{DF} Relaying Networks With Randomly Distributed Interferers}, journal = {{IEEE} Access}, volume = {5}, pages = {18909--18917}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2751105}, doi = {10.1109/ACCESS.2017.2751105}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LaiZXLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DengFLTX17, author = {Dan Deng and Lisheng Fan and Xianfu Lei and Weiqiang Tan and Dongqing Xie}, title = {Joint User and Relay Selection for Cooperative {NOMA} Networks}, journal = {{IEEE} Access}, volume = {5}, pages = {20220--20227}, year = {2017}, url = {https://doi.org/10.1109/ACCESS.2017.2751503}, doi = {10.1109/ACCESS.2017.2751503}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DengFLTX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/ChenWYX17, author = {Shuhong Chen and Guojun Wang and Guofeng Yan and Dongqing Xie}, title = {Multi-dimensional fuzzy trust evaluation for mobile social networks based on dynamic community structures}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {7}, year = {2017}, url = {https://doi.org/10.1002/cpe.3901}, doi = {10.1002/CPE.3901}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/ChenWYX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/WuXT17, author = {Ji Wu and Dongqing Xie and Lin Tang}, title = {A high-level exploration tool for three-dimensional network-on-chip}, journal = {Int. J. Comput. Sci. Eng.}, volume = {14}, number = {2}, pages = {164--178}, year = {2017}, url = {https://doi.org/10.1504/IJCSE.2017.10003830}, doi = {10.1504/IJCSE.2017.10003830}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/WuXT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/PengYCYX17, author = {Sancheng Peng and Aimin Yang and Lihong Cao and Shui Yu and Dongqing Xie}, title = {Social influence modeling using information theory in mobile social networks}, journal = {Inf. Sci.}, volume = {379}, pages = {146--159}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.08.023}, doi = {10.1016/J.INS.2016.08.023}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/PengYCYX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/WuLX18, author = {Weizu Wu and Liqun Liu and Dongqing Xie}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{31070}}{\unicode{32463}}{\unicode{32593}}{\unicode{32476}}{\unicode{30340}}{\unicode{24322}}{\unicode{26500}}{\unicode{32593}}{\unicode{32476}}{\unicode{21521}}{\unicode{37327}}{\unicode{21270}}{\unicode{34920}}{\unicode{31034}}{\unicode{26041}}{\unicode{27861}} (Vectorized Representation of Heterogeneous Network Based on Neural Networks)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {44}, number = {5}, pages = {272--275}, year = {2017}, url = {https://doi.org/10.11896/j.issn.1002-137X.2017.05.049}, doi = {10.11896/J.ISSN.1002-137X.2017.05.049}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/WuLX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/PengWX17, author = {Sancheng Peng and Guojun Wang and Dongqing Xie}, title = {Social Influence Analysis in Social Networking Big Data: Opportunities and Challenges}, journal = {{IEEE} Netw.}, volume = {31}, number = {1}, pages = {11--17}, year = {2017}, url = {https://doi.org/10.1109/MNET.2016.1500104NM}, doi = {10.1109/MNET.2016.1500104NM}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/PengWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiGXT17, author = {Fei Li and Wei Gao and Dongqing Xie and Chunming Tang}, editor = {Xingming Sun and Han{-}Chieh Chao and Xingang You and Elisa Bertino}, title = {Certificateless Cryptography with {KGC} Trust Level 3 Revisited}, booktitle = {Cloud Computing and Security - Third International Conference, {ICCCS} 2017, Nanjing, China, June 16-18, 2017, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10603}, pages = {292--304}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68542-7\_24}, doi = {10.1007/978-3-319-68542-7\_24}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiGXT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/DaiWCXC17, author = {Yinglong Dai and Guojun Wang and Sihong Chen and Dongqing Xie and Shuhong Chen}, title = {Using Deep Neural Networks to Simulate Human Body}, booktitle = {2017 {IEEE} International Symposium on Parallel and Distributed Processing with Applications and 2017 {IEEE} International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, December 12-15, 2017}, pages = {959--966}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISPA/IUCC.2017.00147}, doi = {10.1109/ISPA/IUCC.2017.00147}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/DaiWCXC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/WangJWX17, author = {Feng Wang and Wenjun Jiang and Guojun Wang and Dongqing Xie}, title = {Data-Driven Influence Learning in Social Networks}, booktitle = {2017 {IEEE} International Symposium on Parallel and Distributed Processing with Applications and 2017 {IEEE} International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), Guangzhou, China, December 12-15, 2017}, pages = {1179--1185}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ISPA/IUCC.2017.00177}, doi = {10.1109/ISPA/IUCC.2017.00177}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispa/WangJWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/ElahiWX17, author = {Haroon Elahi and Guojun Wang and Dongqing Xie}, title = {Assessing privacy behaviors of smartphone users in the context of data over-collection problem: An exploratory study}, booktitle = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017}, pages = {1--8}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/UIC-ATC.2017.8397613}, doi = {10.1109/UIC-ATC.2017.8397613}, timestamp = {Thu, 30 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/ElahiWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/WangJCXW17, author = {Feng Wang and Wenjun Jiang and Shuhong Chen and Dongqing Xie and Guojun Wang}, title = {Exploring user topic influence for group recommendation on learning resources}, booktitle = {2017 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computed, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017, San Francisco, CA, USA, August 4-8, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/UIC-ATC.2017.8397541}, doi = {10.1109/UIC-ATC.2017.8397541}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/WangJCXW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/LaiZXF17, author = {Xiazhi Lai and Wanxin Zou and Dongqing Xie and Lisheng Fan}, title = {{DF} relaying networks in randomly distributed interference environments}, booktitle = {9th International Conference on Wireless Communications and Signal Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WCSP.2017.8170899}, doi = {10.1109/WCSP.2017.8170899}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/wcsp/LaiZXF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcsp/ShiXTLF17, author = {Fang Shi and Dongqing Xie and Weiqiang Tan and Xianfu Lei and Lisheng Fan}, title = {Hybrid cache placement for improving physical layer security in cooperative networks}, booktitle = {9th International Conference on Wireless Communications and Signal Processing, {WCSP} 2017, Nanjing, China, October 11-13, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/WCSP.2017.8170904}, doi = {10.1109/WCSP.2017.8170904}, timestamp = {Tue, 12 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcsp/ShiXTLF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijhpsa/LiXGYW16, author = {Fei Li and Dongqing Xie and Wei Gao and Jianhua Yan and Xu An Wang}, title = {Round-optimal ID-based dynamic authenticated group key agreement}, journal = {Int. J. High Perform. Syst. Archit.}, volume = {6}, number = {3}, pages = {153--161}, year = {2016}, url = {https://doi.org/10.1504/IJHPSA.2016.10001542}, doi = {10.1504/IJHPSA.2016.10001542}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijhpsa/LiXGYW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Li0XC16, author = {Jingwei Li and Jin Li and Dongqing Xie and Zhang Cai}, title = {Secure Auditing and Deduplicating Data in Cloud}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {8}, pages = {2386--2396}, year = {2016}, url = {https://doi.org/10.1109/TC.2015.2389960}, doi = {10.1109/TC.2015.2389960}, timestamp = {Wed, 08 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/Li0XC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/WangWX16, author = {Feng Wang and Guojun Wang and Dongqing Xie}, editor = {Guojun Wang and Yanbo Han and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Maximizing the Spread of Positive Influence Under {LT-MLA} Model}, booktitle = {Advances in Services Computing - 10th Asia-Pacific Services Computing Conference, {APSCC} 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10065}, pages = {450--463}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49178-3\_34}, doi = {10.1007/978-3-319-49178-3\_34}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/WangWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bmei/ZhangHLZQX16, author = {Shaohong Zhang and Hai Huang and Jiqiao Li and Baoying Zeng and Wenxiao Qiu and Dongqing Xie}, editor = {Yaoli Wang and Jiancheng An and Lipo Wang and Qingli Li and Gaowei Van and Qing Chang}, title = {Putative protein interaction analysis for human embryonic stem cell derived cardiomyocytes}, booktitle = {9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics, {CISP-BMEI} 2016, Datong, China, October 15-17, 2016}, pages = {1837--1842}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CISP-BMEI.2016.7853016}, doi = {10.1109/CISP-BMEI.2016.7853016}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/bmei/ZhangHLZQX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/LiXGWY16, author = {Fei Li and Dongqing Xie and Wei Gao and Xu An Wang and Jianhua Yan}, title = {An ID-based Dynamic Authenticated Group Key Agreement Scheme with Optimal Round Complexity from Pairings}, booktitle = {10th International Conference on Complex, Intelligent, and Software Intensive Systems, {CISIS} 2016, Fukuoka, Japan, July 6-8, 2016}, pages = {468--472}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CISIS.2016.63}, doi = {10.1109/CISIS.2016.63}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisis/LiXGWY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/ZhuWX16, author = {Xiaoyu Zhu and Guojun Wang and Dongqing Xie}, editor = {Guojun Wang and Indrakshi Ray and Jos{\'{e}} M. Alcaraz Calero and Sabu M. Thampi}, title = {Fuzzy and Semantic Search over Encrypted Data in the Cloud}, booktitle = {Security, Privacy and Anonymity in Computation, Communication and Storage - SpaCCS 2016 International Workshops, TrustData, TSP, NOPE, DependSys, BigDataSPT, and WCSSC, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10067}, pages = {332--341}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49145-5\_33}, doi = {10.1007/978-3-319-49145-5\_33}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/ZhuWX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/XingXW15, author = {Xiaofei Xing and Dongqing Xie and Guojun Wang}, title = {Energy-Balanced Data Gathering and Aggregating in WSNs: {A} Compressed Sensing Scheme}, journal = {Int. J. Distributed Sens. Networks}, volume = {11}, pages = {585191:1--585191:10}, year = {2015}, url = {https://doi.org/10.1155/2015/585191}, doi = {10.1155/2015/585191}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/XingXW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbi/HuangZSWX15, author = {Hai Huang and Shaohong Zhang and Wen{-}Jun Shen and Hau{-}San Wong and Dongqing Xie}, title = {Gene set enrichment ensemble using fold change data only}, journal = {J. Biomed. Informatics}, volume = {57}, pages = {189--203}, year = {2015}, url = {https://doi.org/10.1016/j.jbi.2015.07.019}, doi = {10.1016/J.JBI.2015.07.019}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbi/HuangZSWX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/HeHXF15, author = {Pei He and Achun Hu and Dongqing Xie and Zhiping Fan}, title = {Component-Based Verification Model of Sequential Programs}, journal = {J. Softw.}, volume = {10}, number = {11}, pages = {1319--1326}, year = {2015}, url = {https://doi.org/10.17706/jsw.10.11.1319-1326}, doi = {10.17706/JSW.10.11.1319-1326}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/HeHXF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fskd/ZhangWWZQX15, author = {Shaohong Zhang and Jing Wang and Xiaoqiang Wu and Baoying Zeng and Wenxiao Qiu and Dongqing Xie}, title = {Semi-supervised clustering with associative-link constraints for 3D models}, booktitle = {12th International Conference on Fuzzy Systems and Knowledge Discovery, {FSKD} 2015, Zhangjiajie, China, August 15-17, 2015}, pages = {1665--1669}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/FSKD.2015.7382195}, doi = {10.1109/FSKD.2015.7382195}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fskd/ZhangWWZQX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaci/ZhangYX15, author = {Shaohong Zhang and Liu Yang and Dongqing Xie}, title = {Unsupervised evaluation of cluster ensemble solutions}, booktitle = {Seventh International Conference on Advanced Computational Intelligence, {ICACI} 2015, Wuyi, China, March 27-29, 2015}, pages = {101--106}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICACI.2015.7184757}, doi = {10.1109/ICACI.2015.7184757}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icaci/ZhangYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaci/ZhangYX15a, author = {Shaohong Zhang and Liu Yang and Dongqing Xie}, title = {Adaptive metric selection for clustering based on consensus affinity}, booktitle = {Seventh International Conference on Advanced Computational Intelligence, {ICACI} 2015, Wuyi, China, March 27-29, 2015}, pages = {183--188}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICACI.2015.7184774}, doi = {10.1109/ICACI.2015.7184774}, timestamp = {Sun, 10 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaci/ZhangYX15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaci/XingXS15, author = {Xiaofei Xing and Dongqing Xie and Zeyu Sun}, title = {An approximate optimal coverage set algorithm in wireless sensor networks}, booktitle = {Seventh International Conference on Advanced Computational Intelligence, {ICACI} 2015, Wuyi, China, March 27-29, 2015}, pages = {300--305}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICACI.2015.7184718}, doi = {10.1109/ICACI.2015.7184718}, timestamp = {Wed, 22 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icaci/XingXS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnc/HuangX15, author = {Hai Huang and Dongqing Xie}, title = {Real-time Network Risk Evaluation Paradigm-inspired by Immune}, booktitle = {11th International Conference on Natural Computation, {ICNC} 2015, Zhangjiajie, China, August 15-17, 2015}, pages = {786--790}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICNC.2015.7378091}, doi = {10.1109/ICNC.2015.7378091}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/icnc/HuangX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/ZhangWSX14, author = {Shaohong Zhang and Hau{-}San Wong and Wen{-}Jun Shen and Dongqing Xie}, title = {{AORS:} Affinity-based outlier ranking score}, booktitle = {2014 International Joint Conference on Neural Networks, {IJCNN} 2014, Beijing, China, July 6-11, 2014}, pages = {1020--1027}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IJCNN.2014.6889551}, doi = {10.1109/IJCNN.2014.6889551}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/ZhangWSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/ZhangWX14, author = {Shaohong Zhang and Hau{-}San Wong and Dongqing Xie}, title = {Semi-supervised clustering with pairwise and size constraints}, booktitle = {2014 International Joint Conference on Neural Networks, {IJCNN} 2014, Beijing, China, July 6-11, 2014}, pages = {2450--2457}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IJCNN.2014.6889553}, doi = {10.1109/IJCNN.2014.6889553}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/ZhangWX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/GaoWWX13, author = {Wei Gao and Guilin Wang and Xueli Wang and Dongqing Xie}, title = {Controllable Ring Signatures and Its Application to E-Prosecution}, journal = {J. Comput.}, volume = {8}, number = {4}, pages = {833--841}, year = {2013}, url = {http://www.jcomputers.us/index.php?m=content\&\#38;c=index\&\#38;a=show\&\#38;catid=67\&\#38;id=761}, doi = {10.4304/JCP.8.4.833-841}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/GaoWWX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/LiuHGTX13, author = {Miao Liu and Gengtong Hou and Ying Gao and Chunming Tang and Dongqing Xie}, title = {An Internet behavior management system based on Android}, journal = {J. Softw.}, volume = {8}, number = {8}, pages = {1932--1942}, year = {2013}, url = {https://doi.org/10.4304/jsw.8.8.1932-1942}, doi = {10.4304/JSW.8.8.1932-1942}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsw/LiuHGTX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/WuXTW13, author = {Ji Wu and Dongqing Xie and Lin Tang and Hao Wang}, title = {Cost Evaluation of Three-Dimensional Many-Core Processors}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {130--132}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.27}, doi = {10.1109/EIDWT.2013.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/WuXTW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/WuXTW13a, author = {Ji Wu and Dongqing Xie and Lin Tang and Hao Wang}, title = {Cost Evaluation of Three-Dimensional Network-on-Chip}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {133--136}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.28}, doi = {10.1109/EIDWT.2013.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/WuXTW13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/LiXC13, author = {Jin Li and Dongqing Xie and Xiaofeng Chen}, title = {Server-Aided Hierarchical Identity-Based Encryption}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {643--647}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.141}, doi = {10.1109/EIDWT.2013.141}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/LiXC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eidwt/WangX13, author = {Xiuni Wang and Dongqing Xie}, title = {The Systematic Form of a Class of Regular Structured {LDPC} Codes}, booktitle = {2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, Xi'an, Shaanxi, China, September 9-11, 2013}, pages = {648--651}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/EIDWT.2013.116}, doi = {10.1109/EIDWT.2013.116}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eidwt/WangX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/XingXW13, author = {Xiaofei Xing and Dongqing Xie and Guojun Wang}, title = {Data Gathering and Processing for Large-Scale Wireless Sensor Networks}, booktitle = {{IEEE} 9th International Conference on Mobile Ad-hoc and Sensor Networks, Dalian, {MSN} 2013, China, December 11-13, 2013}, pages = {354--358}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/MSN.2013.56}, doi = {10.1109/MSN.2013.56}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/msn/XingXW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcisys/PengXGCLWW12, author = {Lingxi Peng and Dongqing Xie and Ying Gao and Wenbin Chen and Fufang Li and Wu Wen and Jue Wu}, title = {An Immune-inspired Adaptive Automated Intrusion Response System Model}, journal = {Int. J. Comput. Intell. Syst.}, volume = {5}, number = {5}, pages = {808--815}, year = {2012}, url = {https://doi.org/10.1080/18756891.2012.733205}, doi = {10.1080/18756891.2012.733205}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcisys/PengXGCLWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/ZhangWSX12, author = {Shaohong Zhang and Hau{-}San Wong and Ying Shen and Dongqing Xie}, title = {A New Unsupervised Feature Ranking Method for Gene Expression Data Based on Consensus Affinity}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {9}, number = {4}, pages = {1257--1263}, year = {2012}, url = {https://doi.org/10.1109/TCBB.2012.34}, doi = {10.1109/TCBB.2012.34}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/ZhangWSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZhaoZX12, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Faster Computation of Self-Pairings}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {5}, pages = {3266--3272}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2184850}, doi = {10.1109/TIT.2012.2184850}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/ZhaoZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/GaoXLWT12, author = {Chong{-}zhi Gao and Dongqing Xie and Jin Li and Baodian Wei and Haibo Tian}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Deniably Information-Hiding Encryptions Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {377--384}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.88}, doi = {10.1109/INCOS.2012.88}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/incos/GaoXLWT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/GaoXW12, author = {Chong{-}zhi Gao and Dongqing Xie and Baodian Wei}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {46--62}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_4}, doi = {10.1007/978-3-642-29101-2\_4}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/GaoXW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LiuZHX11, author = {LinYuan Liu and Haibin Zhu and Zhiqiu Huang and Dongqing Xie}, title = {Minimal privacy authorization in web services collaboration}, journal = {Comput. Stand. Interfaces}, volume = {33}, number = {3}, pages = {332--343}, year = {2011}, url = {https://doi.org/10.1016/j.csi.2010.09.001}, doi = {10.1016/J.CSI.2010.09.001}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/LiuZHX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoXZZC11, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Binglong Chen}, title = {Computing bilinear pairings on elliptic curves with automorphisms}, journal = {Des. Codes Cryptogr.}, volume = {58}, number = {1}, pages = {35--44}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9383-y}, doi = {10.1007/S10623-010-9383-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoXZZC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiHCCWX11, author = {Jin Li and Qiong Huang and Xiaofeng Chen and Sherman S. M. Chow and Duncan S. Wong and Dongqing Xie}, editor = {Bruce S. N. Cheung and Lucas Chi Kwong Hui and Ravi S. Sandhu and Duncan S. Wong}, title = {Multi-authority ciphertext-policy attribute-based encryption with accountability}, booktitle = {Proceedings of the 6th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2011, Hong Kong, China, March 22-24, 2011}, pages = {386--390}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1966913.1966964}, doi = {10.1145/1966913.1966964}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiHCCWX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emeit/XiongXPL11, author = {Wei Xiong and Dongqing Xie and Lingxi Peng and Jie Liu}, title = {PrChord: {A} probability routing structured {P2P} protocol}, booktitle = {International Conference on Electronic and Mechanical Engineering and Information Technology, {EMEIT} 2011, Harbin, Heilongjiang, China, 12-14 August, 2011}, pages = {3142--3145}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/EMEIT.2011.6023753}, doi = {10.1109/EMEIT.2011.6023753}, timestamp = {Mon, 09 Aug 2021 14:53:48 +0200}, biburl = {https://dblp.org/rec/conf/emeit/XiongXPL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiASXR10, author = {Jin Li and Man Ho Au and Willy Susilo and Dongqing Xie and Kui Ren}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Attribute-based signature and its applications}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {60--69}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755697}, doi = {10.1145/1755688.1755697}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/LiASXR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloudcom/LiZCXRLTT10, author = {Jin Li and Gansen Zhao and Xiaofeng Chen and Dongqing Xie and Chunming Rong and Wenjun Li and Lianzhang Tang and Yong Tang}, title = {Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing}, booktitle = {Cloud Computing, Second International Conference, CloudCom 2010, November 30 - December 3, 2010, Indianapolis, Indiana, USA, Proceedings}, pages = {89--96}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CloudCom.2010.44}, doi = {10.1109/CLOUDCOM.2010.44}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cloudcom/LiZCXRLTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnis/KeXZ10, author = {Qi Ke and Dongqing Xie and Dafang Zhang}, title = {A robust watermarking scheme for 3D point cloud models using self-similarity partition}, booktitle = {Proceedings of the {IEEE} International Conference on Wireless Communications, Networking and Information Security, {WCNIS} 2010, 25-27 June 2010, Beijing, China}, pages = {287--291}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/WCINS.2010.5541785}, doi = {10.1109/WCINS.2010.5541785}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/wcnis/KeXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZX10, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Faster Computation of Self-pairings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {399}, year = {2010}, url = {http://eprint.iacr.org/2010/399}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/GaoWXT09, author = {Chong{-}zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang}, title = {How to construct efficient on-line/off-line threshold signature schemes through the simulation approach}, journal = {Concurr. Comput. Pract. Exp.}, volume = {21}, number = {10}, pages = {1351--1372}, year = {2009}, url = {https://doi.org/10.1002/cpe.1438}, doi = {10.1002/CPE.1438}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/GaoWXT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnw/ZhouXX09, author = {Zaihong Zhou and Dongqing Xie and Wei Xiong}, title = {A Novel Distributed Detection Scheme against DDoS Attack}, journal = {J. Networks}, volume = {4}, number = {9}, pages = {921--928}, year = {2009}, url = {https://doi.org/10.4304/jnw.4.9.921-928}, doi = {10.4304/JNW.4.9.921-928}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/ZhouXX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GaoWXT09, author = {Chong{-}zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang}, editor = {Marc Fischlin}, title = {Divisible On-Line/Off-Line Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {148--163}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_10}, doi = {10.1007/978-3-642-00862-7\_10}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/GaoWXT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sersc-isa/ZhaoXZGZ09, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Chong{-}zhi Gao and Jingwei Zhang}, editor = {Jong Hyuk Park and Hsiao{-}Hwa Chen and Mohammed Atiquzzaman and Changhoon Lee and Tai{-}Hoon Kim and Sang{-}Soo Yeo}, title = {Improved Implementations of Cryptosystems Based on Tate Pairing}, booktitle = {Advances in Information Security and Assurance, Third International Conference and Workshops, {ISA} 2009, Seoul, Korea, June 25-27, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5576}, pages = {145--151}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02617-1\_15}, doi = {10.1007/978-3-642-02617-1\_15}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sersc-isa/ZhaoXZGZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/XiongXZL08, author = {Wei Xiong and Dongqing Xie and Zaihong Zhou and Jie Liu}, title = {Decreasing System Load by Caching in Structured {P2P} Systems}, booktitle = {10th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2008, 25-27 Sept. 2008, Dalian, China}, pages = {234--241}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/HPCC.2008.112}, doi = {10.1109/HPCC.2008.112}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/XiongXZL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icycs/WuXW08, author = {Diwen Wu and Dongqing Xie and Lupeng Wang}, title = {A Deployment Algorithm to Achieve both Connectivity and Coverage in Grid Sensor Networks}, booktitle = {Proceedings of the 9th International Conference for Young Computer Scientists, {ICYCS} 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008}, pages = {522--526}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICYCS.2008.120}, doi = {10.1109/ICYCS.2008.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icycs/WuXW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoXZZC08, author = {Changan Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Binglong Chen}, title = {Computing Bilinear Pairings on Elliptic Curves with Automorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {209}, year = {2008}, url = {http://eprint.iacr.org/2008/209}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoXZZC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhaoZX08, author = {Changan Zhao and Fangguo Zhang and Dongqing Xie}, title = {Reducing the Complexity of the Weil Pairing Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {212}, year = {2008}, url = {http://eprint.iacr.org/2008/212}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhaoZX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaoWXT08, author = {Chong{-}zhi Gao and Baodian Wei and Dongqing Xie and Chunming Tang}, title = {Divisible On-line/Off-line Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2008}, url = {http://eprint.iacr.org/2008/447}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GaoWXT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcst/GaoWX07, author = {Wei Gao and Xueli Wang and Dongqing Xie}, title = {Chameleon Hashes Without Key Exposure Based on Factoring}, journal = {J. Comput. Sci. Technol.}, volume = {22}, number = {1}, pages = {109--113}, year = {2007}, url = {https://doi.org/10.1007/s11390-007-9015-9}, doi = {10.1007/S11390-007-9015-9}, timestamp = {Sat, 09 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcst/GaoWX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adhoc-now/WuX07, author = {Diwen Wu and Dongqing Xie}, editor = {Evangelos Kranakis and Jaroslav Opatrny}, title = {The Analysis of Fault Tolerance in Triangular Topology Sensor Networks}, booktitle = {Ad-Hoc, Mobile, and Wireless Networks, 6th International Conference, {ADHOC-NOW} 2007, Morelia, Mexico, September 24-26, 2007, Proceeedings}, series = {Lecture Notes in Computer Science}, volume = {4686}, pages = {248--261}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74823-6\_19}, doi = {10.1007/978-3-540-74823-6\_19}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/adhoc-now/WuX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/XieZ06, author = {Dongqing Xie and Han Zhou}, title = {A Probabilistic Certificate Updating Protocol for {MANET}}, booktitle = {20th International Conference on Advanced Information Networking and Applications {(AINA} 2006), 18-20 April 2006, Vienna, Austria}, pages = {147--154}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/AINA.2006.49}, doi = {10.1109/AINA.2006.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/XieZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/GaoWWX06, author = {Wei Gao and Guilin Wang and Xueli Wang and Dongqing Xie}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Controllable Ring Signatures}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_1}, doi = {10.1007/978-3-540-71093-6\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/GaoWWX06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ErisaniaD05, author = {Kibaya Erisania and Dongqing Xie}, editor = {Hamid R. Arabnia}, title = {Designing a Secure Trust Intermediary Service {(STIS)} for Web Services: a WS-Trust Approach}, booktitle = {Proceedings of The 2005 International Conference on Security and Management, {SAM} 2005, Las Vegas, Nevada, USA, June 20-23, 2005}, pages = {201--207}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Sat, 27 Aug 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/ErisaniaD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.