default search action
Ningning Cui
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Shuaiqiang Gao, Yunliang Chen, Ningning Cui, Wenjian Qin:
Enhancing object detection in low-resolution images via frequency domain learning. Array 22: 100342 (2024) - [j15]Tongshuai Wu, Liwei Chen, Gewangzi Du, Chenguang Zhu, Ningning Cui, Gang Shi:
CDNM: Clustering-Based Data Normalization Method For Automated Vulnerability Detection. Comput. J. 67(4): 1538-1549 (2024) - [j14]Yunliang Chen, Tianyu Xie, Haofeng Chen, Xiaohui Huang, Ningning Cui, Jianxin Li:
KGCF: Social relationship-aware graph collaborative filtering for recommendation. Inf. Sci. 680: 121102 (2024) - [j13]Mo Li, Renata Borovica-Gajic, Farhana Murtaza Choudhury, Ningning Cui, Linlin Ding:
Maximal size constraint community search over bipartite graphs. Knowl. Based Syst. 297: 111961 (2024) - [j12]Taotao Cai, Qi Lei, Quan Z. Sheng, Ningning Cui, Shuiqiao Yang, Jian Yang, Wei Emma Zhang, Adnan Mahmood:
Reconnecting the Estranged Relationships: Optimizing the Influence Propagation in Evolving Networks. IEEE Trans. Knowl. Data Eng. 36(5): 2151-2165 (2024) - [j11]Ningning Cui, Dong Wang, Jianxin Li, Huaijie Zhu, Xiaochun Yang, Jianliang Xu, Jie Cui, Hong Zhong:
Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains. IEEE Trans. Knowl. Data Eng. 36(6): 2445-2460 (2024) - [c16]Ningning Cui, Dong Wang, Jianxin Li, Huaijie Zhu, Xiaochun Yang, Jianliang Xu, Jie Cui, Hong Zhong:
Enabling Efficient, Verifiable, and Secure Conjunctive Keyword Search in Hybrid-Storage Blockchains. ICDE 2024: 5699-5700 - [i1]Taige Zhao, Jianxin Li, Ningning Cui, Wei Luo:
Effective Individual Fairest Community Search over Heterogeneous Information Networks. CoRR abs/2404.12107 (2024) - 2023
- [j10]Xiaofan Nie, Liwei Chen, Haolai Wei, Yuantong Zhang, Ningning Cui, Gang Shi:
KPDFI: Efficient data flow integrity based on key property against data corruption attack. Comput. Secur. 128: 103183 (2023) - [j9]Ningning Cui, Kang Qian, Taotao Cai, Jianxin Li, Xiaochun Yang, Jie Cui, Hong Zhong:
Towards Multi-User, Secure, and Verifiable $k$NN Query in Cloud Database. IEEE Trans. Knowl. Data Eng. 35(9): 9333-9349 (2023) - [j8]Yuliang Ma, Ningning Cui, Zhong-Zhong Jiang, Ye Yuan, Guoren Wang:
Group homophily based facility location selection in geo-social networks. World Wide Web (WWW) 26(1): 33-53 (2023) - [j7]Dazhao Xu, Yunliang Chen, Ningning Cui, Jianxin Li:
Towards multi-dimensional knowledge-aware approach for effective community detection in LBSN. World Wide Web (WWW) 26(4): 1435-1458 (2023) - [c15]Gewangzi Du, Liwei Chen, Tongshuai Wu, Xiong Zheng, Ningning Cui, Gang Shi:
Cross Domain on Snippets: BiLSTM-TextCNN based Vulnerability Detection with Domain Adaptation. CSCWD 2023: 1896-1901 - [c14]Chenguang Zhu, Tongshuai Wu, Ningning Cui, Xiong Zheng, Liwei Chen, Gang Shi:
Code Property Graph based Vulnerability Type Identification with Fusion Representation. CSCWD 2023: 1908-1913 - [c13]Ningning Cui, Zheli Deng, Man Li, Yuliang Ma, Jie Cui, Hong Zhong:
Authenticated Ranked Keyword Search over Encrypted Data with Strong Privacy Guarantee. DASFAA (1) 2023: 644-660 - [c12]Huaijie Zhu, Wei Liu, Jian Yin, Ningning Cui, Jianliang Xu, Xin Huang, Wang-Chien Lee:
Keyword-based Socially Tenuous Group Queries. ICDE 2023: 965-977 - [c11]Ningning Cui, Liwei Chen, Gang Shi:
BVSNO: Binary Code Vulnerability Detection Based on Slice Semantic and Node Order. ISCC 2023: 373-379 - [e5]Xiaochun Yang, Heru Suhartanto, Guoren Wang, Bin Wang, Jing Jiang, Bing Li, Huaijie Zhu, Ningning Cui:
Advanced Data Mining and Applications - 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14176, Springer 2023, ISBN 978-3-031-46660-1 [contents] - [e4]Xiaochun Yang, Heru Suhartanto, Guoren Wang, Bin Wang, Jing Jiang, Bing Li, Huaijie Zhu, Ningning Cui:
Advanced Data Mining and Applications - 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14177, Springer 2023, ISBN 978-3-031-46663-2 [contents] - [e3]Xiaochun Yang, Heru Suhartanto, Guoren Wang, Bin Wang, Jing Jiang, Bing Li, Huaijie Zhu, Ningning Cui:
Advanced Data Mining and Applications - 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14178, Springer 2023, ISBN 978-3-031-46670-0 [contents] - [e2]Xiaochun Yang, Heru Suhartanto, Guoren Wang, Bin Wang, Jing Jiang, Bing Li, Huaijie Zhu, Ningning Cui:
Advanced Data Mining and Applications - 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14179, Springer 2023, ISBN 978-3-031-46673-1 [contents] - [e1]Xiaochun Yang, Heru Suhartanto, Guoren Wang, Bin Wang, Jing Jiang, Bing Li, Huaijie Zhu, Ningning Cui:
Advanced Data Mining and Applications - 19th International Conference, ADMA 2023, Shenyang, China, August 21-23, 2023, Proceedings, Part V. Lecture Notes in Computer Science 14180, Springer 2023, ISBN 978-3-031-46676-2 [contents] - 2022
- [j6]Na Li, Huaijie Zhu, Wenhao Lu, Ningning Cui, Wei Liu, Jian Yin, Jianliang Xu, Wang-Chien Lee:
The most tenuous group query. Frontiers Comput. Sci. 17(2): 172605 (2022) - [j5]Ningning Cui, Xiaochun Yang, Yunliang Chen, Jianxin Li, Bin Wang, Geyong Min:
Secure Boolean Spatial Keyword Query With Lightweight Access Control in Cloud Environments. IEEE Internet Things J. 9(12): 9503-9514 (2022) - [j4]Hao Liu, Yunliang Chen, Ningning Cui, Dazhao Xu, Jianxin Li:
An Effective Data Fusion Model for Detecting the Risk of Transmission Line in Smart Grid. IEEE Internet Things J. 9(22): 22256-22266 (2022) - [c10]Tongshuai Wu, Liwei Chen, Gewangzi Du, Chenguang Zhu, Ningning Cui, Gang Shi:
Inductive Vulnerability Detection via Gated Graph Neural Network. CSCWD 2022: 519-524 - [c9]Ningning Cui, Liwei Chen, Gewangzi Du, Tongshuai Wu, Chenguang Zhu, Gang Shi:
BHMVD: Binary Code-based Hybrid Neural Network for Multiclass Vulnerability Detection. ISPA/BDCloud/SocialCom/SustainCom 2022: 238-245 - [c8]Aibin Yan, Kuikui Qian, Jie Cui, Ningning Cui, Zhengfeng Huang, Xiaoqing Wen, Patrick Girard:
A Highly Reliable and Low Power RHBD Flip-Flop Cell for Aerospace Applications. VTS 2022: 1-6 - [c7]Chenguang Zhu, Gewangzi Du, Tongshuai Wu, Ningning Cui, Liwei Chen, Gang Shi:
BERT-Based Vulnerability Type Identification with Effective Program Representation. WASA (1) 2022: 271-282 - 2021
- [j3]Weidong Fang, Ningning Cui, Wei Chen, Wuxiong Zhang, Yunliang Chen:
A Trust-Based Security System for Data Collection in Smart City. IEEE Trans. Ind. Informatics 17(6): 4131-4140 (2021) - [c6]Aibin Yan, Zijie Zhai, Lele Wang, Jixiang Zhang, Ningning Cui, Tianming Ni, Xiaoqing Wen:
Parallel DICE Cells and Dual-Level CEs based 3-Node-Upset Tolerant Latch Design for Highly Robust Computing. ITC-Asia 2021: 1-5 - [c5]Aibin Yan, Kuikui Qian, Jie Cui, Ningning Cui, Tianming Ni, Zhengfeng Huang, Xiaoqing Wen:
A Sextuple Cross-Coupled Dual-Interlocked-Storage-Cell based Multiple-Node-Upset Self-Recoverable Latch. NANOARCH 2021: 1-6 - 2020
- [j2]Taige Zhao, Ningning Cui, Yunliang Chen, Man Li:
Efficient Strategy Mining for Football Social Network. Complex. 2020: 8823189:1-8823189:11 (2020) - [j1]Ningning Cui, Xiaochun Yang, Bin Wang, Jing Geng, Jianxin Li:
Secure range query over encrypted data in outsourced environments. World Wide Web 23(1): 491-517 (2020) - [c4]Ningning Cui, Xiaochun Yang, Bin Wang, Jianxin Li, Guoren Wang:
SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform*. ICDE 2020: 253-264
2010 – 2019
- 2019
- [c3]Ningning Cui, Jianxin Li, Xiaochun Yang, Bin Wang, Mark Reynolds, Yong Xiang:
When Geo-Text Meets Security: Privacy-Preserving Boolean Spatial Keyword Queries. ICDE 2019: 1046-1057 - 2018
- [c2]Ningning Cui, Xiaochun Yang, Leixia Wang, Bin Wang, Jianxin Li:
Secure Range Query over Encrypted Data in Outsourced Environments. DASFAA (2) 2018: 112-129 - 2016
- [c1]Ningning Cui, Xiaochun Yang, Bin Wang:
A Novel Spatial Cloaking Scheme Using Hierarchical Hilbert Curve for Location-Based Services. WAIM (2) 2016: 15-27
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint