​
Login / Signup
Ning Xi
ORCID
Publication Activity (10 Years)
Years Active: 2011-2024
Publications (10 Years): 39
Top Topics
Authentication Protocol
Information Flow
Service Composition
Neural Network
Top Venues
NaNA
Sci. China Inf. Sci.
IEEE Internet Things J.
J. Inf. Sci. Eng.
</>
Publications
</>
Chuang Tian
,
Jianfeng Ma
,
Teng Li
,
Junwei Zhang
,
Chengyan Ma
,
Ning Xi
Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Chengyan Ma
,
Ning Xi
,
Di Lu
,
Yebo Feng
,
Jianfeng Ma
CToMP: a cycle-task-oriented memory protection scheme for unmanned systems.
Sci. China Inf. Sci.
67 (6) (2024)
Chengyan Ma
,
Di Lu
,
Chaoyue Lv
,
Ning Xi
,
Xiaohong Jiang
,
Yulong Shen
,
Jianfeng Ma
BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems.
IEEE Trans. Knowl. Data Eng.
36 (9) (2024)
Xin Liu
,
Ning Xi
,
Ke Cheng
,
Jiaxuan Fu
,
Xinghui Zhu
,
Yulong Shen
,
Jianfeng Ma
Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction.
ICASSP
(2024)
Zhiwei Zhang
,
Zehan Chen
,
Yulong Shen
,
Xuewen Dong
,
Ning Xi
A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles.
IEEE Trans. Veh. Technol.
73 (6) (2024)
Pengbin Feng
,
Le Gai
,
Li Yang
,
Qin Wang
,
Teng Li
,
Ning Xi
,
Jian Feng Ma
DawnGNN: Documentation augmented windows malware detection using graph neural network.
Comput. Secur.
140 (2024)
Ke Cheng
,
Jiaxuan Fu
,
Yulong Shen
,
Haichang Gao
,
Ning Xi
,
Zhiwei Zhang
,
Xinghui Zhu
Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
IEEE Internet Things J.
10 (16) (2023)
Pengbin Feng
,
Li Yang
,
Di Lu
,
Ning Xi
,
Jian-Feng Ma
BejaGNN: behavior-based Java malware detection via graph neural network.
J. Supercomput.
79 (14) (2023)
Jinjin Wang
,
Yizhou Du
,
Xiangyu Wang
,
Chengyan Ma
,
Di Lu
,
Ning Xi
TEE-Assisted Time-Scale Database Management System on IoT devices.
IoT
(2023)
Hui Qiao
,
Xuewen Dong
,
Qi Jiang
,
Siqi Ma
,
Chao Liu
,
Ning Xi
,
Yulong Shen
Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
IEEE Internet Things J.
10 (19) (2023)
Yujuan Cao
,
Zhao Liu
,
Wuhe Axi
,
Dawei Wei
,
Ning Xi
Physical-Sensing Inconsistency Vulnerability Mitigation for Multi-UAV Crowdsensing.
NaNA
(2023)
Dawei Wei
,
Junying Zhang
,
Mohammad Shojafar
,
Saru Kumari
,
Ning Xi
,
Jianfeng Ma
Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET.
IEEE Trans. Intell. Transp. Syst.
24 (11) (2023)
Han Li
,
Zhiwei Zhang
,
Hao Duan
,
Yi He
,
Ning Xi
A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag Data.
NaNA
(2023)
Ke Cheng
,
Ning Xi
,
Ximeng Liu
,
Xinghui Zhu
,
Haichang Gao
,
Zhiwei Zhang
,
Yulong Shen
Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
IEEE Trans. Computers
72 (12) (2023)
Chengyan Ma
,
Ning Xi
,
Di Lu
,
Yebo Feng
,
Jianfeng Ma
CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems.
CoRR
(2023)
Chuang Tian
,
Qi Jiang
,
Teng Li
,
Junwei Zhang
,
Ning Xi
,
Jianfeng Ma
Reliable PUF-based mutual authentication protocol for UAVs towards multi-domain environment.
Comput. Networks
218 (2022)
Dawei Wei
,
Ning Xi
,
Xindi Ma
,
Mohammad Shojafar
,
Saru Kumari
,
Jianfeng Ma
Personalized Privacy-Aware Task Offloading for Edge-Cloud-Assisted Industrial Internet of Things in Automated Manufacturing.
IEEE Trans. Ind. Informatics
18 (11) (2022)
XinDi Ma
,
Cunzhu Su
,
Jianfeng Ma
,
Qi Jiang
,
Ning Xi
,
Sheng Gao
,
Kang Xie
Self-Anomaly-Detection Model Training via Initialized Meta Model.
NaNA
(2022)
Ning Xi
,
Weihui Li
,
Lv Jing
,
Jianfeng Ma
ZAMA: A ZKP-Based Anonymous Mutual Authentication Scheme for the IoV.
IEEE Internet Things J.
9 (22) (2022)
Ning Xi
,
Chao Chen
,
Jun Zhang
,
Cong Sun
,
Shigang Liu
,
Pengbin Feng
,
Jianfeng Ma
Information flow based defensive chain for data leakage detection and prevention: a survey.
CoRR
(2021)
Pengbin Feng
,
Jianfeng Ma
,
Teng Li
,
Xindi Ma
,
Ning Xi
,
Di Lu
Android Malware Detection via Graph Representation Learning.
Mob. Inf. Syst.
2021 (2021)
Dawei Wei
,
Ning Xi
,
Jianfeng Ma
,
Jiayi Li
Protecting Your Offloading Preference: Privacy-aware Online Computation Offloading in Mobile Blockchain.
IWQoS
(2021)
Dawei Wei
,
Ning Xi
,
Jianfeng Ma
,
Lei He
UAV-Assisted Privacy-Preserving Online Computation Offloading for Internet of Things.
Remote. Sens.
13 (23) (2021)
Pengbin Feng
,
Jianfeng Ma
,
Teng Li
,
Xindi Ma
,
Ning Xi
,
Di Lu
Android Malware Detection Based on Call Graph via Graph Neural Network.
NaNA
(2020)
Ning Xi
,
Jing Lv
,
Cong Sun
,
Jianfeng Ma
Secure Service Composition with Quantitative Information Flow Evaluation in Mobile Computing Environments.
Entropy
21 (8) (2019)
Jing Lv
,
Ning Xi
,
Xue Rao
A Fully Anonymous Authentication Scheme Based on Medical Environment.
ICA3PP (1)
(2019)
Xue Rao
,
Ning Xi
,
Jing Lv
,
Pengbin Feng
Compositional Information Flow Verification for Inter Application Communications in Android System.
ML4CS
(2019)
Ning Xi
,
Cong Sun
,
Jianfeng Ma
,
Jing Lv
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds.
TrustCom/BigDataSE
(2019)
Teng Li
,
Jianfeng Ma
,
Cong Sun
,
Ning Xi
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
J. Inf. Sci. Eng.
34 (4) (2018)
Ning Xi
,
Jianfeng Ma
,
Cong Sun
,
Di Lu
,
Yulong Shen
Information flow control on encrypted data for service composition among multiple clouds.
Distributed Parallel Databases
36 (3) (2018)
Tao Zhang
,
Lele Zheng
,
Yongzhi Wang
,
Yulong Shen
,
Ning Xi
,
Jianfeng Ma
,
Jianming Yong
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web
21 (1) (2018)
Ning Xi
,
Cong Sun
,
Di Lu
,
Yulong Shen
Distributed Information Flow Verification on Encrypted Data for Service Composition in Multiple Clouds.
NaNA
(2017)
Ning Xi
,
Di Lu
,
Cong Sun
,
Jianfeng Ma
,
Yulong Shen
Distributed Secure Service Composition with Declassification in Mobile Clouds.
Mob. Inf. Syst.
2017 (2017)
Di Lu
,
Jianfeng Ma
,
Cong Sun
,
Qixuan Wu
,
Zhaochang Sun
,
Ning Xi
Building a Secure Scheme for a Trusted Hardware Sharing Environment.
IEEE Access
5 (2017)
Cong Sun
,
Ning Xi
,
Jianfeng Ma
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition.
COMPSAC (1)
(2017)
Teng Li
,
Jianfeng Ma
,
Cong Sun
,
Dawei Wei
,
Ning Xi
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
NaNA
(2017)
Di Lu
,
Jianfeng Ma
,
Cong Sun
,
XinDi Ma
,
Ning Xi
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing.
Sci. China Inf. Sci.
60 (5) (2017)
XinDi Ma
,
Hui Li
,
Jianfeng Ma
,
Qi Jiang
,
Sheng Gao
,
Ning Xi
,
Di Lu
APPLET: a privacy-preserving framework for location-aware recommender system.
Sci. China Inf. Sci.
60 (9) (2017)
Ning Xi
,
Cong Sun
,
Jianfeng Ma
,
Yulong Shen
,
Di Lu
Distributed Secure Service Composition with Declassification in Mobile Network.
NaNA
(2016)
Ning Xi
,
Cong Sun
,
Jianfeng Ma
,
Yulong Shen
Secure service composition with information flow control in service clouds.
Future Gener. Comput. Syst.
49 (2015)
Cong Sun
,
Ning Xi
,
Jinku Li
,
Qingsong Yao
,
Jianfeng Ma
Verifying Secure Interface Composition for Component-Based System Designs.
APSEC (1)
(2014)
Tao Zhang
,
Jianfeng Ma
,
Ning Xi
,
Ximeng Liu
,
Zhiquan Liu
,
Jinbo Xiong
Trustworthy Service Composition in Service-Oriented Mobile Social Networks.
ICWS
(2014)
Yulong Shen
,
Ning Xi
,
Qingqi Pei
,
Jianfeng Ma
The QoS-Ensured Vertical Handoff Decision in Heterogeneous Wireless Networks.
J. Inf. Sci. Eng.
30 (3) (2014)
Tao Zhang
,
Jianfeng Ma
,
Qi Li
,
Ning Xi
,
Cong Sun
Trust-based service composition in multi-domain environments under time constraint.
Sci. China Inf. Sci.
57 (9) (2014)
Cong Sun
,
Ning Xi
,
Sheng Gao
,
Zhong Chen
,
Jianfeng Ma
Automated enforcement for relaxed information release with reference points.
Sci. China Inf. Sci.
57 (11) (2014)
Di Lu
,
Jianfeng Ma
,
Yichuan Wang
,
Ning Xi
Highly Flexible and Extensible Storage Scheme for Virtualization Platforms under Cloud Computing.
INCoS
(2013)
Ning Xi
,
Jianfeng Ma
,
Cong Sun
,
Tao Zhang
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments.
ICWS
(2013)
Tao Zhang
,
Jianfeng Ma
,
Cong Sun
,
Qi Li
,
Ning Xi
Service Composition in Multi-domain Environment under Time Constraint.
ICWS
(2013)
Ning Xi
,
Jianfeng Ma
,
Cong Sun
,
Yulong Shen
,
Tao Zhang
Distributed Information Flow Verification Framework for the Composition of Service Chain in Wireless Sensor Network.
Int. J. Distributed Sens. Networks
9 (2013)
Yulong Shen
,
Ning Xi
,
Qingqi Pei
,
Jianfeng Ma
,
Yudi Niu
The Wireless Vertical Handoff Decision Algorithm with Parameter Prediction.
INCoS
(2012)
Yulong Shen
,
Xiaowei Dang
,
Min Shu
,
Ning Xi
,
Jianfeng Ma
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks
8 (2012)
Yulong Shen
,
Ning Xi
,
Qingqi Pei
,
Jianfeng Ma
,
Qijian Xu
,
Zuoshun Wu
Distributed Storage Schemes for Controlling Data Availability in Wireless Sensor Networks.
CIS
(2011)
Yulong Shen
,
Qingqi Pei
,
Ning Xi
,
Jianfeng Ma
,
Qijian Xu
,
Hao Yin
HGRP: Hybrid Grid Routing Protocol for Heterogeneous Hierarchical Wireless Networks.
INCoS
(2011)