Остановите войну!
for scientists:
default search action
Xinxin Niu
- > Home > Persons > Xinxin Niu
Publications
- 2022
- [j57]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A source location privacy protection scheme based on sector phantom routing in WSNs. Int. J. Intell. Syst. 37(2): 1204-1221 (2022) - 2021
- [i1]Yuling Chen, Jing Sun, Yixian Yang, Tao Li, Xinxin Niu, Huiyu Zhou:
PSSPR: A Source Location Privacy Protection Scheme Based on Sector Phantom Routing in WSNs. CoRR abs/2109.13774 (2021) - 2020
- [j51]Wei Tang, Yu-Jun Liu, Yu-Ling Chen, Yi-Xian Yang, Xinxin Niu:
SLBRS: Network Virus Propagation Model based on Safety Entropy. Appl. Soft Comput. 97(Part): 106784 (2020) - [j50]Zhao Dou, Gang Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang, Yu Yang:
Searching for optimal quantum secret sharing scheme based on local distinguishability. Quantum Inf. Process. 19(10): 368 (2020) - 2019
- [j48]Zhen-Zhen Li, Gang Xu, Xiu-Bo Chen, Zhiguo Qu, Xinxin Niu, Yi-Xian Yang:
Efficient quantum state transmission via perfect quantum network coding. Sci. China Inf. Sci. 62(1): 12501:1-12501:14 (2019) - 2018
- [j44]Yulong Gao, Xiu-Bo Chen, Yu-Ling Chen, Ying Sun, Xinxin Niu, Yi-Xian Yang:
A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain. IEEE Access 6: 27205-27213 (2018) - [j43]Yanping Shen, Kangfeng Zheng, Chunhua Wu, Mingwu Zhang, Xinxin Niu, Yixian Yang:
An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection. Comput. J. 61(4): 526-538 (2018) - [j39]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng:
A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing. IEEE Netw. 32(3): 14-19 (2018) - [j38]Yixian Yang, Xinxin Niu, Lixiang Li, Haipeng Peng, Jingfeng Ren, Haochun Qi:
General Theory of security and a study of hacker's behavior in big data era. Peer-to-Peer Netw. Appl. 11(2): 210-219 (2018) - [j37]Zhao Dou, Gang Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang:
Rational protocol of quantum secure multi-party computation. Quantum Inf. Process. 17(8): 199 (2018) - 2017
- [j31]Yanping Xu, Chunhua Wu, Kangfeng Zheng, Xinxin Niu, Yixian Yang:
Fuzzy-synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets. Int. J. Distributed Sens. Networks 13(4) (2017) - [j28]Yixian Yang, Haipeng Peng, Lixiang Li, Xinxin Niu:
General Theory of Security and a Study Case in Internet of Things. IEEE Internet Things J. 4(2): 592-600 (2017) - 2015
- [j18]Jinxia Wei, Ru Zhang, Jianyi Liu, Xinxin Niu, Yixian Yang:
Defense Strategy of Network Security based on Dynamic Classification. KSII Trans. Internet Inf. Syst. 9(12): 5116-5134 (2015) - 2014
- [j17]Jing Li, Licheng Wang, Jianhua Yan, Xinxin Niu, Yixian Yang:
A (k, t, n) Verifiable Multi-secret Sharing Scheme Based on Adversary Structure. KSII Trans. Internet Inf. Syst. 8(12): 4552-4567 (2014) - [j16]Xiubo Chen, Yuan Su, Xinxin Niu, Yixian Yang:
Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. 13(1): 101-112 (2014) - 2013
- [j13]Qinlong Huang, Zhaofeng Ma, Jingyi Fu, Xinxin Niu, Yixian Yang:
Attribute Based DRM Scheme with Efficient Revocation in Cloud Computing. J. Comput. 8(11): 2776-2781 (2013) - [j11]Zhaofeng Ma, Jianqing Huang, Yixian Yang, Xinxin Niu:
Verifiable Threshold Authorization for Scalable and Secure Digital Rights Management. J. Softw. 8(6): 1526-1535 (2013) - [j10]Xiu-Bo Chen, Xinxin Niu, Xinjie Zhou, Yixian Yang:
Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12(1): 365-380 (2013) - [j9]Ying Sun, Shengwei Xu, Xiu-Bo Chen, Xinxin Niu, Yi-Xian Yang:
Expansible quantum secret sharing network. Quantum Inf. Process. 12(8): 2877-2888 (2013) - 2012
- [j7]Mingxing Luo, Xiu-Bo Chen, Yi-Xian Yang, Xinxin Niu:
Experimental architecture of joint remote state preparation. Quantum Inf. Process. 11(3): 751-767 (2012) - 2011
- [j6]Jiafa Mao, Ru Zhang, Xinxin Niu, Yixian Yang, Linna Zhou:
Research of Spatial Domain Image Digital Watermarking Payload. EURASIP J. Inf. Secur. 2011 (2011) - 2010
- [j5]Licheng Wang, Lihua Wang, Zhenfu Cao, Yixian Yang, Xinxin Niu:
Conjugate adjoining problem in braid groups and new design of braid-based signatures. Sci. China Inf. Sci. 53(3): 524-536 (2010) - [j4]Mingxing Luo, Yixian Yang, Licheng Wang, Xinxin Niu:
Secure network coding in the presence of eavesdroppers. Sci. China Inf. Sci. 53(3): 648-658 (2010) - [c17]Chuan-Lun Ren, Xiao-Hui Zuo, Zhong-Xian Li, Xinxin Niu, Yixian Yang:
Towards Hierarchical-User RBAC model. ICMLC 2010: 2870-2874 - [c16]Chengqing Guo, Guoai Xu, Xinxin Niu, Yixian Yang, Yang Li:
A color image watermarking algorithm resistant to print-scan. WCNIS 2010: 518-521 - 2009
- [j3]Jianhong Zhang, Yixian Yang, Xinxin Niu:
A Novel Identity-Based Multi-Signcryption Scheme. Int. J. Distributed Sens. Networks 5(1): 28 (2009) - [c15]Ming Chen, Fan-fan Liu, Ru Zhang, Xinxin Niu, Yixian Yang:
Steganalysis of LSB Matching in Gray Images Based on Regional Correlation Analysis. CSIE (6) 2009: 490-494 - [c14]Zhiguo Qu, Yu Fu, Xinxin Niu, Yixian Yang, Ru Zhang:
Improved EMD Steganography with Great Embedding Rate and High Embedding Efficiency. IIH-MSP 2009: 348-352 - [c13]Jianhong Zhang, Yixian Yang, Xinxin Niu:
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. ISNN (3) 2009: 318-327 - [c12]Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng:
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. ISA 2009: 588-597 - 2008
- [c11]Tianyu Ye, Yu Fu, Zhiguo Qu, Xinxin Niu, Yixian Yang:
Multiplicative Watermark Detection Using Locally Optimum Nonlinearity. IIH-MSP 2008: 481-484 - [c10]Yu Fu, Tianyu Ye, Zhiguo Qu, Xinxin Niu, Yixian Yang:
A Novel Relational Database Watermarking Algorithm for Joint Ownership. IIH-MSP 2008: 985-988 - [c9]Jiao Wang, Yajian Zhou, Yixian Yang, Xinxin Niu:
Classify the Majority of the Total Bytes on the Internet. ISIP 2008: 68-72 - 2007
- [c7]Zhaofeng Ma, Yixian Yang, Xinxin Niu:
Secure and Flexible Digital Rights Management in a Pervasive Usage Mode. CIS 2007: 863-867 - [c6]Lanlan Hu, Yixian Yang, Xinxin Niu:
Improved Remote User Authentication Scheme Preserving User Anonymity. CNSR 2007: 323-328 - [c5]Ming-hui Liu, Xin Yang, Yixian Yang, Xinxin Niu:
Security Mechanism Research of EMV2000. Web Intelligence/IAT Workshops 2007: 307-310 - [c4]Guosheng Xu, Yixian Yang, Lize Gu, Xinxin Niu:
ID-Based Multi-proxy Sequential Signature System from Bilinear Pairing. Web Intelligence/IAT Workshops 2007: 315-318 - [c3]Lanlan Hu, Xinxin Niu, Yixian Yang:
An Efficient Multi-server Password Authenticated Key Agreement Scheme Using Smart Cards. MUE 2007: 903-907 - 2006
- [c2]Nan Jiang, Jian Wang, Xinxin Niu, Yixian Yang:
Symmetric Steganography Secure Against Chosen Message and Original Cover Attacks. ICICIC (3) 2006: 661-664 - [c1]Ming Chen, Ru Zhang, Xinxin Niu, Yixian Yang:
Analysis of Current Steganography Tools: Classifications & Features. IIH-MSP 2006: 384-387 - 2003
- [j2]Wang Tao, Yixian Yang, Xinxin Niu:
New Efficient Timed Commitment Schemes. Int. J. Inf. Technol. Decis. Mak. 2(2): 287-297 (2003) - 1997
- [j1]Yixian Yang, Xinxin Niu, Chengqian Xu:
Counterexample of truncated Costas optical orthogonal codes. IEEE Trans. Commun. 45(6): 640-643 (1997)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-01-20 22:51 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint