default search action
Mande Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j50]Mande Xie, Xiangquan Su, Hao Sun, Guoping Zhang:
Online task offloading algorithm based on multi-objective optimization caching strategy. Comput. Networks 245: 110400 (2024) - [j49]Mande Xie, Jiefeng Ye, Guoping Zhang, Xueping Ni:
Deep Reinforcement Learning-based computation offloading and distributed edge service caching for Mobile Edge Computing. Comput. Networks 250: 110564 (2024) - [j48]Mande Xie, Xuekang Yang, Haibo Hong, Guiyi Wei, Zhen Zhang:
A novel verifiable chinese multi-keyword fuzzy rank searchable encryption scheme in cloud environments. Future Gener. Comput. Syst. 153: 287-300 (2024) - [j47]Run Liu, Mande Xie, Anfeng Liu, Houbing Song:
Joint Optimization Risk Factor and Energy Consumption in IoT Networks With TinyML-Enabled Internet of UAVs. IEEE Internet Things J. 11(12): 20983-20994 (2024) - [j46]Chen Chen, Haibo Hong, Tao Xiang, Mande Xie:
Anti-Backdoor Model: A Novel Algorithm to Remove Backdoors in a Non-Invasive Way. IEEE Trans. Inf. Forensics Secur. 19: 7420-7434 (2024) - 2023
- [j45]Yafeng Zhang, Hao Sun, Mande Xie, Zhe Feng, Zuheng Wu:
Enhancing Robustness of Memristor Crossbar-Based Spiking Neural Networks against Nonidealities: A Hybrid Approach for Neuromorphic Computing in Noisy Environments. Adv. Intell. Syst. 5(11) (2023) - [j44]Linghe Zhu, Haibo Hong, Mande Xie, Jun Yu:
DLPM: A dynamic location protection mechanism supporting continuous queries. Concurr. Comput. Pract. Exp. 35(19) (2023) - 2022
- [j43]Haibo Hong, Jun Shao, Licheng Wang, Mande Xie, Guiyi Wei, Yixian Yang, Song Han, Jianhong Lin:
A CCA secure public key encryption scheme based on finite groups of Lie type. Sci. China Inf. Sci. 65(1) (2022) - [j42]Mande Xie, Qiting Zhao, Haibo Hong, Chen Chen, Jun Yu:
A novel blockchain-based and proxy-oriented public audit scheme for low performance terminal devices. J. Parallel Distributed Comput. 169: 58-71 (2022) - [j41]Tian Wang, Yan Liu, Xi Zheng, Hong-Ning Dai, Weijia Jia, Mande Xie:
Edge-Based Communication Optimization for Distributed Federated Learning. IEEE Trans. Netw. Sci. Eng. 9(4): 2015-2024 (2022) - 2021
- [j40]Fufang Li, Guosheng Huang, Quan Yang, Mande Xie:
Adaptive Contention Window MAC Protocol in a Global View for Emerging Trends Networks. IEEE Access 9: 18402-18423 (2021) - [j39]Mande Xie, Yingying Ruan, Haibo Hong, Jun Shao:
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices. Future Gener. Comput. Syst. 121: 114-122 (2021) - [j38]Changqin Huang, Guosheng Huang, Wei Liu, Ruoyu Wang, Mande Xie:
A parallel joint optimized relay selection protocol for wake-up radio enabled WSNs. Phys. Commun. 47: 101320 (2021) - 2020
- [j37]Ang Li, Wei Liu, Shaobo Zhang, Mande Xie:
Fast Multicast With Adjusting Transmission Power and Active Slots in Software Define IoT. IEEE Access 8: 226352-226369 (2020) - [j36]Tian Wang, Guangxue Zhang, Md. Zakirul Alam Bhuiyan, Anfeng Liu, Weijia Jia, Mande Xie:
A novel trust mechanism based on Fog Computing in Sensor-Cloud System. Future Gener. Comput. Syst. 109: 573-582 (2020) - [j35]Tian Wang, Yaxin Mei, Weijia Jia, Xi Zheng, Guojun Wang, Mande Xie:
Edge-based differential privacy computing for sensor-cloud systems. J. Parallel Distributed Comput. 136: 75-85 (2020) - [j34]Tian Wang, Hao Luo, Weijia Jia, Anfeng Liu, Mande Xie:
MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(3): 2054-2062 (2020) - [j33]Tian Wang, Pan Wang, Shaobin Cai, Ying Ma, Anfeng Liu, Mande Xie:
A Unified Trustworthy Environment Establishment Based on Edge Computing in Industrial IoT. IEEE Trans. Ind. Informatics 16(9): 6083-6091 (2020) - [j32]Tian Wang, Zhihan Cao, Shuo Wang, Jianhuang Wang, Lianyong Qi, Anfeng Liu, Mande Xie, Xiaolong Li:
Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles. IEEE Trans. Ind. Informatics 16(10): 6663-6672 (2020) - 2019
- [j31]Feihu Wang, Wei Liu, Tian Wang, Ming Zhao, Mande Xie, Houbing Song, Xiong Li, Anfeng Liu:
To Reduce Delay, Energy Consumption and Collision through Optimization Duty-Cycle and Size of Forwarding Node Set in WSNs. IEEE Access 7: 55983-56015 (2019) - [j30]Jiawei Tan, Wei Liu, Tian Wang, Shaobo Zhang, Anfeng Liu, Mande Xie, Ming Ma, Ming Zhao:
An Efficient Information Maximization Based Adaptive Congestion Control Scheme in Wireless Sensor Network. IEEE Access 7: 64878-64896 (2019) - [j29]Qiang Wang, Wei Liu, Tian Wang, Ming Zhao, Xiong Li, Mande Xie, Ming Ma, Guoping Zhang, Anfeng Liu:
Reducing Delay and Maximizing Lifetime for Wireless Sensor Networks With Dynamic Traffic Patterns. IEEE Access 7: 70212-70236 (2019) - [j28]Mingfeng Huang, Wei Liu, Tian Wang, Qingyong Deng, Anfeng Liu, Mande Xie, Ming Ma, Guoping Zhang:
A Game-Based Economic Model for Price Decision Making in Cyber-Physical-Social Systems. IEEE Access 7: 111559-111576 (2019) - [j27]Shu Han, Mande Xie, Bailin Yang, Rongxing Lu, Haiyong Bao, Jianhong Lin, Haibo Hong, Mianxue Gu, Song Han:
A Certificateless Verifiable Strong Designated Verifier Signature Scheme. IEEE Access 7: 126391-126408 (2019) - [j26]Haibo Hong, Licheng Wang, Jun Shao, Jianhua Yan, Haseeb Ahmad, Guiyi Wei, Mande Xie, Yixian Yang:
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type. Comput. J. 62(12): 1840-1848 (2019) - [j25]Jiawei Tan, Wei Liu, Mande Xie, Houbing Song, Anfeng Liu, Ming Zhao, Guoping Zhang:
A low redundancy data collection scheme to maximize lifetime using matrix completion technique. EURASIP J. Wirel. Commun. Netw. 2019: 5 (2019) - [j24]Xuemei Xiang, Wei Liu, Tian Wang, Mande Xie, Xiong Li, Houbing Song, Anfeng Liu, Guoping Zhang:
Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT. EURASIP J. Wirel. Commun. Netw. 2019: 168 (2019) - [j23]Tian Wang, Yuzhu Liang, Weijia Jia, Muhammad Arif, Anfeng Liu, Mande Xie:
Coupling resource management based on fog computing in smart city systems. J. Netw. Comput. Appl. 135: 11-19 (2019) - [j22]Lang Hu, Anfeng Liu, Mande Xie, Tian Wang:
UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City. Peer-to-Peer Netw. Appl. 12(6): 1550-1574 (2019) - [j21]Qiaoyan Li, Anfeng Liu, Tian Wang, Mande Xie, Neal N. Xiong:
Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications. Peer-to-Peer Netw. Appl. 12(6): 1673-1704 (2019) - [j20]Tian Wang, Yucheng Lu, Zhihan Cao, Lei Shu, Xi Zheng, Anfeng Liu, Mande Xie:
When Sensor-Cloud Meets Mobile Edge Computing. Sensors 19(23): 5324 (2019) - [j19]Tian Wang, Hao Luo, Xi Zheng, Mande Xie:
Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing. ACM Trans. Intell. Syst. Technol. 10(6): 62:1-62:19 (2019) - 2018
- [j18]Tian Wang, Jiandian Zeng, Md. Zakirul Alam Bhuiyan, Yonghong Chen, Yiqiao Cai, Hui Tian, Mande Xie:
Energy-efficient relay tracking with multiple mobile camera sensors. Comput. Networks 133: 130-140 (2018) - [j17]Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
CCA-secure ABE with outsourced decryption for fog computing. Future Gener. Comput. Syst. 78: 730-738 (2018) - [j16]Tian Wang, Jiyuan Zhou, Minzhe Huang, Md. Zakirul Alam Bhuiyan, Anfeng Liu, Wenzheng Xu, Mande Xie:
Fog-based storage technology to fight with cyber threat. Future Gener. Comput. Syst. 83: 208-218 (2018) - [j15]Yunguo Guan, Jun Shao, Guiyi Wei, Mande Xie:
Data Security and Privacy in Fog Computing. IEEE Netw. 32(5): 106-111 (2018) - [j14]Xujing Li, Anfeng Liu, Mande Xie, Neal N. Xiong, Zhiwen Zeng, Zhiping Cai:
Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks. Sensors 18(4): 1216 (2018) - [j13]Xujing Li, Wei Liu, Mande Xie, Anfeng Liu, Ming Zhao, Neal N. Xiong, Miao Zhao, Wan Dai:
Differentiated Data Aggregation Routing Scheme for Energy Conserving and Delay Sensitive Wireless Sensor Networks. Sensors 18(7): 2349 (2018) - 2017
- [j12]Mande Xie, Urmila Bhanja, Jun Shao, Guoping Zhang, Guiyi Wei:
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants. Inf. Sci. 420: 37-48 (2017) - 2016
- [j11]Yong Deng, Guiyi Wei, Mande Xie, Jun Shao:
Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications. Mob. Inf. Syst. 2016: 8686945:1-8686945:10 (2016) - 2015
- [j10]Mande Xie, Urmila Bhanja, Guoping Zhang, Guiyi Wei, Yun Ling:
Social role-based secure large data objects dissemination in mobile sensing environment. Comput. Commun. 65: 27-34 (2015) - [j9]Mande Xie, Urmila Bhanja, Guiyi Wei, Yun Ling, Mohammad Mehedi Hassan, Atif Alamri:
SecNRCC: a loss-tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks. Concurr. Comput. Pract. Exp. 27(10): 2668-2680 (2015) - [j8]Xiaogang Qi, Lifang Liu, Gengzhong Zheng, Mande Xie:
An Adaptive Aggregation Scheduling Algorithm Based on the Grid Partition in Large-Scale Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 283209:1-283209:9 (2015) - 2014
- [j7]Lifang Liu, Xiaogang Qi, Jilong Xue, Mande Xie:
A Topology Construct and Control Model with Small-World and Scale-Free Concepts for Heterogeneous Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j6]Xiaogang Qi, Peng Wei, Lifang Liu, Mande Xie, Guoyong Cai:
Wireless Sensor Networks Energy Effectively Distributed Target Detection. Int. J. Distributed Sens. Networks 10 (2014) - [j5]Xiaogang Qi, Zhaohui Zhang, Lifang Liu, Mande Xie:
The Degree-Constrained Adaptive Algorithm Based on the Data Aggregation Tree. Int. J. Distributed Sens. Networks 10 (2014) - [j4]Mande Xie:
The Optimal Partition Algorithm for Multiple Video Sequences in Streaming Media System. J. Networks 9(5): 1157-1162 (2014) - 2012
- [j3]Mande Xie, Guiyi Wei, Yujia Ge, Yun Ling:
Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks. Comput. Electr. Eng. 38(1): 116-127 (2012) - 2011
- [j2]Mande Xie, Guoping Zhang:
The Design and Challenges of Online Reprogramming System for Wireless Sensor Networks. J. Digit. Inf. Manag. 9(6): 255-260 (2011) - [j1]Guoping Zhang, Mande Xie:
The Design and Implementation of the Digital Down Converter Based on the Improved DDS and DSPBuilder Techniques. J. Digit. Inf. Manag. 9(6): 281-286 (2011)
Conference and Workshop Papers
- 2023
- [c14]Chen Chen, Haibo Hong, Mande Xie, Jun Shao, Tao Xiang:
Bab: A novel algorithm for training clean model based on poisoned data. SafeAI@AAAI 2023 - 2022
- [c13]Zhihua Hu, Yunzhi Li, Guosong Jiang, Rui Zhang, Mande Xie:
PriHorus: Privacy-Preserving RSS-Based Indoor Positioning. ICC 2022: 5627-5632 - 2021
- [c12]Mande Xie, Qiting Zhao, Haibo Hong:
A Blockchain-Based Proxy Oriented Cloud Storage Public Audit Scheme for Low-Performance Terminal Devices. ICA3PP (1) 2021: 676-692 - [c11]Linghe Zhu, Haibo Hong, Mande Xie:
A Novel Protection Method of Continuous Location Sharing Based on Local Differential Privacy and Conditional Random Field. ICA3PP (1) 2021: 710-725 - 2020
- [c10]Mande Xie, Jifei Hu, Haibo Hong:
Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT. FCS 2020: 3-18 - [c9]Mande Xie, Xiaowei Sheng, Jun Shao, Guoping Zhang, Yingying Ruan:
A User Privacy-Preserving Algorithm in Live Streaming Cloud Platforms. SpaCCS Workshops 2020: 222-232 - [c8]Gangqi Shu, Haibo Hong, Mande Xie, Jun Shao:
A Fuzzy Keywords Enabled Ranked Searchable CP-ABE Scheme for a Public Cloud Environment. SpaCCS Workshops 2020: 357-371 - 2016
- [c7]Cong Zuo, Jun Shao, Guiyi Wei, Mande Xie, Min Ji:
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption. ACISP (1) 2016: 495-508 - 2015
- [c6]Lifang Liu, Xiaogang Qi, Gengzhong Zheng, Mande Xie:
An Energy-Efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network. ICA3PP (Workshops and Symposiums) 2015: 382-392 - 2011
- [c5]Jun Shao, Guiyi Wei, Yun Ling, Mande Xie:
Identity-Based Conditional Proxy Re-Encryption. ICC 2011: 1-5 - [c4]Jun Shao, Guiyi Wei, Yun Ling, Mande Xie:
Unidirectional Identity-Based Proxy Re-Signature. ICC 2011: 1-5 - 2010
- [c3]Yuanyan Gu, Mande Xie:
An Efficient Architecture for Semi-real-Time Graphical Simulation Based on Mobile Computing Devices in Wireless WMS system. APWCS 2010: 387-390 - 2009
- [c2]Guiyi Wei, Mande Xie, Yuxin Mao, Athanasios V. Vasilakos:
A Budget-Based Cost-Effective Incentive Model. ICPP Workshops 2009: 449-456 - 2008
- [c1]Mande Xie, Yun Ling, Guiyi Wei:
An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping. CSSE (3) 2008: 116-120
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint