default search action
Dong Xie 0005
Person information
- unicode name: 谢冬
- affiliation: Anhui Normal University, Wuhu, Anhui, China
- affiliation (former): Beijing University of Posts and Telecommunications, Beijing, China
Other persons with the same name
- Dong Xie — disambiguation page
- Dong Xie 0001 — Pennsylvania State University, PA, USA (and 2 more)
- Dong Xie 0002 — Hunan University of Humanities, Science and Technology
- Dong Xie 0003 — IBM China Research Lab
- Dong Xie 0004 — Hunan University, College of Mathematics and Econometrics, Changsha, China (and 1 more)
- Dong Xie 0006 — Guilin University of Aerospace Technology, Guilin, Guangxi, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Qiong Zhang, Taochun Wang, Yuan Tao, Nuo Xu, Fulong Chen, Dong Xie:
Location privacy protection method based on differential privacy in crowdsensing task allocation. Ad Hoc Networks 158: 103464 (2024) - [j29]Taochun Wang, Qingshan Wu, Jian Chen, Fulong Chen, Dong Xie, Huimin Shen:
Health data security sharing method based on hybrid blockchain. Future Gener. Comput. Syst. 153: 251-261 (2024) - [j28]Dong Xie, Yibo Zhang, Zebang Hu, Taochun Wang, Fulong Chen, Peng Hu:
Detect-TPE: A New Framework for Ideal Thumbnail-Preserving Encryption via Face Detection. IEEE Internet Things J. 11(21): 35282-35291 (2024) - [j27]Taochun Wang, Nuo Xu, Qiong Zhang, Fulong Chen, Dong Xie, Chuanxin Zhao:
A lightweight privacy-preserving truth discovery in mobile crowdsensing systems. J. Inf. Secur. Appl. 83: 103792 (2024) - [j26]Bin Wu, Dong Xie, Fulong Chen, Huijun Zhu, Xueli Wang, Yangyang Zeng:
Compressed sensing based visually secure multi-secret image encryption-sharing scheme. Multim. Tools Appl. 83(7): 18919-18941 (2024) - [j25]Nana Ren, Guihua Cheng, Dong Xie, Fulong Chen, Boyu Li:
A double-embedding hidden image encryption and authentication scheme based on compressed sensing and double random phase encoding. Multim. Tools Appl. 83(11): 31417-31442 (2024) - [j24]Dong Xie, Jinghua Yang, Bin Wu, Weixin Bian, Fulong Chen, Taochun Wang:
An Effectively Applicable to Resource Constrained Devices and Semi-Trusted Servers Authenticated Key Agreement Scheme. IEEE Trans. Inf. Forensics Secur. 19: 3451-3464 (2024) - [j23]Peng Hu, Xixi Chu, Kaizhong Zuo, Tianjiao Ni, Dong Xie, Zhangyi Shen, Fulong Chen, Yonglong Luo:
Security-Enhanced Data Sharing Scheme With Location Privacy Preservation for Internet of Vehicles. IEEE Trans. Veh. Technol. 73(9): 13751-13764 (2024) - 2023
- [j22]Dong Xie, Huijun Zhu, Fulong Chen, Bin Wu, Jinghua Yang:
A compressed sensing-based progressive secret image sharing scheme and security analysis. Digit. Signal Process. 143: 104273 (2023) - [j21]Taochun Wang, Huimin Shen, Jian Chen, Fulong Chen, Qingshan Wu, Dong Xie:
A hybrid blockchain-based identity authentication scheme for Mobile Crowd Sensing. Future Gener. Comput. Syst. 143: 40-50 (2023) - [j20]Dong Xie, Jinghua Yang, Weixin Bian, Fulong Chen, Taochun Wang:
An Improved Identity-Based Anonymous Authentication Scheme Resistant to Semi-Trusted Server Attacks. IEEE Internet Things J. 10(1): 734-746 (2023) - [j19]Shuwan Sun, Weixin Bian, Dong Xie, Deqin Xu, Yi Huang:
Lightweight and privacy-preserving multi-server authentication scheme based on PUF and biometrics. J. Intell. Fuzzy Syst. 45(1): 911-928 (2023) - [j18]Dong Xie, Yibo Zhang, Zebang Hu, Fulong Chen, Taochun Wang:
ESTPE: An efficient and stable thumbnail-preserving encryption scheme. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101815 (2023) - [j17]Dong Xie, Bin Wu, Fulong Chen, Taochun Wang, Zebang Hu, Yibo Zhang:
A low-overhead compressed sensing-driven multi-party secret image sharing scheme. Multim. Syst. 29(3): 1187-1202 (2023) - 2022
- [j16]Bin Wu, Dong Xie, Fulong Chen, Xueli Wang, Yangyang Zeng:
A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing. Digit. Signal Process. 123: 103391 (2022) - [j15]Xueli Wang, Dong Xie, Fulong Chen, Huijun Zhu, Taochun Wang:
PHISS: Progressive and hierarchical image segmentation-sharing scheme. Digit. Signal Process. 129: 103640 (2022) - [j14]Xueli Wang, Dong Xie, Fulong Chen, Bin Wu, Yangyang Zeng:
Progressive and multi-level secret image sharing scheme with hierarchical shadows. Multim. Tools Appl. 81(21): 31039-31059 (2022) - [j13]Fulong Chen, Yuqing Tang, Canlin Wang, Jing Huang, Cheng Huang, Dong Xie, Taochun Wang, Chuanxin Zhao:
Medical Cyber-Physical Systems: A Solution to Smart Health and the State of the Art. IEEE Trans. Comput. Soc. Syst. 9(5): 1359-1386 (2022) - 2021
- [j12]Huijun Zhu, Licheng Wang, Haseeb Ahmad, Dong Xie:
Pairing-Free for Public Key Encryption With Equality Test Scheme. IEEE Access 9: 77239-77249 (2021) - [j11]Fulong Chen, Yuqing Tang, Xu Cheng, Dong Xie, Taochun Wang, Chuanxin Zhao:
Blockchain-Based Efficient Device Authentication Protocol for Medical Cyber-Physical Systems. Secur. Commun. Networks 2021: 5580939:1-5580939:13 (2021) - 2020
- [j10]Xu Cheng, Fulong Chen, Dong Xie, Hui Sun, Cheng Huang:
Design of a Secure Medical Data Sharing Scheme Based on Blockchain. J. Medical Syst. 44(2): 52 (2020) - [j9]Hong Shu, Ping Qi, Yongqing Huang, Fulong Chen, Dong Xie, Liping Sun:
An Efficient Certificateless Aggregate Signature Scheme for Blockchain-Based Medical Cyber Physical Systems. Sensors 20(5): 1521 (2020)
2010 – 2019
- 2019
- [j8]Dong Xie:
Public Key Image Encryption Based on Compressed Sensing. IEEE Access 7: 131672-131680 (2019) - [j7]Dong Xie, Fulong Chen, Yonglong Luo, Lixiang Li:
One-to-many image encryption with privacy-preserving homomorphic outsourced decryption based on compressed sensing. Digit. Signal Process. 95 (2019) - [j6]Hong Shu, Fulong Chen, Dong Xie, Liping Sun, Ping Qi, Yongqing Huang:
An Aggregate Signature Scheme Based on a Trapdoor Hash Function for the Internet of Things. Sensors 19(19): 4239 (2019) - [c2]Hong Shu, Fulong Chen, Dong Xie, Ping Qi, Yongqing Huang:
A Certificateless Aggregate Signature Scheme Based on Blockchain for EMR. CSS (1) 2019: 437-443 - [c1]Xu Cheng, Fulong Chen, Dong Xie, Hui Sun, Cheng Huang, Zhuyun Qi:
Blockchain-Based Secure Authentication Scheme for Medical Data Sharing. ICPCSEE (1) 2019: 396-411 - 2017
- [j5]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Homomorphic Signatures from Chameleon Hash Functions. Inf. Technol. Control. 46(2): 274-286 (2017) - 2016
- [j4]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Semi-tensor compressed sensing. Digit. Signal Process. 58: 85-92 (2016) - [j3]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Efficient Post-Quantum Secure Network Coding Signatures in the Standard Model. KSII Trans. Internet Inf. Syst. 10(5): 2427-2445 (2016) - [j2]Dong Xie, Haipeng Peng, Lixiang Li, Yixian Yang:
Short lattice signatures with constant-size public keys. Secur. Commun. Networks 9(18): 5490-5501 (2016) - 2015
- [j1]Yanrong Lu, Lixiang Li, Haipeng Peng, Dong Xie, Yixian Yang:
Robust and Efficient Biometrics Based Password Authentication Scheme for Telecare Medicine Information Systems Using Extended Chaotic Maps. J. Medical Syst. 39(6): 65:1-65:10 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint