default search action
Yixin Jiang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Haiting Zhu, Hu Sun, Yixin Jiang, Gaofeng He, Lu Zhang, Yin Lu:
A Sketch-Based Fine-Grained Proportional Integral Queue Management Method. Axioms 12(9): 814 (2024) - [j41]Wei Wang, Yixin Jiang, Jun Hang, Wei Hua, Ming Cheng:
Simplified Phase Model Predictive Voltage Control for Half-Centralized Open-End Winding Permanent-Magnet Motor Systems. IEEE Trans. Ind. Electron. 71(2): 1212-1222 (2024) - [j40]Lingyun Zhou, Wenqiang Pu, Yixin Jiang, Ming-Yi You, Rongqing Zhang, Qingjiang Shi:
Joint Optimization of UAV Deployment and Directional Antenna Orientation for Multi-UAV Cooperative Sensing System. IEEE Trans. Wirel. Commun. 23(10): 14052-14065 (2024) - 2023
- [j39]Tengyue Zhang, Hong Wen, Yixin Jiang, Jie Tang:
Deep-Reinforcement-Learning-Based IRS for Cooperative Jamming Networks Under Edge Computing. IEEE Internet Things J. 10(10): 8996-9006 (2023) - [j38]Zhiwei Chen, Hong Wen, Wenjing Hou, Yixin Jiang, Liang Chen, Runhui Zhao, Xinyu Hou:
Blockchain-Enabled Cross-Layer Radio Frequency Fingerprinting Identification with Machine Learning for IIoT. IEEE Netw. 37(4): 170-178 (2023) - [j37]Yanxu Zhu, Hong Wen, Runhui Zhao, Yixin Jiang, Qiang Liu, Peng Zhang:
Research on Data Poisoning Attack against Smart Grid Cyber-Physical System Based on Edge Computing. Sensors 23(9): 4509 (2023) - [c70]Yixin Jiang, Lingyun Zhou, Yijia Tang, Ya Tu, Chunhong Liu, Qingjiang Shi:
A Collaborative Jamming Algorithm Based on Multi-UAV Scheduling. ICCT 2023: 372-377 - 2022
- [j36]Wei Wang, Yixin Jiang, Le Sun, Zheng Wang, Wei Hua, Ming Cheng:
Phase Model Predictive Voltage Control for Half-Centralized Open-End Winding Permanent-Magnet Linear Motor Traction Systems. IEEE Trans. Ind. Electron. 69(12): 12201-12212 (2022) - [j35]Yixin Jiang, Wei Wang, Zheng Wang, Wei Hua, Ming Cheng:
Four-Vector Phase Model Predictive Voltage Control for Half-Centralized Open-End Winding Permanent-Magnet Linear Motor Systems. IEEE Trans. Veh. Technol. 71(9): 9338-9349 (2022) - 2021
- [c69]Aidong Xu, Tao Wu, Yunan Zhang, Zhiwei Hu, Yixin Jiang:
Graph-Based Time Series Edge Anomaly Detection in Smart Grid. BigDataSecurity 2021: 1-6 - [c68]Wenxin Lei, Wenjing Hou, Aidong Xu, Yixin Jiang, Hong Wen, Yunan Zhang:
A Situational Awareness Model for Edge Computing Devices. CONF-CDS 2021: 51:1-51:5 - [c67]Yixin Jiang, Peng Kong, Hao Xu, Qiang Zhang, Xingwen Quan, Binbin He:
Temporal Mapping of Grassland Aboveground Biomass in Qinghai Province from Landsat 8 and Sentinel-2. IGARSS 2021: 6901-6904 - 2020
- [j34]Wenjing Hou, Yixin Jiang, WenXin Lei, Aidong Xu, Hong Wen, Songling Chen:
A P2P network based edge computing smart grid model for efficient resources coordination. Peer-to-Peer Netw. Appl. 13(3): 1026-1037 (2020) - [j33]FeiYi Xie, Hong Wen, Jinsong Wu, Wenjing Hou, Huanhuan Song, Tengyue Zhang, Runfa Liao, Yixin Jiang:
Data Augmentation for Radio Frequency Fingerprinting via Pseudo-Random Integration. IEEE Trans. Emerg. Top. Comput. Intell. 4(3): 276-286 (2020) - [j32]FeiYi Xie, Hong Wen, Jinsong Wu, Songlin Chen, Wenjing Hou, Yixin Jiang:
Convolution Based Feature Extraction for Edge Computing Access Authentication. IEEE Trans. Netw. Sci. Eng. 7(4): 2336-2346 (2020) - [c66]Aidong Xu, Lin Chen, Xiaoyun Kuang, Huahui Lv, Hang Yang, Yixin Jiang, Bo Li:
A Hybrid Deep Learning Model for Malicious Behavior Detection. BigDataSecurity/HPSC/IDS 2020: 55-59 - [c65]Aidong Xu, Lin Chen, Yixin Jiang, Huahui Lv, Hang Yang, Bo Li:
Finding Gold in the Sand: Identifying Anomaly Indicators Though Huge Amount Security Logs. BigDataSecurity/HPSC/IDS 2020: 140-144 - [c64]Yanwen Guo, Tao Wu, Yanbing Liu, Yixin Jiang:
Univariate Forecasting of time series data Based on Seq2Seq Model. EITCE 2020: 642-646 - [c63]Yunan Zhang, Aidong Xu, Yixin Jiang:
Scalable and Accurate Binary Search Method based on Simhash and Partial Trace. TrustCom 2020: 818-826
2010 – 2019
- 2019
- [j31]Songlin Chen, Hong Wen, Jinsong Wu, WenXin Lei, Wenjing Hou, Wenjie Liu, Aidong Xu, Yixin Jiang:
Internet of Things Based Smart Grids Supported by Intelligent Edge Computing. IEEE Access 7: 74089-74102 (2019) - [j30]Runfa Liao, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Huanhuan Song, FeiYi Xie, Yixin Jiang, Minggui Cao:
Security Enhancement for Mobile Edge Computing Through Physical Layer Authentication. IEEE Access 7: 116390-116401 (2019) - [j29]Tengyue Zhang, Hong Wen, Jie Tang, Huanhuan Song, Runfa Liao, Yi Chen, Yixin Jiang:
Analysis of the physical layer security enhancing of wireless communication system under the random mobile. IET Commun. 13(9): 1164-1170 (2019) - [j28]Yi Chen, Hong Wen, Jinsong Wu, Huanhuan Song, Aidong Xu, Yixin Jiang, Tengyue Zhang, Zhen Wang:
Clustering Based Physical-Layer Authentication in Edge Computing Systems with Asymmetric Resources. Sensors 19(8): 1926 (2019) - [j27]Runfa Liao, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Yixin Jiang, FeiYi Xie, Minggui Cao:
Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks. Sensors 19(11): 2440 (2019) - [j26]Songlin Chen, Hong Wen, Jinsong Wu, Aidong Xu, Yixin Jiang, Huanhuan Song, Yi Chen:
Radio Frequency Fingerprint-Based Intelligent Mobile Edge Computing for Internet of Things Authentication. Sensors 19(16): 3610 (2019) - [j25]Yuanpeng Xie, Hong Wen, Bin Wu, Yixin Jiang, Jiaxiao Meng:
A Modified Hierarchical Attribute-Based Encryption Access Control Method for Mobile Cloud Computing. IEEE Trans. Cloud Comput. 7(2): 383-391 (2019) - [c62]Aidong Xu, Yixin Jiang, Jinsong Wu, Yunan Zhang, Wenjin Hou, Hong Wen, Yi Zheng:
Efficiency and Security for Edge Computing Assisted Smart Grids. GLOBECOM Workshops 2019: 1-5 - [c61]FeiYi Xie, Aidong Xu, Yixin Jiang, Songlin Chen, Runfa Liao, Hong Wen:
Edge Intelligence based Co-training of CNN. ICCSE 2019: 830-834 - 2018
- [c60]Songlin Chen, Yixin Jiang, Hong Wen, Wenjie Liu, Jie Chen, WenXin Lei, Aidong Xu:
A Novel Terminal Security Access Method Based on Edge Computing for IoT. NaNA 2018: 394-398 - 2017
- [c59]Fei Pan, Hong Wen, Runfa Liao, Yixin Jiang, Aidong Xu, Kai Ouyang, Xiping Zhu:
Physical layer authentication based on channel information and machine learning. CNS 2017: 364-365 - [c58]Runfa Liao, Hong Wen, Fei Pan, Huanhuan Song, Yixin Jiang, FeiYi Xie, Aidong Xu:
A physical layer secure transmission method based on channel prediction and QoS. CNS 2017: 366-367 - [c57]Huanhuan Song, Luping Zhang, Hong Wen, Aidong Xu, Yixin Jiang, Runfa Liao, Songlin Chen, Yi Chen:
Performance analysis of cooperative secure transmission system. CNS 2017: 368-369 - [c56]Qing Yang, Yixin Jiang, Aidong Xu, Hong Wen, Feng Wang, LiuFei Chen, Kai Ouyang, Xiping Zhu:
A model divides the mobile security level based on SVM. CNS 2017: 370-371 - [c55]Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
A method of reconciling the key discrepancy by exploiting unconditional secure transmission. CNS 2017: 372-373 - [c54]Wei Cheng, Aidong Xu, Yixin Jiang, Hong Wen, Huanhuan Song, Kai Ouyang, Xiping Zhu:
The realization of key extraction based on USRP and OFDM channel response. CNS 2017: 374-375 - [c53]Lin Hu, Hong Wen, Bin Wu, Jie Tang, Fei Pan, Zhengguang Zhang, Yixin Jiang, Aidong Xu:
Cooperative Jamming Aided Secrecy Enhancement in Wireless Networks with Multiple Eavesdroppers. VTC Fall 2017: 1-5 - [c52]Fei Pan, Yixin Jiang, Hong Wen, Runfa Liao, Aidong Xu:
Physical Layer Security Assisted 5G Network Security. VTC Fall 2017: 1-5 - 2016
- [c51]Luping Zhang, Hong Wen, Huanhuan Song, Jie Tang, Yixin Jiang, Weihua Dong, Xiping Zhu:
The performance of the MIMO physical layer security system with imperfect CSI. CNS 2016: 346-347 - [c50]Jinling Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Zhengguang Zhang, Luping Zhang, Xiping Zhu:
Using Basis Expansion Model for Physical Layer Authentication in Time-Variant System. CNS 2016: 348-349 - [c49]Zhengguang Zhang, Hong Wen, Huanhuan Song, Yixin Jiang, Jinling Zhang, Xiping Zhu:
A MIMO cross-layer secure communication scheme based on spatial modulation. CNS 2016: 350-351 - [c48]Jianli Huang, Yixin Jiang, Aidong Xu, Hong Wen, Huajun Chen, Xiaobin Guo, Zewu Guan, Zhiming Wang:
Joint beamforming and antenna subarray formation for secrecy capacity maximization in MIMO wiretap channels. CNS 2016: 368-369 - [c47]Michel-Alexandre Cardin, Yixin Jiang, Terence Lim:
Empirical Studies in Decision Rule-Based Flexibility Analysis for Complex Systems Design and Management. CSDM 2016: 171-185 - 2015
- [c46]Yuanpeng Xie, Yixin Jiang, Runfa Liao, Hong Wen, Jiaxiao Meng, Xiaobin Guo, Aidong Xu, Zewu Guan:
User privacy protection for cloud computing based smart grid. ICCC Workshops 2015: 7-11 - [c45]Yuanpeng Xie, Yixin Jiang, Runfa Liao, Hong Wen, Jiaxiao Meng, Xiaobin Guo, Aidong Xu, Zewu Guan:
A hierarchical key management system applied in cloud-based smart grid. ICCC Workshops 2015: 22-26 - [c44]Yuanpeng Xie, Hong Wen, Jinsong Wu, Yixin Jiang, Jiaxiao Meng, Xiaobin Guo, Aidong Xu, Zewu Guan:
Three-Layers Secure Access Control for Cloud-Based Smart Grids. VTC Fall 2015: 1-5 - 2014
- [j24]Peng Zhang, Chuang Lin, Yixin Jiang, Yanfei Fan, Xuemin Shen:
A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks. IEEE Trans. Parallel Distributed Syst. 25(9): 2211-2221 (2014) - [c43]Mengyin Ren, Yixin Jiang, Xiaobin Guo, Qiyi Han, Hong Wen, Bin Wu, Zhen Chen:
P2P networks monitoring based on the social network analysis and the topological potential. CNS 2014: 492-493 - [c42]Ting Ma, Yixin Jiang, Hong Wen, Bin Wu, Xiaobin Guo, Zhen Chen:
Physical Layer Assist Mutual Authentication scheme for smart meter system. CNS 2014: 494-495 - [c41]Jie Tang, Huanhuan Song, Fei Pan, Hong Wen, Bin Wu, Yixin Jiang, Xiaobin Guo, Zhen Chen:
A MIMO cross-layer precoding security communication system. CNS 2014: 500-501 - [c40]Ge Ma, Zhen Chen, Junwei Cao, Zhenhua Guo, Yixin Jiang, Xiaobin Guo:
A tentative comparison on CDN and NDN. SMC 2014: 2893-2898 - [c39]Ge Ma, Zhenhua Guo, Xiu Li, Zhen Chen, Junwei Cao, Yixin Jiang, Xiaobin Guo:
BreadZip: a combination of network traffic data and bitmap index encoding algorithm. SMC 2014: 3235-3240 - 2013
- [c38]Hong Wen, Xiaochun Zhang, Lei Cai, Jie Tang, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A novel detection scheme for malicious nodes in smart meter system. CNS 2013: 379-380 - [c37]Yuanpeng Xie, Jinsong Zhang, Ge Fu, Hong Wen, Qiyi Han, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
The security issue of WSNs based on cloud computing. CNS 2013: 383-384 - [c36]Qiyi Han, Lin Yu, Rui Zhang, Hong Wen, Yuanpeng Xie, Xiping Zhu, Yixin Jiang, Xiaobin Guo:
A P2P recommended trust nodes selection algorithm based on topological potential. CNS 2013: 395-396 - [c35]Yixin Jiang, Xiaobin Guo, Chao Li, Hong Wen, Cai Lei, Zhang Rui:
An efficient and secure search database scheme for cloud computing in smart grid. CNS 2013: 413-414 - 2012
- [j23]Peng Zhang, Chuang Lin, Yixin Jiang, Patrick P. C. Lee, John C. S. Lui:
ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation. IEEE J. Sel. Areas Commun. 30(9): 1738-1745 (2012) - [j22]Rongfei Zeng, Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen:
Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets. IEEE Trans. Parallel Distributed Syst. 23(9): 1721-1730 (2012) - [j21]Rongfei Zeng, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin (Sherman) Shen:
A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting. IEEE Trans. Parallel Distributed Syst. 23(10): 1819-1830 (2012) - [c34]Ran Yang, Chuang Lin, Yixin Jiang:
Enforcing scalable and dynamic hierarchical access control in cloud computing. ICC 2012: 923-927 - 2011
- [j20]Rongfei Zeng, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin (Sherman) Shen:
A scalable and robust key pre-distribution scheme with network coding for sensor data storage. Comput. Networks 55(10): 2534-2544 (2011) - [j19]Xiangzhen Kong, Chuang Lin, Yixin Jiang, Wei Yan, Xiaowen Chu:
Efficient dynamic task scheduling in virtualized data centers with fuzzy prediction. J. Netw. Comput. Appl. 34(4): 1068-1077 (2011) - [j18]Yanfei Fan, Yixin Jiang, Haojin Zhu, Jiming Chen, Xuemin (Sherman) Shen:
Network Coding Based Privacy Preservation against Traffic Analysis in Multi-Hop Wireless Networks. IEEE Trans. Wirel. Commun. 10(3): 834-843 (2011) - [c33]Ran Yang, Chuang Lin, Yixin Jiang, Xiaowen Chu:
An Authorization Model without Central Authority for Service Collaboration. GLOBECOM 2011: 1-5 - [c32]Ran Yang, Chuang Lin, Yixin Jiang, Xiaowen Chu:
Trust Based Access Control in Infrastructure-Centric Environment. ICC 2011: 1-5 - [c31]Peng Zhang, Yixin Jiang, Chuang Lin, Hongyi Yao, Albert Wasef, Xuemin Shen:
Padding for orthogonality: Efficient subspace authentication for network coding. INFOCOM 2011: 1026-1034 - [c30]Rongfei Zeng, Yixin Jiang, Chuang Lin, Xuemin (Sherman) Shen:
A stochastic Petri nets approach to dependability analysis of control center networks in smart grid. WCSP 2011: 1-5 - 2010
- [j17]Yixin Jiang, Haojin Zhu, Minghui Shi, Xuemin (Sherman) Shen, Chuang Lin:
An efficient dynamic-identity based signature scheme for secure network coding. Comput. Networks 54(1): 28-40 (2010) - [j16]Zhong Su, Yixin Jiang, Fengyuan Ren, Chuang Lin, Xiaowen Chu:
Distributed KDC-Based Random Pairwise Key Establishment in Wireless Sensor Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j15]Xiaowen Chu, Yixin Jiang:
Random linear network coding for peer-to-peer applications. IEEE Netw. 24(4): 35-39 (2010) - [j14]Xiaowen Chu, Yixin Jiang, Chuang Lin, Hao Yin, Bo Li:
Providing key recovery capability for mobile communications. Secur. Commun. Networks 3(2-3): 207-216 (2010) - [j13]Albert Wasef, Yixin Jiang, Xuemin Shen:
DCS: An Efficient Distributed-Certificate-Service Scheme for Vehicular Networks. IEEE Trans. Veh. Technol. 59(2): 533-549 (2010) - [j12]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
PIE: cooperative peer-to-peer information exchange in network coding enabled wireless networks. IEEE Trans. Wirel. Commun. 9(3): 945-950 (2010) - [c29]Yanping Xiao, Chuang Lin, Yixin Jiang, Xiaowen Chu, Fangqin Liu:
An Efficient Privacy-Preserving Publish-Subscribe Service Scheme for Cloud Computing. GLOBECOM 2010: 1-5 - [c28]Rongfei Zeng, Chuang Lin, Yixin Jiang, Xiaowen Chu, Fangqin Liu:
Performance Analysis of Data Management in Sensor Data Storage via Stochastic Petri Nets. GLOBECOM 2010: 1-5 - [c27]Xianjun Sun, Chuang Lin, Yixin Jiang, Weidong Liu, Xiaowen Chu:
An Efficient Recovery and Survival Scheme against Malware Attacks. ICC 2010: 1-5 - [c26]Yanping Xiao, Chuang Lin, Yixin Jiang, Xiaowen Chu, Xuemin Shen:
Reputation-Based QoS Provisioning in Cloud Computing via Dirichlet Multinomial Model. ICC 2010: 1-5 - [c25]Peng Zhang, Yixin Jiang, Chuang Lin, Yanfei Fan, Xuemin Shen:
P-Coding: Secure Network Coding against Eavesdropping Attacks. INFOCOM 2010: 2249-2257 - [c24]Xiaowei Chen, Xiaowen Chu, Yixin Jiang, Fengyuan Ren:
Measurements, analysis and modeling of private tracker sites. IWQoS 2010: 1-2 - [c23]Xiaowei Chen, Yixin Jiang, Xiaowen Chu:
Measurements, Analysis and Modeling of Private Trackers. Peer-to-Peer Computing 2010: 1-10
2000 – 2009
- 2009
- [j11]Yixin Jiang, Yanfei Fan, Xuemin (Sherman) Shen, Chuang Lin:
A self-adaptive probabilistic packet filtering scheme against entropy attacks in network coding. Comput. Networks 53(18): 3089-3101 (2009) - [j10]Yixin Jiang, Minghui Shi, Xuemin Shen, Chuang Lin:
BAT: A robust signature scheme for vehicular networks using Binary Authentication Tree. IEEE Trans. Wirel. Commun. 8(4): 1974-1983 (2009) - [j9]Xiaowen Chu, Kai Ouyang, Hsiao-Hwa Chen, Jiangchuan Liu, Yixin Jiang:
Homonymous role in role-based discretionary access control. Wirel. Commun. Mob. Comput. 9(9): 1287-1300 (2009) - [c22]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
Cooperative Peer-to-Peer Information Exchange via Wireless Network Coding. GLOBECOM 2009: 1-7 - [c21]An'an Luo, Chuang Lin, Yixin Jiang, Xiaowen Chu, Hongkun Yang:
An Effective Early Warning Scheme against Pollution Dissemination for BitTorrent. GLOBECOM 2009: 1-7 - [c20]Kaiyong Zhao, Xiaowen Chu, Mea Wang, Yixin Jiang:
Speeding Up Homomorpic Hashing Using GPUs. ICC 2009: 1-5 - [c19]Yanfei Fan, Yixin Jiang, Haojin Zhu, Xuemin Shen:
An Efficient Privacy-Preserving Scheme against Traffic Analysis Attacks in Network Coding. INFOCOM 2009: 2213-2221 - [c18]Xin Jiang, Chuang Lin, Yixin Jiang, Yuanzhuo Wang, Zhen Chen:
ELCP: An Effort-Based Least Cost Path Scheme for MANETs. MSN 2009: 347-352 - [c17]Yanping Xiao, Chuang Lin, Yixin Jiang, Xiaowen Chu, Shengling Wang:
Risk-Aware QoP/QoS Optimization for Multimedia Applications in Wireless Networks. QSHINE 2009: 34-51 - 2008
- [j8]Minghui Shi, Xuemin Shen, Jon W. Mark, Dongmei Zhao, Yixin Jiang:
User authentication and undeniable billing support for agent-based roaming service in WLAN/cellular integrated mobile networks. Comput. Networks 52(9): 1693-1702 (2008) - [j7]Yixin Jiang, Chuang Lin, Hao Yin, Zhen Chen:
A mutual authentication and privacy mechanism for WLAN security. Wirel. Commun. Mob. Comput. 8(1): 101-112 (2008) - [c16]Yixin Jiang, Minghui Shi, Xuemin Shen, Chuang Lin:
A Tree-Based Signature Scheme for VANETs. GLOBECOM 2008: 634-638 - [c15]Albert Wasef, Yixin Jiang, Xuemin Shen:
ECMV: Efficient Certificate Management Scheme for Vehicular Networks. GLOBECOM 2008: 639-643 - [c14]Yanfei Fan, Bin Lin, Yixin Jiang, Xuemin Shen:
An Efficient Privacy-Preserving Scheme for Wireless Link Layer Security. GLOBECOM 2008: 4652-4656 - [c13]Yixin Jiang, Minghui Shi, Xuemin Shen, Chuang Lin:
Efficient Re-Keying Scheme for Group Key Distribution. WCNC 2008: 2639-2644 - 2007
- [j6]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
Self-healing group key distribution with time-limited node revocation for wireless sensor networks. Ad Hoc Networks 5(1): 14-23 (2007) - [j5]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen, Xiaowen Chu:
A DoS and fault-tolerant authentication protocol for group communications in ad hoc networks. Comput. Commun. 30(11-12): 2428-2441 (2007) - [j4]Minghui Shi, Xuemin Shen, Yixin Jiang, Chuang Lin:
Self-healing group-wise key distribution schemes with time-limited node revocation for wireless sensor networks. IEEE Wirel. Commun. 14(5): 38-46 (2007) - [c12]Kai Ouyang, Xiaowen Chu, Yixin Jiang, Hsiao-Hwa Chen, Jiangchuan Liu:
On the Homonymous Role in Role-Based Discretionary Access Control. ATC 2007: 313-322 - 2006
- [j3]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
A self-encryption authentication protocol for teleconference services. Int. J. Secur. Networks 1(3/4): 198-205 (2006) - [j2]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
Multiple Key Sharing and Distribution Scheme With (n, t) Threshold for NEMO Group Communications. IEEE J. Sel. Areas Commun. 24(9): 1738-1747 (2006) - [j1]Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi:
Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks. IEEE Trans. Wirel. Commun. 5(9): 2569-2577 (2006) - [c11]Xiaowen Chu, Yixin Jiang, Chuang Lin, Fujun Feng:
Self-certified Mutual Authentication and Key Exchange Protocol for Roaming Services. ATC 2006: 408-417 - [c10]Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Zheng, Zhangxi Tan, Yixin Jiang, Xuehai Peng, An'an Luo, Bing Zhu, Yao Yue, Yang Wang, Peter D. Ungsunan, Fengyuan Ren:
AntiWorm NPU-based Parallel Bloom filters in Giga-Ethernet LAN. ICC 2006: 2118-2123 - 2005
- [c9]Yixin Jiang, Chuang Lin, Minghui Shi, Xuemin Shen:
A self-encryption authentication protocol with identity anonymity for teleconference services. GLOBECOM 2005: 5 - [c8]Zhen Chen, Chuang Lin, Jia Ni, Dong-Hua Ruan, Bo Zheng, Yixin Jiang:
AntiWorm NPU-based Parallel Bloom Filters for TCP/IP Content Processing in Giga-Ethernet LAN. LCN 2005: 748-755 - [c7]Yixin Jiang, Chuang Lin, Xuemin Shen, Minghui Shi:
Mutual Authentication and Key Exchange Protocols with Anonymity Property for Roaming Services. NETWORKING 2005: 114-125 - 2004
- [c6]Yixin Jiang, Chuang Lin, Zhiguang Shan, Zhen Chen:
Modeling and Performance Analysis of Network-Based Intrusion Detection Cluster. PDCS 2004: 530-535 - [c5]Yixin Jiang, Chuang Lin, Zhen Chen, Hao Yin:
Using Petri Nets to Verify Security Policies in Mandatory Access Control Model. IRI 2004: 271-276 - [c4]Hao Yin, Zhangxi Tan, Chuang Lin, Yixin Jiang, Feng Qiu:
Modeling mobile Web services flow using generalized stochastic high-level Petri net. SMC (5) 2004: 4953-4958 - [c3]Yixin Jiang, Chuang Lin, Hao Yin, Zhangxi Tan:
Security analysis of mandatory access control model. SMC (6) 2004: 5013-5018 - 2003
- [c2]Yixin Jiang, Chuang Lin, Zhangxi Tan:
An authentication model for multilevel security domains. SMC 2003: 1534-1539 - [c1]Zhangxi Tan, Chuang Lin, Yanxi Li, Yixin Jiang:
Optimization and benchmark of cryptographic algorithms on network processors. SMC 2003: 2296-2301
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint