default search action
Xuyun Nie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j23]Mengjuan Liu, Jinyu Liu, Zhengning Hu, Yuchen Ge, Xuyun Nie:
Bid optimization using maximum entropy reinforcement learning. Neurocomputing 501: 529-543 (2022) - [j22]Dajiang Chen, Hao Wang, Ning Zhang, Xuyun Nie, Hong-Ning Dai, Kuan Zhang, Kim-Kwang Raymond Choo:
Privacy-Preserving Encrypted Traffic Inspection With Symmetric Cryptographic Techniques in IoT. IEEE Internet Things J. 9(18): 17265-17279 (2022) - [j21]Muhammad Umar Aftab, Ali Hamza, Ariyo Oluwasanmi, Xuyun Nie, Muhammad Shahzad Sarfraz, Danish Shehzad, Zhiguang Qin, Ammar Rafiq:
Traditional and Hybrid Access Control Models: A Detailed Survey. Secur. Commun. Networks 2022: 1560885:1-1560885:12 (2022) - [j20]Jianfei Sun, Yu Yuan, MingJian Tang, Xiaochun Cheng, Xuyun Nie, Muhammad Umar Aftab:
Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare. IEEE Trans. Ind. Informatics 18(9): 6483-6493 (2022) - [i4]Mengjuan Liu, Zhengning Hu, Zhi Lai, Daiwei Zheng, Xuyun Nie:
Real-time Bidding Strategy in Display Advertising: An Empirical Analysis. CoRR abs/2212.02222 (2022) - 2021
- [j19]Jianfei Sun, Dajiang Chen, Ning Zhang, Guowen Xu, Mingjian Tang, Xuyun Nie, Mingsheng Cao:
A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT. IEEE Internet Things J. 8(12): 10034-10046 (2021) - [j18]Muhammad Umar Aftab, Ariyo Oluwasanmi, Abdullah Alharbi, Osama Sohaib, Xuyun Nie, Zhiguang Qin, Ngo Tung Son:
Secure and dynamic access control for the Internet of Things (IoT) based traffic system. PeerJ Comput. Sci. 7: e471 (2021) - [j17]Jianfei Sun, Hu Xiong, Xuyun Nie, Yinghui Zhang, Pengfei Wu:
On the Security of Privacy-Preserving Attribute-Based Keyword Search in Shared Multi-Owner Setting. IEEE Trans. Dependable Secur. Comput. 18(5): 2518-2519 (2021) - [i3]Mengjuan Liu, Jinyu Liu, Zhengning Hu, Yuchen Ge, Xuyun Nie:
Bid Optimization using Maximum Entropy Reinforcement Learning. CoRR abs/2110.05032 (2021) - 2020
- [j16]Mengjuan Liu, Jiaxing Li, Zhengning Hu, Jinyu Liu, Xuyun Nie:
A Dynamic Bidding Strategy Based on Model-Free Reinforcement Learning in Display Advertising. IEEE Access 8: 213587-213601 (2020) - [j15]Yongjian Liao, Yulu Liu, Yukuan Liang, Yu Wu, Xuyun Nie:
Revisit of Certificateless Signature Scheme Used to Remote Authentication Schemes for Wireless Body Area Networks. IEEE Internet Things J. 7(3): 2160-2168 (2020) - [j14]Jianfei Sun, Hu Xiong, Ximeng Liu, Yinghui Zhang, Xuyun Nie, Robert H. Deng:
Lightweight and Privacy-Aware Fine-Grained Access Control for IoT-Oriented Smart Health. IEEE Internet Things J. 7(7): 6566-6575 (2020) - [j13]Jianfei Sun, Shengnan Hu, Xuyun Nie, Joojo Walker:
Efficient Ranked Multi-Keyword Retrieval With Privacy Protection for Multiple Data Owners in Cloud Computing. IEEE Syst. J. 14(2): 1728-1739 (2020) - [j12]Hu Xiong, Yangyang Bao, Xuyun Nie, Yakubu Issifu Asoor:
Server-Aided Attribute-Based Signature Supporting Expressive Access Structures for Industrial Internet of Things. IEEE Trans. Ind. Informatics 16(2): 1013-1023 (2020)
2010 – 2019
- 2019
- [j11]Yongjian Liao, Yikuan Liang, Adeniyi Wisdom Oyewole, Xuyun Nie:
Security Analysis of a Certificateless Provable Data Possession Scheme in Cloud. IEEE Access 7: 93259-93263 (2019) - [j10]Jianfei Sun, Shengnan Hu, Xuyun Nie:
Fine-Grained Ranked Multi-Keyword Search Over Hierarchical Data for IoT-Oriented Health System. IEEE Access 7: 101969-101980 (2019) - [c13]Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie:
Role-Based ABAC Model for Implementing Least Privileges. ICSCA 2019: 467-471 - 2018
- [j9]Jianfei Sun, Yangyang Bao, Xuyun Nie, Hu Xiong:
Attribute-Hiding Predicate Encryption With Equality Test in Cloud Computing. IEEE Access 6: 31621-31629 (2018) - [j8]Gang Lu, Linyuan Xuan, Xuyun Nie, Zhiguang Qin, Bo Liu:
Cubic Medium Field Equation Public Key Cryptosystem. Int. J. Netw. Secur. 20(3): 472-477 (2018) - [j7]Gang Lu, Linyuan Xue, Xuyun Nie, Zhiguang Qin:
Cryptanalysis of Novel Extended Multivariate Public Key Cryptosystem with Invertible Cycle. Int. J. Netw. Secur. 20(3): 509-514 (2018) - [j6]Xingbing Fu, Xuyun Nie, Ting Wu, Fagen Li:
Large universe attribute based access control with efficient decryption in cloud storage system. J. Syst. Softw. 135: 157-164 (2018) - 2017
- [j5]Mohamed Ali Hamza, Jianfei Sun, Xuyun Nie, Zhiquan Qin, Hu Xiong:
Revocable ABE with Bounded Ciphertext in Cloud Computing. Int. J. Netw. Secur. 19(6): 973-983 (2017) - 2016
- [j4]Xuyun Nie, Chuanyong Hou, Zhaohu Xu, Gang Lu:
Analysis of Second Order Matrices Construction in MFE Public Key Cryptosystem. Int. J. Netw. Secur. 18(1): 158-164 (2016) - 2015
- [j3]Xingbing Fu, Xuyun Nie, Fagen Li:
Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme. Inf. 6(3): 481-493 (2015) - [c12]Xuyun Nie, Bo Liu, Hu Xiong, Gang Lu:
Cubic Unbalance Oil and Vinegar Signature Scheme. Inscrypt 2015: 47-56 - 2014
- [j2]Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann, Fagen Li:
Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(9): 1952-1961 (2014) - 2013
- [c11]Xuyun Nie, Albrecht Petzoldt, Johannes Buchmann:
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method. CD-ARES Workshops 2013: 91-104 - [c10]Xuyun Nie, Zhaohu Xu, Johannes Buchmann:
Cryptanalysis of Hash-Based Tamed Transformation and Minus Signature Scheme. PQCrypto 2013: 155-164 - 2012
- [j1]Zhaohu Xu, Xuyun Nie, Hui Wang, Yongjian Liao:
Cryptanalysis of an improved MFE public key cryptosystem. Int. J. Secur. Networks 7(3): 174-180 (2012) - 2011
- [c9]Xuyun Nie, Zhaohu Xu, Li Lu, Yongjian Liao:
Security Analysis of an Improved MFE Public Key Cryptosystem. CANS 2011: 118-125 - 2010
- [c8]Wenliang Bian, Xuyun Nie:
Unattended Home Delivery System based on PKI Trust Model in Urban Areas. ICISO 2010: 3-8 - [c7]Weiwei Cao, Xuyun Nie, Lei Hu, Xiling Tang, Jintai Ding:
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme. PQCrypto 2010: 41-60
2000 – 2009
- 2009
- [c6]Jin Wu, Yongjian Liao, Xuyun Nie, Mengjuan Liu:
The Trust Management Model of Trusted Software. IFITA (3) 2009: 534-537 - 2008
- [c5]Zhiwei Wang, Xuyun Nie, Shihui Zheng, Yixian Yang, Zhihui Zhang:
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus. ICCSA (2) 2008: 1-13 - [c4]Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding, Zhiguang Qin:
Breaking Instance II of New TTM Cryptosystems. IIH-MSP 2008: 1332-1335 - 2007
- [c3]Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner:
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. ACNS 2007: 104-115 - [c2]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Public Key Cryptography 2007: 233-248 - [i2]Xuyun Nie, Xin Jiang, Lei Hu, Jintai Ding:
Cryptanalysis of Two New Instances of TTM Cryptosystem. IACR Cryptol. ePrint Arch. 2007: 381 (2007) - 2006
- [c1]Xuyun Nie, Lei Hu, Jianyu Li, Crystal Updegrove, Jintai Ding:
Breaking a New Instance of TTM Cryptosystems. ACNS 2006: 210-225 - [i1]Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2006: 336 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint