Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Limor Issacharoff
Claudia Calabrese
Hao Mao
Peter Malec
Brian Weir
Giovanni Venturelli
Chen Ma
Radu Timofte
Kuanrui Yin
Carlos Zimmerle
Home
/
Author
/
MANDE XIE
Author Info
Open Visualization
Name
Affiliation
Papers
MANDE XIE
Zhejiang Gongshang Univ, Coll Informat & Comp Engn, Hangzhou 310018, Peoples R China
43
Collaborators
Citations
PageRank
90
151
17.16
Referers
Referees
References
500
1141
519
Search Limit
100
1000
Publications (43 rows)
Collaborators (90 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices
0
0.34
2021
Privacy-Enhanced Data Collection Based on Deep Learning for Internet of Vehicles
6
0.44
2020
MTES: An Intelligent Trust Evaluation Scheme in Sensor-Cloud-Enabled Industrial Internet of Things.
4
0.40
2020
A Unified Trustworthy Environment Establishment based on Edge Computing in Industrial IoT
3
0.39
2020
Edge-based differential privacy computing for sensor-cloud systems.
5
0.39
2020
A novel trust mechanism based on Fog Computing in Sensor–Cloud System
14
0.55
2020
When Sensor-Cloud Meets Mobile Edge Computing.
2
0.54
2019
To Reduce Delay, Energy Consumption and Collision through Optimization Duty-Cycle and Size of Forwarding Node Set in WSNs
1
0.35
2019
Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications.
7
0.43
2019
A Game-Based Economic Model for Price Decision Making in Cyber-Physical-Social Systems
1
0.35
2019
Reducing Delay and Maximizing Lifetime for Wireless Sensor Networks With Dynamic Traffic Patterns.
3
0.36
2019
A low redundancy data collection scheme to maximize lifetime using matrix completion technique.
1
0.35
2019
UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City.
4
0.41
2019
Crowdsourcing Mechanism for Trust Evaluation in CPCS Based on Intelligent Mobile Edge Computing
6
0.53
2019
A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type
0
0.34
2019
Delay and energy-efficient data collection scheme-based matrix filling theory for dynamic traffic IoT
0
0.34
2019
Coupling resource management based on fog computing in smart city systems.
4
0.43
2019
An Efficient Information Maximization Based Adaptive Congestion Control Scheme in Wireless Sensor Network.
0
0.34
2019
Differentiated Data Aggregation Routing Scheme for Energy Conserving and Delay Sensitive Wireless Sensor Networks.
2
0.35
2018
Energy-efficient relay tracking with multiple mobile camera sensors.
2
0.36
2018
Adaptive Aggregation Routing to Reduce Delay for Multi-Layer Wireless Sensor Networks.
8
0.43
2018
Fog-based storage technology to fight with cyber threat.
19
0.60
2018
Data Security and Privacy in Fog Computing.
7
0.42
2018
CCA-secure ABE with outsourced decryption for fog computing.
18
0.60
2018
LDSCD: A loss and DoS resistant secure code dissemination algorithm supporting multiple authorized tenants.
5
0.46
2017
Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced Decryption.
3
0.39
2016
An adaptive aggregation scheduling algorithm based on the grid partition in large-scale wireless sensor networks
0
0.34
2015
SecNRCC: a loss‐tolerant secure network reprogramming with confidentiality consideration for wireless sensor networks
3
0.42
2015
Social role-based secure large data objects dissemination in mobile sensing environment
0
0.34
2015
An Energy-Efficient Aggregation and Collection Algorithm for Heterogeneous Wireless Sensor Network.
0
0.34
2015
The Optimal Partition Algorithm for Multiple Video Sequences in Streaming Media System.
0
0.34
2014
A Topology Construct And Control Model With Small-World And Scale-Free Concepts For Heterogeneous Sensor Networks
2
0.41
2014
Wireless Sensor Networks Energy Effectively Distributed Target Detection
1
0.36
2014
The Degree-Constrained Adaptive Algorithm Based On The Data Aggregation Tree
1
0.37
2014
Receiving-peer-driven multi-video-source scheduling algorithms in mobile P2P overlay networks
4
0.42
2012
Identity-Based Conditional Proxy Re-Encryption
12
0.55
2011
The Design and Challenges of Online Reprogramming System for Wireless Sensor Networks.
1
0.36
2011
Unidirectional Identity-Based Proxy Re-Signature
1
0.35
2011
The Design and Implementation of the Digital Down Converter Based on the Improved DDS and DSPBuilder Techniques.
0
0.34
2011
An Efficient Architecture for Semi-real-Time Graphical Simulation Based on Mobile Computing Devices in Wireless WMS system
1
0.37
2010
A Budget-Based Cost-Effective Incentive Model
0
0.34
2009
An Exhaustive Resource Search Algorithm Based on Ping-Pang Mapping
0
0.34
2008
Research on a Piecewise Linear Chaotic Map and Its Cryptographical Application
0
0.34
2007
1