default search action
Mingxing He
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Zehui Tang, Shengke Zeng, Song Han, Yawen Feng, Tao Li, Mingxing He:
Fuzzy Deduplication: Color-Aware Deduplication for Multi-Media Data. IEEE Trans. Serv. Comput. 17(5): 2459-2472 (2024) - 2023
- [j29]Lele Tang, Mingxing He, Ling Xiong, Neal Naixue Xiong, Qian Luo:
An efficient and privacy-preserving query scheme in intelligent transportation systems. Inf. Sci. 647: 119448 (2023) - [j28]Linsheng Yu, Mingxing He, Hongbin Liang, Ling Xiong, Yang Liu:
A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services. Sensors 23(3): 1264 (2023) - [j27]Chunguang Suo, Rujin Huang, Guoqiong Zhou, Wenbin Zhang, Yanyun Wang, Mingxing He:
Self-Calibration Sensor for Contactless Voltage Measurement Based on Dynamic Capacitance. Sensors 23(8): 3851 (2023) - [j26]Xiangyu Tan, Wenbin Zhang, Mingxing He, Wenyun Li, Gang Ao, Fangrong Zhou:
Non-Contact Adaptive Voltage Sensor Based on Electric Field Coupling Principle. Sensors 23(19): 8316 (2023) - 2022
- [j25]Mingxing He, Jiahua Chen:
Strong consistency of the MLE under two-parameter Gamma mixture models with a structural scale parameter. Adv. Data Anal. Classif. 16(1): 125-154 (2022) - [j24]Wenbin Zhang, Yonglong Yang, Jingjing Zhao, Rujin Huang, Kang Cheng, Mingxing He:
Research on a Non-Contact Multi-Electrode Voltage Sensor and Signal Processing Algorithm. Sensors 22(21): 8573 (2022) - [j23]Ling Xiong, Fagen Li, Mingxing He, Zhicai Liu, Tu Peng:
An Efficient Privacy-Aware Authentication Scheme With Hierarchical Access Control for Mobile Cloud Computing Services. IEEE Trans. Cloud Comput. 10(4): 2309-2323 (2022) - [c20]Linsheng Yu, Mingxing He, Ling Xiong, Qian Luo, Xianhua Niu:
A Blockchain-Based Decentralized Privacy-Preserving Mobile Payment Scheme Using Anonymous Credentials. HPCC/DSS/SmartCity/DependSys 2022: 1517-1524 - 2020
- [j22]Yuehui Li, Chin-Chen Chang, Mingxing He:
High Capacity Reversible Data Hiding for VQ-Compressed Images Based on Difference Transformation and Mapping Technique. IEEE Access 8: 32226-32245 (2020) - [j21]Guangmin Xie, Zhongyuan Jiang, Mingxing He, Xiaoliang Chen, Jian Mao:
A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods. IEEE Access 8: 103759-103771 (2020) - [j20]Yang Liu, Mingxing He, Fangyuan Pu:
Anonymous Transaction of Digital Currency Based on Blockchain. Int. J. Netw. Secur. 22(3): 442-448 (2020) - [j19]Shengke Zeng, Yi Mu, Hongjie Zhang, Mingxing He:
A practical and communication-efficient deniable authentication with source-hiding and its application on Wi-Fi privacy. Inf. Sci. 516: 331-345 (2020) - [j18]Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:
A lightweight authenticable visual secret sharing scheme based on turtle shell structure matrix. Multim. Tools Appl. 79(1-2): 453-476 (2020) - [j17]Jiangheng Kou, Mingxing He, Ling Xiong, Zeqiong Lv:
Efficient Hierarchical Authentication Protocol for Multiserver Architecture. Secur. Commun. Networks 2020: 2523834:1-2523834:14 (2020)
2010 – 2019
- 2019
- [j16]Mingze He, Yanjun Liu, Chin-Chen Chang, Mingxing He:
A Mini-Sudoku Matrix-Based Data Embedding Scheme With High Payload. IEEE Access 7: 141414-141425 (2019) - [j15]Xiao-Shuang Li, Chin-Chen Chang, Mingxing He, Chia-Chen Lin:
Secure High Capacity Data Hiding Scheme based on Reference Matrix. Int. J. Netw. Secur. 21(6): 918-929 (2019) - [j14]Mingxing He, Jie Zhou, Peng Wu, Yang Liu:
山洞环境中声信号的传播模型及其性能研究 (Acoustic Signal Propagation Model and Its Performance in Cave Environment). 计算机科学 46(9): 113-119 (2019) - 2018
- [j13]Shengke Zeng, Yi Mu, Mingxing He, Yong Chen:
New Approach for Privacy-Aware Location-Based Service Communications. Wirel. Pers. Commun. 101(2): 1057-1073 (2018) - [c19]Cui Wang, Mingxing He:
Image Style Transfer with Multi-target Loss for loT Applications. I-SPAN 2018: 296-299 - 2017
- [j12]Zhengguo Zhu, Mingxing He, Rongqi Liu, Zemin Liu:
应用于认知无线电频谱预测的小波神经网络模型 (Wavelet Neural Network Model for Cognitive Radio Spectrum Prediction). 计算机科学 44(12): 86-89 (2017) - [j11]Shengke Zeng, Yong Chen, Shuangquan Tan, Mingxing He:
Concurrently deniable ring authentication and its application to LBS in VANETs. Peer-to-Peer Netw. Appl. 10(4): 844-856 (2017) - [c18]Shengke Zeng, Yi Mu, Guomin Yang, Mingxing He:
Deniable Ring Authentication Based on Projective Hash Functions. ProvSec 2017: 127-143 - 2016
- [c17]Dazeng Yuan, Mingxing He, Shengke Zeng, Xiao Li, Long Lu:
(t, p)-Threshold point function secret sharing scheme based on polynomial interpolation and its application. UCC 2016: 269-275 - [c16]Shengke Zeng, Shuangquan Tan, Yong Chen, Mingxing He, Meichen Xia, Xiao Li:
Privacy-preserving location-based service based on deniable authentication. UCC 2016: 276-281 - 2015
- [c15]Yong Chen, Mingxing He, Shengke Zeng, Xiao Li:
Universally composable asymmetric group key agreement protocol. ICICS 2015: 1-6 - 2013
- [c14]Huan Wang, Mingxing He, Xiao Li:
An Extended Multi-secret Images Sharing Scheme Based on Boolean Operation. ICT-EurAsia 2013: 513-518 - 2011
- [j10]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
A fast RFID tag identification algorithm based on counter and stack. Expert Syst. Appl. 38(6): 6829-6838 (2011) - [j9]Ling-Yuan Hsu, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen:
Mutual funds trading strategy based on particle swarm optimization. Expert Syst. Appl. 38(6): 7582-7602 (2011) - [j8]Yao-Lin Huang, Shi-Jinn Horng, Mingxing He, Pingzhi Fan, Tzong-Wann Kao, Muhammad Khurram Khan, Jui-Lin Lai, I-Hong Kuo:
A hybrid forecasting model for enrollments based on aggregated fuzzy time series and particle swarm optimization. Expert Syst. Appl. 38(7): 8014-8023 (2011) - [j7]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Muhammad Khurram Khan, Ray-Shine Run, Jui-Lin Lai, Rong-Jian Chen, Adi Sutanto:
An efficient phishing webpage detector. Expert Syst. Appl. 38(10): 12018-12027 (2011) - [j6]Hongwei Li, Xiao Li, Mingxing He, Shengke Zeng:
Improved ID-based Ring Signature Scheme with Constant-size Signatures. Informatica (Slovenia) 35(3): 343-350 (2011) - 2010
- [j5]Wenjie Zhao, Mingxing He:
Improvement of a Secure Convex Hull Two-Party Computation Protocol. J. Convergence Inf. Technol. 5(3): 24-30 (2010) - [j4]Mingxing He, Shi-Jinn Horng, Pingzhi Fan, Ray-Shine Run, Rong-Jian Chen, Jui-Lin Lai, Muhammad Khurram Khan, Kevin Octavius Sentosa:
Performance evaluation of score level fusion in multimodal biometric systems. Pattern Recognit. 43(5): 1789-1800 (2010) - [c13]Xiujie Zhang, Mingxing He:
Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. AINA 2010: 745-752 - [c12]Liangliang Wang, Mingxing He:
Improved Efficient Forward Secure Signature Scheme. ICEE 2010: 1338-1341
2000 – 2009
- 2009
- [j3]Siwei Ji, Mingxing He:
Comments on "Modified Hough Transform for Searching Radar Detection". IEEE Geosci. Remote. Sens. Lett. 6(3): 616 (2009) - [j2]Song Han, Biming Tian, Mingxing He, Elizabeth Chang:
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks. IEEE Trans. Wirel. Commun. 8(4): 1876-1887 (2009) - [c11]Wei Du, Mingxing He, Xiao Li:
A New Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Networks. ICA3PP 2009: 832-843 - [c10]Hongjiang He, Qingqing Wang, Mingxing He:
Design of Power Quality Monitoring System Based on DSP. ISCID (2) 2009: 345-348 - 2008
- [j1]Biming Tian, Mingxing He:
A Self-healing Key Distribution Scheme with Novel Properties. Int. J. Netw. Secur. 7(1): 114-119 (2008) - [c9]Shengke Zeng, Mingxing He, Weidong Luo:
New Efficient and Authenticated Key Agreement Protocol in Dynamic Peer Group. ARES 2008: 746-751 - [c8]Qingyu Xu, Mingxing He, Lein Harn:
An Improved Time-Bound Hierarchical Key Assignment Scheme. APSCC 2008: 1489-1494 - [c7]Wei Du, Mingxing He:
Self-healing Key Distribution with Revocation and Resistance to the Collusion Attack in Wireless Sensor Networks. ProvSec 2008: 345-359 - [c6]Qingyu Xu, Mingxing He:
Improved Constant Storage Self-healing Key Distribution with Revocation in Wireless Sensor Network. WISA 2008: 41-55 - [c5]Jun Zhou, Mingxing He:
An Improved Distributed Key Management Scheme in Wireless Sensor Networks. WISA 2008: 305-319 - 2006
- [c4]Hongsong Shi, Mingxing He, Zhiguang Qin:
Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks. CANS 2006: 73-89 - [c3]Xiao Li, Mingxing He:
A Protocol of Member-Join in a Secret Sharing Scheme. ISPEC 2006: 134-141 - 2004
- [c2]Mingxing He, Pingzhi Fan, Firoz Kaderali:
Group Key Agreement Protocol Based on GH-KEP. PDCAT 2004: 619-623 - 2003
- [c1]Weidong Qiu, Mingxing He, Firoz Kaderali:
Group Oriented Digital Certificate Architecture. CEC 2003: 233-237
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint