A Weighted Voting Framework for Android App's Vetting Based on Multiple Machine Learning Models.

Ning Xi , Honglei Hui , Yuanqing Liu , Yongbo Zhi
network and system security 63 -78

2020
Android Malware Detection Based on Call Graph via Graph Neural Network

Jianfeng Ma , Ning Xi , Xindi Ma , Di Lu
international conference on networking 368 -374

8
2020
Trustworthy service composition with secure data transmission in sensor networks

Tao Zhang , Lele Zheng , Yongzhi Wang , Yulong Shen
World Wide Web 21 ( 1) 185 -200

5
2018
Enforcing Generalized Refinement-Based Noninterference for Secure Interface Composition

Cong Sun , Ning Xi , Jianfeng Ma
computer software and applications conference 586 -595

1
2017
Building a Secure Scheme for a Trusted Hardware Sharing Environment

Di Lu , Jianfeng Ma , Cong Sun , Qixuan Wu
IEEE Access 5 20260 -20271

2
2017
Service Composition in Multi-domain Environment under Time Constraint

Tao Zhang , Jianfeng Ma , Cong Sun , Qi Li
2013 IEEE 20th International Conference on Web Services 227 -234

8
2013
Decentralized Information Flow Verification Framework for the Service Chain Composition in Mobile Computing Environments

Ning Xi , Jianfeng Ma , Cong Sun , Tao Zhang
2013 IEEE 20th International Conference on Web Services 563 -570

9
2013
Trustworthy Service Composition in Service-Oriented Mobile Social Networks

Ximeng Liu , Zhiquan Liu , Jinbo Xiong , Tao Zhang
international conference on web services 684 -687

2
2014
Compositional Information Flow Verification for Inter Application Communications in Android System

Xue Rao , Ning Xi , Jing Lv , Pengbin Feng
international conference on machine learning 239 -252

2019
Trust-based service composition in multi-domain environments under time constraint

Tao Zhang , JianFeng Ma , Qi Li , Ning Xi
Science China Information Sciences 57 ( 9) 1 -16

8
2014
Automated enforcement for relaxed information release with reference points

Cong Sun , Ning Xi , Sheng Gao , Zhong Chen
Science China Information Sciences 57 ( 11) 1 -19

2
2014
APPLET: a privacy-preserving framework for location-aware recommender system

Xindi Ma , Hui Li , Jianfeng Ma , Qi Jiang
Science China Information Sciences 60 ( 9) 092101

42
2017
Credit-based scheme for security-aware and fairness-aware resource allocation in cloud computing

Di Lu , Jianfeng Ma , Cong Sun , Xindi Ma
Science China Information Sciences 60 ( 5) 52103

1
2017
Distributed Quantitative Information Flow Evaluation for Service Composition in Clouds

Ning Xi , Cong Sun , Jianfeng Ma , Jing Lv
trust security and privacy in computing and communications 200 -207

2019
Distributed Secure Service Composition with Declassification in Mobile Clouds

Ning Xi , Di Lu , Cong Sun , Jianfeng Ma
Mobile Information Systems 2017 1 -13

2
2017
A universal fairness evaluation framework for resource allocation in cloud computing

Di Lu , Jianfeng Ma , Ning Xi
China Communications 12 ( 5) 113 -122

7
2015
Distributed information flow verification for secure service composition in smart sensor network

Ning Xi , Cong Sun , Jianfeng Ma , Xiaofeng Chen
China Communications 13 ( 4) 119 -130

2
2016
Information flow control on encrypted data for service composition among multiple clouds

Ning Xi , Jianfeng Ma , Cong Sun , Di Lu
Distributed and Parallel Databases 36 ( 3) 511 -527

1
2018
Verifying Secure Interface Composition for Component-Based System Designs

Cong Sun , Ning Xi , Jinku Li , Qingsong Yao
asia-pacific software engineering conference 1 359 -366

4
2014
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks

Yulong Shen , Xiaowei Dang , Min Shu , Ning Xi
International Journal of Distributed Sensor Networks 8 ( 10) 868943

4
2012