default search action
Xinsheng Ji
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Deqiang Zhou, Xinsheng Ji, Wei You, Hang Qiu, Yu Zhao, Mingyan Xu:
DDQN-SFCAG: A service function chain recovery method against network attacks in 6G networks. Comput. Networks 254: 110748 (2024) - [j30]Jiangxing Wu, Hong Zou, Jiaxi Chen, Fan Zhang, Yuting Shang, Xinsheng Ji:
On cultivation of cybersecurity and safety talents and responsible developers. Secur. Saf. 3: 2024010 (2024) - [i4]Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou:
Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network. CoRR abs/2402.00002 (2024) - [i3]Zhongfu Guo, Xinsheng Ji, Wei You, Yu Zhao, Bai Yi, Lingwei Wang:
Workload Distribution with Rateless Encoding: A Low-Latency Computation Offloading Method within Edge Networks. CoRR abs/2409.15151 (2024) - 2023
- [j29]Wei Xu, Yongming Huang, Wei Wang, Fusheng Zhu, Xinsheng Ji:
Toward ubiquitous and intelligent 6G networks: from architecture to technology. Sci. China Inf. Sci. 66(3) (2023) - [j28]Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou:
Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6G edge network. Comput. Networks 228: 109716 (2023) - [j27]Zhimo Cheng, Xinsheng Ji, Wei You, Yu Zhao, Zhongfu Guo:
SECHO: A deep reinforcement learning-based scheme for secure handover in mobile edge computing. Comput. Networks 229: 109769 (2023) - [j26]Zhongfu Guo, Xinsheng Ji, Wei You, Mingyan Xu, Yu Zhao, Zhimo Cheng, Deqiang Zhou, Lingwei Wang:
LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network. Entropy 25(7): 966 (2023) - [j25]Zhimo Cheng, Xinsheng Ji, Wei You, Yi Bai, Yunjie Chen, Xiaogang Qin:
FLPP: A Federated-Learning-Based Scheme for Privacy Protection in Mobile Edge Computing. Entropy 25(11): 1551 (2023) - [j24]Wenyu Jiang, Jie Yang, Xinsheng Ji, Kaizhi Huang, Jinmei Yang:
Robust Security Transmission Scheme for SWIPT-Enable Heterogeneous Networks With RIS. IEEE Syst. J. 17(4): 5417-5428 (2023) - 2022
- [j23]Hang Qiu, Hongbo Tang, Yu Zhao, Wei You, Xinsheng Ji:
Traffic Forecast Assisted Adaptive VNF Dynamic Scaling. KSII Trans. Internet Inf. Syst. 16(11): 3584-3602 (2022) - [j22]Xinsheng Ji, Jiangxing Wu, Liang Jin, Kaizhi Huang, Yajun Chen, Xiaoli Sun, Wei You, Shumin Huo, Jing Yang:
Discussion on a new paradigm of endogenous security towards 6G networks. Frontiers Inf. Technol. Electron. Eng. 23(10): 1421-1450 (2022) - 2021
- [j21]Jie Yang, Xinsheng Ji, Kaizhi Huang, Xiaoli Sun, Yi Wang:
Enhanced Secure SWIPT in Heterogeneous Network via Intelligent Reflecting Surface. Secur. Commun. Networks 2021: 8836757:1-8836757:12 (2021) - [j20]Jie Yang, Xinsheng Ji, Feihu Wang, Kaizhi Huang, Lin Guo:
A Novel Pilot Spoofing Scheme via Intelligent Reflecting Surface Based on Statistical CSI. IEEE Trans. Veh. Technol. 70(12): 12847-12857 (2021) - [c11]Jiang Wang, Zheng Zhang, Bolin Ma, Yuan Yao, Xinsheng Ji:
Research on SSTI attack defense technology based on instruction set randomization. ICAIIS 2021: 287:1-287:5 - 2020
- [j19]Jinsong Li, Jianhua Peng, Shuxin Liu, Xinsheng Ji, Xing Li, Xinxin Hu:
Link Prediction in Directed Networks Utilizing the Role of Reciprocal Links. IEEE Access 8: 28668-28680 (2020) - [j18]Hui Li, Fusheng Zhu, Yiqin Lu, Wai Ho Mow, Wai-Ho Yeung, Zefeng Zheng, Peng Yi, Xinsheng Ji, Qinrang Liu, Wei Li, Kaiyan Tian, Jiangxing Wu, Jiang Zhu, Jiaxing Song, Yijun Liu, Junfeng Ma, Jiawei Hu, Jiansen Huang, Guohua Wei, Jiuhua Qi, Ting Huang, Kaixuan Xing, Xin Yang, Han Wang, Julong Lan, Ke Xu, Hua Tan, Jinwu Wei, Wei Liang:
MIN: Co-Governing Multi-Identifier Network Architecture and Its Prototype on Operator's Network. IEEE Access 8: 36569-36581 (2020) - [j17]Quan Yuan, Xinsheng Ji, Hongbo Tang, Wei You:
Toward Latency-Optimal Placement and Autoscaling of Monitoring Functions in MEC. IEEE Access 8: 41649-41658 (2020) - [c10]Xuelei Zhao, Xinsheng Ji, Shuxin Liu, Zanyuan He:
Link Prediction Based on Information Preference Connection for Directed Network. SmartIoT 2020: 183-189
2010 – 2019
- 2019
- [j16]Shaoyu Wang, Xiaoming Xu, Kaizhi Huang, Xinsheng Ji, Yajun Chen, Liang Jin:
Artificial Noise Aided Hybrid Analog-Digital Beamforming for Secure Transmission in MIMO Millimeter Wave Relay Systems. IEEE Access 7: 28597-28606 (2019) - [j15]Jing Yang, Xinsheng Ji, Kaizhi Huang, Yajun Chen, Xiaoming Xu, Ming Yi:
Unified and fast handover authentication based on link signatures in 5G SDN-based HetNet. IET Commun. 13(2): 144-152 (2019) - [j14]Yajun Chen, Ming Yi, Zhou Zhong, Keming Ma, Kaizhi Huang, Xinsheng Ji:
Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks. KSII Trans. Internet Inf. Syst. 13(10): 4923-4939 (2019) - [j13]Senyou Li, Xinsheng Ji, Wei You, Xing Zhao:
一种基于差分隐私的数据查询分级控制策略 (Hierarchical Control Strategy for Data Querying Based on Differential Privacy). 计算机科学 46(11): 130-136 (2019) - [i2]Hui Li, Jiangxing Wu, Kaixuan Xing, Peng Yi, Julong Lan, Xinsheng Ji, Qinrang Liu, Shisheng Chen, Wei Liang, Jinwu Wei, Wei Li, Fusheng Zhu, Kaiyan Tian, Jiang Zhu, Yiqin Lu, Ke Xu, Jiaxing Song, Yijun Liu, Junfeng Ma, Rui Xu, Jianming Que, Weihao Yang, Weihao Miu, Zefeng Zheng, Guohua Wei, Jiuhua Qi, Yongjie Bai, Chonghui Ning, Han Wang, Xinchun Zhang, Xin Yang, Jiansen Huang, Sai Lv, Xinwei Liu, Gengxin Li:
The Prototype of Decentralized Multilateral Co-Governing Post-IP Internet Architecture and Its Testing on Operator Networks. CoRR abs/1906.06901 (2019) - [i1]Hui Li, Jiangxing Wu, Xin Yang, Han Wang, Julong Lan, Ke Xu, Yunyong Zhang, Jinwu Wei, Shisheng Chen, Wei Liang, Fusheng Zhu, Yiqin Lu, Wai Ho Mow, Wai-Ho Yeung, Zefeng Zheng, Peng Yi, Xinsheng Ji, Qinrang Liu, Wei Li, Kaiyan Tian, Jiang Zhu, Jiaxing Song, Yijun Liu, Junfeng Ma, Jiawei Hu, Rui Xu, Jiansen Huang, Guohua Wei, Jiuhua Qi, Ting Huang, Kaixuan Xing:
MIN: Co-Governing Multi-Identifier Network Architecture and its Prototype on Operator's Network. CoRR abs/1908.00418 (2019) - 2018
- [j12]Xiaohui Qi, Kaizhi Huang, Bin Li, Liang Jin, Xinsheng Ji:
Physical layer security in multi-antenna cognitive heterogeneous cellular networks: a unified secrecy performance analysis. Sci. China Inf. Sci. 61(2): 022310:1-022310:15 (2018) - [j11]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Bin Li, Xiaolei Kang:
Opportunistic access control for enhancing security in D2D-enabled cellular networks. Sci. China Inf. Sci. 61(4): 042304:1-042304:12 (2018) - [j10]Xinsheng Ji, Kaizhi Huang, Liang Jin, Hongbo Tang, Caixia Liu, Zhou Zhong, Wei You, Xiaoming Xu, Hua Zhao, Jiangxing Wu, Ming Yi:
Overview of 5G security technology. Sci. China Inf. Sci. 61(8): 081301:1-081301:25 (2018) - [j9]Caixia Liu, Xinsheng Ji, Jiangxing Wu, Xiao Qin:
A proactive defense mechanism for mobile communication user data. Sci. China Inf. Sci. 61(10): 109303:1-109303:3 (2018) - [j8]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Bin Li, Xiaolei Kang:
Minimizing secrecy outage probability in D2D-enabled cellular networks: Access control with power optimization. Trans. Emerg. Telecommun. Technol. 29(1) (2018) - [j7]Jiang-xing Wu, Jian-hua Li, Xin-sheng Ji:
Security for cyberspace: challenges and opportunities. Frontiers Inf. Technol. Electron. Eng. 19(12): 1459-1461 (2018) - [j6]Zhiqiang Qin, Jinlong Wang, Jin Chen, Guoru Ding, Yu-Dong Yao, Xinsheng Ji, Xiangming Chen:
Link Quality Analysis Based Channel Selection in High-Frequency Asynchronous Automatic Link Establishment: A Matrix Completion Approach. IEEE Syst. J. 12(2): 1957-1968 (2018) - 2017
- [j5]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Jing Yang, Xin Hu, Yunjia Xu:
Artificial noise-assisted physical layer security in D2D-enabled cellular networks. EURASIP J. Wirel. Commun. Netw. 2017: 178 (2017) - [j4]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Jing Yang, Xin Hu, Yunjia Xu:
Correction to: Artificial noise-assisted physical layer security in D2D-enabled cellular networks. EURASIP J. Wirel. Commun. Netw. 2017: 199 (2017) - [j3]Jing Yang, Xinsheng Ji, Kaizhi Huang, Ming Yi, Yajun Chen:
AKA-PLA: Enhanced AKA Based on Physical Layer Authentication. KSII Trans. Internet Inf. Syst. 11(7): 3747-3765 (2017) - [c9]Yajun Chen, Xinsheng Ji, Jing Yang, Kaizhi Huang, Ming Yi:
Physical layer security in D2D-enabled cellular networks: Artificial noise assisted. PIMRC 2017: 1-6 - [c8]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Xiaolei Kang:
Secrecy Outage and Diversity Analysis in D2D-Enabled Cellular Networks. VTC Spring 2017: 1-5 - 2016
- [j2]Yan-Yu Zhang, Hong-Yi Yu, Jian-Kang Zhang, Yi-Jun Zhu, Jin-Long Wang, Xin-Sheng Ji:
On the Optimality of Spatial Repetition Coding for MIMO Optical Wireless Communications. IEEE Commun. Lett. 20(5): 846-849 (2016) - [c7]Xiaolei Kang, Xinsheng Ji, Kaizhi Huang, Zhou Zhong:
Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted. VTC Fall 2016: 1-5 - [c6]Jinsong Li, Yunzhou Li, Xinsheng Ji:
A novel method of Wi-Fi indoor localization based on channel state information. WCSP 2016: 1-5 - [c5]Yajun Chen, Xinsheng Ji, Kaizhi Huang, Xiaolei Kang, Xiaohui Qi:
Secrecy analysis in D2D-enabled cellular networks against spatially random eavesdroppers. WPMC 2016: 262-267 - 2015
- [c4]Jing Yang, Xinsheng Ji, Kaizhi Huang, Yajun Chen, Xiaohui Qi:
A physical-layer authentication scheme based on hash method. ICCC Workshops 2015: 99-104 - 2014
- [j1]Ming Yi, Xinsheng Ji, Kaizhi Huang, Hong Wen, Bin Wu:
Achieving strong security based on fountain code with coset pre-coding. IET Commun. 8(14): 2476-2483 (2014) - [c3]Hua Zhao, Yang Liu, Kaizhi Huang, Xinsheng Ji, Dapeng Wang:
A Study on Networking Scheme of Indoor Visible Light Communication Networks. VTC Spring 2014: 1-5 - 2011
- [c2]Xiaolong Xie, Xinsheng Ji, Caixia Liu:
Analysis of Abnormal Events in IMS and Research on the Strategy of Detection. CIS 2011: 712-716
2000 – 2009
- 2008
- [c1]Yucun Yang, Suili Feng, Wu Ye, Xinsheng Ji:
A Transmission Scheme for Encrypted Speech over GSM Network. ISCSCT (2) 2008: 805-808
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint