Follow
Jianwei Niu
Title
Cited by
Cited by
Year
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things
X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari
IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2017
4072017
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo
Journal of Network and Computer Applications 103, 194-204, 2018
3782018
Management and applications of trust in Wireless Sensor Networks: A survey
G Han, J Jiang, L Shu, J Niu, HC Chao
Journal of Computer and System Sciences 80 (3), 602-617, 2014
3542014
ROWLBAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models and …, 2008
3392008
Influence analysis in social networks: A survey
S Peng, Y Zhou, L Cao, S Yu, J Niu, W Jia
Journal of Network and Computer Applications 106, 17-32, 2018
3212018
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X Li, JW Niu, J Ma, WD Wang, CL Liu
Journal of network and computer applications 34 (1), 73-79, 2011
3142011
You only look at one sequence: Rethinking transformer in vision through object detection
Y Fang, B Liao, X Wang, J Fang, J Qi, R Wu, J Niu, W Liu
Advances in Neural Information Processing Systems 34, 26183-26197, 2021
3102021
An enhanced smart card based remote user password authentication scheme
X Li, J Niu, MK Khan, J Liao
Journal of Network and Computer Applications 36 (5), 1365-1371, 2013
3002013
A survey on incorporating domain knowledge into deep learning for medical image analysis
X Xie, J Niu, X Liu, Z Chen, S Tang, S Yu
Medical Image Analysis 69, 101985, 2021
2892021
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International conference on software engineering, 25-36, 2016
2572016
Opportunistic networks
YP Xiong, LM Sun, JW Niu, Y Liu
Journal of Software 20 (1), 124-137, 2009
253*2009
Visformer: The vision-friendly transformer
Z Chen, L Xie, J Niu, X Liu, L Wei, Q Tian
Proceedings of the IEEE/CVF international conference on computer vision, 589-598, 2021
2302021
A robust and energy efficient authentication protocol for industrial internet of things
X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo
IEEE Internet of Things Journal 5 (3), 1606-1615, 2017
2162017
Robust lane detection using two-stage feature extraction with curve fitting
J Niu, J Lu, M Xu, P Lv, X Zhao
Pattern Recognition 59, 225-233, 2016
2102016
QoS aware geographic opportunistic routing in wireless sensor networks
L Cheng, J Niu, J Cao, SK Das, Y Gu
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1864-1875, 2013
2102013
Energy efficient security algorithm for power grid wide area monitoring system
M Qiu, W Gao, M Chen, JW Niu, L Zhang
IEEE Transactions on Smart Grid 2 (4), 715-723, 2011
2022011
Adaptive resource allocation for preemptable jobs in cloud systems
J Li, M Qiu, JW Niu, Y Chen, Z Ming
2010 10th International Conference on Intelligent Systems Design and …, 2010
1842010
SentiDiff: combining textual information and sentiment diffusion patterns for Twitter sentiment analysis
L Wang, J Niu, S Yu
IEEE Transactions on Knowledge and Data Engineering 32 (10), 2026-2039, 2019
1652019
Energy-aware data allocation with hybrid memory for mobile cloud systems
M Qiu, Z Chen, Z Ming, X Qin, J Niu
IEEE Systems Journal 11 (2), 813-822, 2014
1612014
A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity
X Li, J Niu, S Kumari, J Liao, W Liang, MK Khan
Security and Communication Networks 9 (15), 2643-2655, 2016
1552016
The system can't perform the operation now. Try again later.
Articles 1–20