Jianwei Niu
Cited by
Cited by
ROWLBAC: representing role based access control in OWL
T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ...
Proceedings of the 13th ACM symposium on Access control models andá…, 2008
Cryptanalysis and improvement of a biometrics-based remote user authentication scheme using smart cards
X Li, JW Niu, J Ma, WD Wang, CL Liu
Journal of network and computer applications 34 (1), 73-79, 2011
Management and applications of trust in Wireless Sensor Networks: A survey
G Han, J Jiang, L Shu, J Niu, HC Chao
Journal of Computer and System Sciences 80 (3), 602-617, 2014
An enhanced smart card based remote user password authentication scheme
X Li, J Niu, MK Khan, J Liao
Journal of Network and Computer Applications 36 (5), 1365-1371, 2013
Opportunistic networks
YP Xiong, LM Sun, JW Niu, Y Liu
Journal of Software 20 (1), 124-137, 2009
QoS aware geographic opportunistic routing in wireless sensor networks
L Cheng, J Niu, J Cao, SK Das, Y Gu
IEEE Transactions on Parallel and Distributed Systems 25 (7), 1864-1875, 2013
Adaptive resource allocation for preemptable jobs in cloud systems
J Li, M Qiu, JW Niu, Y Chen, Z Ming
2010 10th International Conference on Intelligent Systems Design andá…, 2010
A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments
X Li, J Niu, S Kumari, F Wu, AK Sangaiah, KKR Choo
Journal of Network and Computer Applications 103, 194-204, 2018
Energy efficient security algorithm for power grid wide area monitoring system
M Qiu, W Gao, M Chen, JW Niu, L Zhang
IEEE Transactions on Smart Grid 2 (4), 715-723, 2011
R3E: Reliable reactive routing enhancement for wireless sensor networks
J Niu, L Cheng, Y Gu, L Shu, SK Das
IEEE Transactions on Industrial Informatics 10 (1), 784-794, 2013
A robust ECC-based provable secure authentication protocol with privacy preserving for industrial internet of things
X Li, J Niu, MZA Bhuiyan, F Wu, M Karuppiah, S Kumari
IEEE Transactions on Industrial Informatics 14 (8), 3599-3609, 2017
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016
ZIL: An energy-efficient indoor localization system using ZigBee radio to detect WiFi fingerprints
J Niu, B Wang, L Shu, TQ Duong, Y Chen
IEEE Journal on Selected Areas in Communications 33 (7), 1431-1442, 2015
Cryptanalysis of a dynamic identity‐based remote user authentication scheme with verifiable password update
X Li, J Niu, J Liao, W Liang
International Journal of Communication Systems 28 (2), 374-382, 2015
An enhancement of a smart card authentication scheme for multi-server architecture
X Li, J Niu, S Kumari, J Liao, W Liang
Wireless Personal Communications 80 (1), 175-192, 2015
A robust and energy efficient authentication protocol for industrial internet of things
X Li, J Peng, J Niu, F Wu, J Liao, KKR Choo
IEEE Internet of Things Journal 5 (3), 1606-1615, 2017
An energy-balanced heuristic for mobile sink scheduling in hybrid WSNs
ZB Zhou, C Du, L Shu, G Hancke, J Niu, H Ning
IEEE Transactions on Industrial Informatics 12 (1), 28-40, 2015
Energy-aware data allocation with hybrid memory for mobile cloud systems
M Qiu, Z Chen, Z Ming, X Qin, J Niu
IEEE Systems Journal 11 (2), 813-822, 2014
Thermal-aware task scheduling in 3D chip multiprocessor with real-time constrained workloads
J Li, M Qiu, JW Niu, LT Yang, Y Zhu, Z Ming
ACM Transactions on Embedded Computing Systems (TECS) 12 (2), 1-22, 2013
Moving schemes for mobile sinks in wireless sensor networks
Y Bi, J Niu, L Sun, W Huangfu, Y Sun
2007 IEEE International Performance, Computing, and Communicationsá…, 2007
The system can't perform the operation now. Try again later.
Articles 1–20