Showing results 116 to 135 of 222
< previous
next >
Issue Date | Title | Author(s) |
2022-01-01 | Label-Only Membership Inference Attacks and Defenses In Semantic Segmentation Models | Zhang, G; Liu, B; Zhu, T; Ding, M; Zhou, W |
2023-01-01 | Label-Only Model Inversion Attacks: Attack With the Least Information | Zhu, T; Ye, D; Zhou, S; Liu, B; Zhou, W |
2021-07-01 | Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party Control | Liu, J; Hou, J; Yang, W; Xiang, Y; Zhou, W; Wu, W; Huang, X |
2022-01-01 | Learning Games for Defending Advanced Persistent Threats in Cyber Systems | Zhu, T; Ye, D; Cheng, Z; Zhou, W; Yu, PS |
2018-03-31 | Location Privacy and Its Applications: A Systematic Study | Liu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y |
2018 | Location Privacy in Mobile Applications | Liu, B; Zhou, W; Zhu, T; Xiang, Y; Wang, K |
2023-01-01 | Location-Based Real-Time Updated Advising Method for Traffic Signal Control | Zhu, C; Ye, D; Zhu, T; Zhou, W |
2018-03-19 | Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2023-08-28 | Machine Unlearning: A Survey | Xu, H; Zhu, T; Zhang, L; Zhou, W; Yu, PS |
2023-11-01 | Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack | Liu, C; Chen, H; Zhu, T; Zhang, J; Zhou, W |
2019 | Malicious Attack Propagation and Source Identification | Jiang, J; Wen, S; Liu, B; Yu, S; Xiang, Y; Zhou, W |
2018-11-01 | Malware propagations in wireless Ad Hoc networks | Liu, B; Zhou, W; Gao, L; Zhou, H; Luan, TH; Wen, S |
2019-01-01 | A manifesto for future generation cloud computing: Research directions for the next decade | Buyya, R; Srirama, SN; Casale, G; Calheiros, R; Simmhan, Y; Varghese, B; Gelenbe, E; Javadi, B; Vaquero, LM; Netto, MAS; Toosi, AN; Rodriguez, MA; Llorente, IM; De Capitani Di Vimercati, S; Samarati, P; Milojicic, D; Varela, C; Bahsoon, R; Dias De Assuncao, M; Rana, O; Zhou, W; Jin, H; Gentzsch, W; Zomaya, AY; Shen, H |
2022-05-01 | Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing | Li, J; Liang, W; Xu, W; Xu, Z; Jia, X; Zhou, W; Zhao, J |
2019-11-12 | MFE-HAR: Multiscale feature engineering for human activity recognition using wearable sensors | Lu, J; Zheng, X; Sheng, QZ; Hussain, Z; Wang, J; Zhou, W |
2022-02-14 | Model-Based Self-Advising for Multi-Agent Learning. | Ye, D; Zhu, T; Zhu, C; Zhou, W; Yu, PS |
2022-09-01 | More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design | Zhang, L; Zhu, T; Xiong, P; Zhou, W; Yu, PS |
2022-01-01 | More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence | Zhu, T; Ye, D; Wang, W; Zhou, W; Yu, P |
2020-08-04 | More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence | Zhu, T; Ye, D; Wang, W; Zhou, W; Yu, PS |
2019-07-01 | MPTC for PMSMs of EVs with Multi-Motor Driven System Considering Optimal Energy Allocation | Sun, X; Hu, C; Zhu, J; Wang, S; Zhou, W; Yang, Z; Lei, G; Li, K; Zhu, B; Guo, Y |