Browsing byAuthorJiang, F

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 64 to 74 of 74< previous 
Issue DateTitleAuthor(s)
2008Self-adaptability, resilience and vulnerability in autonomic communications with biology-inspired strategiesJiang, F
2018-01-01Single image rain removal via a simplified residual dense networkXia, H; Zhuge, R; Li, H; Song, S; Jiang, F; Xu, M
2021-07-15Smooth Surface Defect Detection by Deep Learning Based on Wrapped Phase MapTao, J; Zhu, Y; Liu, W; Jiang, F; Liu, H
2021-01-01Social Spammer Detection Based on PSO-CatBoostLi, S; Jiang, F; Qin, Y; Zheng, K
2022Solving the last mile problem in logistics: A mobile edge computing and blockchain-based unmanned aerial vehicle delivery systemLi, X; Gong, L; Liu, X; Jiang, F; Shi, W; Fan, L; Gao, H; Li, R; Xu, J
2019-10-10Static malware clustering using enhanced deep embedding methodNg, CK; Jiang, F; Zhang, LY; Zhou, W
2020-04-17UAV Swarm Mission Planning in Dynamic Environment Using Consensus-Based Bundle Algorithm.Zhang, Y; Feng, W; Shi, G; Jiang, F; Chowdhury, M; Ling, SH
2023-09-03Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity ReviewHilowle, M; Yeoh, W; Grobler, M; Pye, G; Jiang, F
2020-07-25VoterChoice: A ransomware detection honeypot with multiple voting frameworkKeong Ng, C; Rajasegarar, S; Pan, L; Jiang, F; Zhang, LY
2017-01-01Who will be the next to drop out? Anticipating dropouts in MOOCs with multi-view featuresJiang, F; Li, W
2023-10Zero trust cybersecurity: Critical success factors and A maturity assessment frameworkYeoh, W; Liu, M; Shore, M; Jiang, F