Showing results 67 to 86 of 89
< previous
next >
Issue Date | Title | Author(s) |
2019-01-01 | Restrain malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | Rumor Source Identification in Social Networks with Time-Varying Topology | Jiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W |
2020-05-01 | Secure and efficient sharing of authenticated energy usage data with privacy preservation | Liu, J; Hou, J; Huang, X; Xiang, Y; Zhu, T |
2022-09-01 | Social Media Event Prediction using DNN with Feedback Mechanism | Ma, W; Hu, X; Chen, C; Wen, S; Choo, KKR; Xiang, Y |
2016-08-01 | Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review | Sood, K; Yu, S; Xiang, Y |
2019-01-01 | Source identification under complete observations: A maximum likelihood (ML) source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Source identification under sensor observations: A Gaussian source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Source identification under snapshots: A sample path based source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2016-03-01 | Spammers Are Becoming "smarter" on Twitter | Chen, C; Zhang, J; Xiang, Y; Zhou, W; Oliver, J |
2018-01-01 | SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification | Reza Nosouhi, M; Yu, S; Grobler, M; Xiang, Y; Zhu, Z |
2018-03-01 | Spread Spectrum Audio Watermarking Using Multiple Orthogonal PN Sequences and Variable Embedding Strengths and Polarities | Xiang, Y; Natgunanathan, I; Peng, D; Hua, G; Liu, B |
2017-04-01 | Statistical Features-Based Real-Time Detection of Drifted Twitter Spam | Chen, C; Wang, Y; Zhang, J; Xiang, Y; Zhou, W; Min, G |
2019-04-01 | STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation | Wang, D; Wu, T; Wen, S; Chen, X; Xiang, Y; Zhou, W |
2022-01-01 | Summary and Outlook | Qu, Y; Gao, L; Yu, S; Xiang, Y |
2018-01-29 | A survey on big data stream processing in SDN supported cloud environment | Al-Mansoori, A; Yu, S; Xiang, Y; Sood, K |
2019-08-01 | Sustainability Analysis for Fog Nodes with Renewable Energy Supplies | Jiang, J; Gao, L; Jin, J; Luan, TH; Yu, S; Xiang, Y; Garg, S |
2023-08-01 | Toward IoT Node Authentication Mechanism in Next Generation Networks | Nguyen, DDN; Sood, K; Xiang, Y; Gao, L; Chi, L; Yu, S |
2018-07-01 | Twitter spam detection: Survey of new approaches and comparative study | Wu, T; Wen, S; Xiang, Y; Zhou, W |
2019-01-01 | User influence in the propagation of malicious attacks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | Using Adversarial Noises to Protect Privacy in Deep Learning Era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |