Browsing by Author Xiang, Y

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 23  next >
Issue DateTitleAuthor(s)
1-Jan-2018Adversaries or allies? Privacy and deep learning in big data eraLiu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W
25-Dec-2013A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computingDeng, K; Ren, K; Song, J; Yuan, D; Xiang, Y; Chen, J
15-Feb-2019Crack identification of functionally graded beams using continuous wavelet transformZhu, LF; Ke, LL; Zhu, XQ; Xiang, Y; Wang, YS
29-May-2018A data-driven attack against support vectors of SVMLiu, S; Zhou, W; Zhang, J; Xiang, Y; Wangt, Y; De Vel, O
16-Mar-2018Density-Based Location Preservation for Mobile Crowdsensing with Differential PrivacyYang, M; Zhu, T; Xiang, Y; Zhou, W
1-Jan-2015Design and implementation of the hadoop-based crawler for SaaS service discoveryAlkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y
1-Jan-2018A differential game approach to patch injectionYang, LX; Li, P; Yang, X; Xiang, Y; Zhou, W
27-May-2018Differential Private POI Queries via Johnson-Lindenstrauss TransformYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
1-Jan-2018Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databasesLiu, J; Ma, J; Zhou, W; Xiang, Y; Huang, X
1-Apr-2019E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
1-Jul-2019Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game ApproachYang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W
1-Mar-2018An iteration-based differentially private social network data releaseZhu, T; Yang, M; Xiong, P; Xiang, Y; Zhou, W
31-Mar-2018Location Privacy and Its Applications: A Systematic StudyLiu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y
19-Mar-2018Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing ArchitectureYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
Jan-2010Machine Learning Techniques for Network Intrusion DetectionTran, TP; Tsai, PC; Jan, T; He, S; Shawkat Ali, ABM; Xiang, Y
1-May-2018Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networksWang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A
15-May-2019A reliable reputation computation framework for online items in E-commerceMa, L; Pei, Q; Xiang, Y; Yao, L; Yu, S
1-Jan-2018Rumor Source Identification in Social Networks with Time-Varying TopologyJiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W
1-Jan-2018SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and VerificationReza Nosouhi, M; Yu, S; Grobler, M; Xiang, Y; Zhu, Z
29-Jan-2018A survey on big data stream processing in SDN supported cloud environmentAl-Mansoori, A; Yu, S; Xiang, Y; Sood, K