Browsing byAuthorXiang, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 21 to 40 of 88< previous   next >
Issue DateTitleAuthor(s)
2015-01-01Damage detection of circular cylindrical shells by ritz method and wavelet analysisSarker, L; Xiang, Y; Zhu, XQ; Zhang, YY
2018-05-29A data-driven attack against support vectors of SVMLiu, S; Zhou, W; Zhang, J; Xiang, Y; Wangt, Y; De Vel, O
2018-03-16Density-Based Location Preservation for Mobile Crowdsensing with Differential PrivacyYang, M; Zhu, T; Xiang, Y; Zhou, W
2015-01-01Design and implementation of the hadoop-based crawler for SaaS service discoveryAlkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y
2021-01-01Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient ModificationZhao, J; Zong, T; Xiang, Y; Gao, L; Zhou, W; Beliakov, G
2022-01-01Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channelsZong, T; Zhao, J; Xiang, Y; Natgunanathan, I; Gao, L; Zhou, W
2018-01-01A differential game approach to patch injectionYang, LX; Li, P; Yang, X; Xiang, Y; Zhou, W
2018-05-27Differential Private POI Queries via Johnson-Lindenstrauss TransformYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
2018-01-01Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databasesLiu, J; Ma, J; Zhou, W; Xiang, Y; Huang, X
2019-04-01E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
2021-01-01Effective Quarantine and Recovery Scheme Against Advanced Persistent ThreatYang, LX; Li, P; Yang, X; Xiang, Y; Jiang, F; Zhou, W
2019-07-01Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game ApproachYang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W
2022-11Event detection in online social network: Methodologies, state-of-art, and evolutionHu, X; Ma, W; Chen, C; Wen, S; Zhang, J; Xiang, Y; Fei, G
2022-01-01FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin NetworksQu, Y; Gao, L; Xiang, Y; Shen, S; Yu, S
2022-05-01Finite Element Analysis of Electro-Thermal Coupling of Sandstone Under Lightning CurrentsRao, P; Xiang, Y; Ouyang, P; Nimbalkar, S; Chen, Q
2020-10-15Free vibration and damage identification of cracked functionally graded platesZhu, LF; Ke, LL; Xiang, Y; Zhu, XQ
2019-01-01Future directions and conclusionJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2017-12-01Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data LearningLiu, S; Zhang, J; Xiang, Y; Zhou, W
2019-01-01Identifying multiple propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in large-scale networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W