Showing results 21 to 40 of 88
< previous
next >
Issue Date | Title | Author(s) |
2015-01-01 | Damage detection of circular cylindrical shells by ritz method and wavelet analysis | Sarker, L; Xiang, Y; Zhu, XQ; Zhang, YY |
2018-05-29 | A data-driven attack against support vectors of SVM | Liu, S; Zhou, W; Zhang, J; Xiang, Y; Wangt, Y; De Vel, O |
2018-03-16 | Density-Based Location Preservation for Mobile Crowdsensing with Differential Privacy | Yang, M; Zhu, T; Xiang, Y; Zhou, W |
2015-01-01 | Design and implementation of the hadoop-based crawler for SaaS service discovery | Alkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y |
2021-01-01 | Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification | Zhao, J; Zong, T; Xiang, Y; Gao, L; Zhou, W; Beliakov, G |
2022-01-01 | Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels | Zong, T; Zhao, J; Xiang, Y; Natgunanathan, I; Gao, L; Zhou, W |
2018-01-01 | A differential game approach to patch injection | Yang, LX; Li, P; Yang, X; Xiang, Y; Zhou, W |
2018-05-27 | Differential Private POI Queries via Johnson-Lindenstrauss Transform | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases | Liu, J; Ma, J; Zhou, W; Xiang, Y; Huang, X |
2019-04-01 | E-AUA: An efficient anonymous user authentication protocol for mobile IoT | Zeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W |
2021-01-01 | Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat | Yang, LX; Li, P; Yang, X; Xiang, Y; Jiang, F; Zhou, W |
2019-07-01 | Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach | Yang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W |
2022-11 | Event detection in online social network: Methodologies, state-of-art, and evolution | Hu, X; Ma, W; Chen, C; Wen, S; Zhang, J; Xiang, Y; Fei, G |
2022-01-01 | FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks | Qu, Y; Gao, L; Xiang, Y; Shen, S; Yu, S |
2022-05-01 | Finite Element Analysis of Electro-Thermal Coupling of Sandstone Under Lightning Currents | Rao, P; Xiang, Y; Ouyang, P; Nimbalkar, S; Chen, Q |
2020-10-15 | Free vibration and damage identification of cracked functionally graded plates | Zhu, LF; Ke, LL; Xiang, Y; Zhu, XQ |
2019-01-01 | Future directions and conclusion | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2017-12-01 | Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data Learning | Liu, S; Zhang, J; Xiang, Y; Zhou, W |
2019-01-01 | Identifying multiple propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying propagation source in large-scale networks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |