Browsing by Author Xiang, Y

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 10 to 23 of 23< previous 
Issue DateTitleAuthor(s)
1-Apr-2019E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
1-Jul-2019Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game ApproachYang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W
1-Mar-2018An iteration-based differentially private social network data releaseZhu, T; Yang, M; Xiong, P; Xiang, Y; Zhou, W
31-Mar-2018Location Privacy and Its Applications: A Systematic StudyLiu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y
19-Mar-2018Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing ArchitectureYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
Jan-2010Machine Learning Techniques for Network Intrusion DetectionTran, TP; Tsai, PC; Jan, T; He, S; Shawkat Ali, ABM; Xiang, Y
1-May-2018Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networksWang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A
15-May-2019A reliable reputation computation framework for online items in E-commerceMa, L; Pei, Q; Xiang, Y; Yao, L; Yu, S
1-Jan-2018Rumor Source Identification in Social Networks with Time-Varying TopologyJiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W
1-Jan-2018SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and VerificationReza Nosouhi, M; Yu, S; Grobler, M; Xiang, Y; Zhu, Z
29-Jan-2018A survey on big data stream processing in SDN supported cloud environmentAl-Mansoori, A; Yu, S; Xiang, Y; Sood, K
1-Jul-2018Twitter spam detection: Survey of new approaches and comparative studyWu, T; Wen, S; Xiang, Y; Zhou, W
1-Jan-2018Using Adversarial Noises to Protect Privacy in Deep Learning EraLiu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W
27-Jul-2018Who spread to whom? Inferring online social networks with user featuresWang, D; Zhou, W; Zheng, JX; Wen, S; Zhang, J; Xiang, Y