Showing results 39 to 58 of 88
< previous
next >
Issue Date | Title | Author(s) |
2019-01-01 | Identifying multiple propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying propagation source in large-scale networks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying propagation source in time-varying networks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2017-01-01 | Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies | Jiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W |
2019-01-01 | Introduction | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-03-01 | An iteration-based differentially private social network data release | Zhu, T; Yang, M; Xiong, P; Xiang, Y; Zhou, W |
2021-12-30 | KIT Bus: A Shuttle Model for CARLA Simulator | Xiang, Y; Wang, S; Su, T; Li, J; Mao, SS; Geimer, M |
2021-07-01 | Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party Control | Liu, J; Hou, J; Yang, W; Xiang, Y; Zhou, W; Wu, W; Huang, X |
2018-03-31 | Location Privacy and Its Applications: A Systematic Study | Liu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y |
2018 | Location Privacy in Mobile Applications | Liu, B; Zhou, W; Zhu, T; Xiang, Y; Wang, K |
2019-04-01 | Location privacy protection in smart health care system | Natgunanathan, I; Mehmood, A; Xiang, Y; Gao, L; Yu, S |
2018-10-01 | Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things | Zhang, Y; He, Q; Xiang, Y; Zhang, LY; Liu, B; Chen, J; Xie, Y |
2018-03-19 | Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2010-01 | Machine Learning Techniques for Network Intrusion Detection | Tran, TP; Tsai, PC; Jan, T; He, S; Shawkat Ali, ABM; Xiang, Y |
2019 | Malicious Attack Propagation and Source Identification | Jiang, J; Wen, S; Liu, B; Yu, S; Xiang, Y; Zhou, W |
2017-09-07 | Message from the IEEE TrustCom 2017 Program Chairs | Nanda, P; Xiang, Y; Mu, Y |
2021-01-01 | Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals | Zong, T; Xiang, Y; Natgunanathan, I; Gao, L; Hua, G; Zhou, W |
2019-03-01 | On exploiting priority relation graph for reliable multi-path communication in mobile social networks | Lin, L; Xu, L; Huang, Y; Xiang, Y; He, X |
2016-12-01 | On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks | Sayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W |
2016-12-01 | Performance analysis of software-defined network switch using M/Geo/1 model | Sood, K; Yu, S; Xiang, Y |