Browsing byAuthorXiang, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 45 to 64 of 88< previous   next >
Issue DateTitleAuthor(s)
2021-12-30KIT Bus: A Shuttle Model for CARLA SimulatorXiang, Y; Wang, S; Su, T; Li, J; Mao, SS; Geimer, M
2021-07-01Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party ControlLiu, J; Hou, J; Yang, W; Xiang, Y; Zhou, W; Wu, W; Huang, X
2018-03-31Location Privacy and Its Applications: A Systematic StudyLiu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y
2018Location Privacy in Mobile ApplicationsLiu, B; Zhou, W; Zhu, T; Xiang, Y; Wang, K
2019-04-01Location privacy protection in smart health care systemNatgunanathan, I; Mehmood, A; Xiang, Y; Gao, L; Yu, S
2018-10-01Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia ThingsZhang, Y; He, Q; Xiang, Y; Zhang, LY; Liu, B; Chen, J; Xie, Y
2018-03-19Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing ArchitectureYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
2010-01Machine Learning Techniques for Network Intrusion DetectionTran, TP; Tsai, PC; Jan, T; He, S; Shawkat Ali, ABM; Xiang, Y
2019Malicious Attack Propagation and Source IdentificationJiang, J; Wen, S; Liu, B; Yu, S; Xiang, Y; Zhou, W
2017-09-07Message from the IEEE TrustCom 2017 Program ChairsNanda, P; Xiang, Y; Mu, Y
2021-01-01Non-Linear-Echo Based Anti-Collusion Mechanism for Audio SignalsZong, T; Xiang, Y; Natgunanathan, I; Gao, L; Hua, G; Zhou, W
2019-03-01On exploiting priority relation graph for reliable multi-path communication in mobile social networksLin, L; Xu, L; Huang, Y; Xiang, Y; He, X
2016-12-01On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor NetworksSayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W
2016-12-01Performance analysis of software-defined network switch using M/Geo/1 modelSood, K; Yu, S; Xiang, Y
2022-01-01Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential PrivacyQu, Y; Gao, L; Yu, S; Xiang, Y
2021-03-01Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyondSood, K; Karmakar, KK; Varadharajen, V; Kumar, N; Xiang, Y; Yu, S
2018-05-01Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networksWang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A
2019-01-01Preliminary of identifying propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Preliminary of modeling malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2022Privacy Preservation in IoT: Machine Learning Approaches, A Comprehensive Survey and Use CasesQu, Y; Gao, L; Yu, S; Xiang, Y