Showing results 51 to 70 of 88
< previous
next >
Issue Date | Title | Author(s) |
2018-03-19 | Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2010-01 | Machine Learning Techniques for Network Intrusion Detection | Tran, TP; Tsai, PC; Jan, T; He, S; Shawkat Ali, ABM; Xiang, Y |
2019 | Malicious Attack Propagation and Source Identification | Jiang, J; Wen, S; Liu, B; Yu, S; Xiang, Y; Zhou, W |
2017-09-07 | Message from the IEEE TrustCom 2017 Program Chairs | Nanda, P; Xiang, Y; Mu, Y |
2021-01-01 | Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals | Zong, T; Xiang, Y; Natgunanathan, I; Gao, L; Hua, G; Zhou, W |
2019-03-01 | On exploiting priority relation graph for reliable multi-path communication in mobile social networks | Lin, L; Xu, L; Huang, Y; Xiang, Y; He, X |
2016-12-01 | On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks | Sayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W |
2016-12-01 | Performance analysis of software-defined network switch using M/Geo/1 model | Sood, K; Yu, S; Xiang, Y |
2022-01-01 | Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential Privacy | Qu, Y; Gao, L; Yu, S; Xiang, Y |
2021-03-01 | Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyond | Sood, K; Karmakar, KK; Varadharajen, V; Kumar, N; Xiang, Y; Yu, S |
2018-05-01 | Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks | Wang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A |
2019-01-01 | Preliminary of identifying propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Preliminary of modeling malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2022 | Privacy Preservation in IoT: Machine Learning Approaches, A Comprehensive Survey and Use Cases | Qu, Y; Gao, L; Yu, S; Xiang, Y |
2019-05-15 | A reliable reputation computation framework for online items in E-commerce | Ma, L; Pei, Q; Xiang, Y; Yao, L; Yu, S |
2019-01-01 | Restrain malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | Rumor Source Identification in Social Networks with Time-Varying Topology | Jiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W |
2020-05-01 | Secure and efficient sharing of authenticated energy usage data with privacy preservation | Liu, J; Hou, J; Huang, X; Xiang, Y; Zhu, T |
2022-09-01 | Social Media Event Prediction using DNN with Feedback Mechanism | Ma, W; Hu, X; Chen, C; Wen, S; Choo, KKR; Xiang, Y |
2016-08-01 | Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A Review | Sood, K; Yu, S; Xiang, Y |