Browsing byAuthorXiang, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 51 to 70 of 88< previous   next >
Issue DateTitleAuthor(s)
2018-03-19Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing ArchitectureYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
2010-01Machine Learning Techniques for Network Intrusion DetectionTran, TP; Tsai, PC; Jan, T; He, S; Shawkat Ali, ABM; Xiang, Y
2019Malicious Attack Propagation and Source IdentificationJiang, J; Wen, S; Liu, B; Yu, S; Xiang, Y; Zhou, W
2017-09-07Message from the IEEE TrustCom 2017 Program ChairsNanda, P; Xiang, Y; Mu, Y
2021-01-01Non-Linear-Echo Based Anti-Collusion Mechanism for Audio SignalsZong, T; Xiang, Y; Natgunanathan, I; Gao, L; Hua, G; Zhou, W
2019-03-01On exploiting priority relation graph for reliable multi-path communication in mobile social networksLin, L; Xu, L; Huang, Y; Xiang, Y; He, X
2016-12-01On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor NetworksSayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W
2016-12-01Performance analysis of software-defined network switch using M/Geo/1 modelSood, K; Yu, S; Xiang, Y
2022-01-01Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential PrivacyQu, Y; Gao, L; Yu, S; Xiang, Y
2021-03-01Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyondSood, K; Karmakar, KK; Varadharajen, V; Kumar, N; Xiang, Y; Yu, S
2018-05-01Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networksWang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A
2019-01-01Preliminary of identifying propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Preliminary of modeling malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2022Privacy Preservation in IoT: Machine Learning Approaches, A Comprehensive Survey and Use CasesQu, Y; Gao, L; Yu, S; Xiang, Y
2019-05-15A reliable reputation computation framework for online items in E-commerceMa, L; Pei, Q; Xiang, Y; Yao, L; Yu, S
2019-01-01Restrain malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2018-01-01Rumor Source Identification in Social Networks with Time-Varying TopologyJiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W
2020-05-01Secure and efficient sharing of authenticated energy usage data with privacy preservationLiu, J; Hou, J; Huang, X; Xiang, Y; Zhu, T
2022-09-01Social Media Event Prediction using DNN with Feedback MechanismMa, W; Hu, X; Chen, C; Wen, S; Choo, KKR; Xiang, Y
2016-08-01Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A ReviewSood, K; Yu, S; Xiang, Y