Browsing byAuthorXiang, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 56 to 75 of 88< previous   next >
Issue DateTitleAuthor(s)
2019-03-01On exploiting priority relation graph for reliable multi-path communication in mobile social networksLin, L; Xu, L; Huang, Y; Xiang, Y; He, X
2016-12-01On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor NetworksSayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W
2016-12-01Performance analysis of software-defined network switch using M/Geo/1 modelSood, K; Yu, S; Xiang, Y
2022-01-01Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential PrivacyQu, Y; Gao, L; Yu, S; Xiang, Y
2021-03-01Plug-in over Plug-in Evaluation in Heterogeneous 5G Enabled Networks and beyondSood, K; Karmakar, KK; Varadharajen, V; Kumar, N; Xiang, Y; Yu, S
2018-05-01Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networksWang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A
2019-01-01Preliminary of identifying propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Preliminary of modeling malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2022Privacy Preservation in IoT: Machine Learning Approaches, A Comprehensive Survey and Use CasesQu, Y; Gao, L; Yu, S; Xiang, Y
2019-05-15A reliable reputation computation framework for online items in E-commerceMa, L; Pei, Q; Xiang, Y; Yao, L; Yu, S
2019-01-01Restrain malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2018-01-01Rumor Source Identification in Social Networks with Time-Varying TopologyJiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W
2020-05-01Secure and efficient sharing of authenticated energy usage data with privacy preservationLiu, J; Hou, J; Huang, X; Xiang, Y; Zhu, T
2022-09-01Social Media Event Prediction using DNN with Feedback MechanismMa, W; Hu, X; Chen, C; Wen, S; Choo, KKR; Xiang, Y
2016-08-01Software-Defined Wireless Networking Opportunities and Challenges for Internet-of-Things: A ReviewSood, K; Yu, S; Xiang, Y
2019-01-01Source identification under complete observations: A maximum likelihood (ML) source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Source identification under sensor observations: A Gaussian source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Source identification under snapshots: A sample path based source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2016-03-01Spammers Are Becoming "smarter" on TwitterChen, C; Zhang, J; Xiang, Y; Zhou, W; Oliver, J
2018-01-01SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and VerificationReza Nosouhi, M; Yu, S; Grobler, M; Xiang, Y; Zhu, Z