Showing results 248 to 267 of 487
< previous
next >
Issue Date | Title | Author(s) |
2022-01-01 | ICE: Intelligent Caching at the Edge | Wang, T; Mao, J; Chen, M; Liu, G; Di, J; Yu, S |
2022-01-01 | Identification of Encrypted Traffic Through Attention Mechanism Based Long Short Term Memory | Yao, H; Liu, C; Zhang, P; Wu, S; Jiang, C; Yu, S |
2019-01-01 | Identifying multiple propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying propagation source in large-scale networks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying propagation source in time-varying networks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2017-01-01 | Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies | Jiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W |
2021-01-01 | IEEE Access Special Section Editorial: Security and Privacy in Emerging Decentralized Communication Environments | Cheng, X; Liu, Z; Du, X; Yu, S; Mostarda, L |
2019-11-01 | An Immunization Framework for Social Networks Through Big Data Based Influence Modeling | Peng, S; Wang, G; Zhou, Y; Wan, C; Wang, C; Yu, S; Niu, J |
2019-08-01 | Impact of social network structures on uncertain opinion formation | Zhan, M; Liang, H; Kou, G; Dong, Y; Yu, S |
2017-04-01 | Impairment- and Splitting-Aware Cloud-Ready Multicast Provisioning in Elastic Optical Networks | Zhu, Z; Liu, X; Wang, Y; Lu, W; Gong, L; Yu, S; Ansari, N |
2019-03-01 | Improving Data Utility Through Game Theory in Personalized Differential Privacy | Cui, L; Qu, Y; Nosouhi, MR; Yu, S; Niu, JW; Xie, G |
2018-07-27 | Improving Data Utility through Game Theory in Personalized Differential Privacy | Qu, Y; Cui, L; Yu, S; Zhou, W; Wu, J |
2018-03-01 | Improving SDN Scalability with Protocol-Oblivious Source Routing: A System-Level Study | Li, S; Han, K; Ansari, N; Bao, Q; Hu, D; Liu, J; Yu, S; Zhu, Z |
2020 | IMS: An Identity-Based Many-to-Many Subscription Scheme with Efficient Key Management for Wireless Broadcast Systems | Shen, J; Miao, T; Lai, J-F; Chen, X; Li, J; Yu, S |
2019-02-01 | Inference attack in Android Activity based on program fingerprint | Yang, L; Zhi, Y; Wei, T; Yu, S; Ma, J |
2018-08-10 | Inference attack in android activity based on program fingerprint | Yang, L; Wei, T; Ma, J; Yu, S; Yang, C |
2023-10-06 | Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks | Tian, Z; Zhang, C; Sood, K; Yu, S |
2018-03-15 | Influence analysis in social networks: A survey | Peng, S; Zhou, Y; Cao, L; Yu, S; Niu, J; Jia, W |
2023-01-01 | Insights, Challenges and Opportunities | Wang, T; Li, B; Chen, M; Yu, S |
2023 | Intelligent Industrial Internet Systems, Architecture, Deployment and Applications | Dou, W; Xu, X; Yu, S |