Showing results 461 to 480 of 485
< previous
next >
Issue Date | Title | Author(s) |
2023-05-01 | UAV Placement for VR Reconstruction: A Tradeoff Between Resolution and Delay | Tang, XW; Huang, Y; Shi, Y; Huang, XL; Yu, S |
2024-02-15 | UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness Approach | Yin, Z; Cheng, N; Song, Y; Hui, Y; Li, Y; Luan, TH; Yu, S |
2022-09-01 | Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated Networks | Xu, Q; Su, Z; Lu, R; Yu, S |
2022-01-01 | UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies | Nosouhi, MR; Yu, S; Sood, K; Grobler, M; Jurdak, R; Dorri, A; Shen, S |
2021-05-15 | Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot | Feng, S; Shi, H; Huang, L; Shen, S; Yu, S; Peng, H; Wu, C |
2022-09-01 | Unsupervised Change Detection around Subways Based on SAR Combined Difference Images | Jiang, A; Dai, J; Yu, S; Zhang, B; Xie, Q; Zhang, H |
2019-01-01 | User influence in the propagation of malicious attacks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2022-08-01 | USST: A two-phase privacy-preserving framework for personalized recommendation with semi-distributed training | Zhou, Y; Liu, J; Wang, JH; Wang, J; Liu, G; Wu, D; Li, C; Yu, S |
2023-03-20 | Utility-Aware Privacy-Preserving Federated Learning through Information Bottleneck | Guo, S; Su, Z; Tian, Z; Yu, S |
2022-08-01 | Value-based reinforcement learning approaches for task offloading in Delay Constrained Vehicular Edge Computing | Son, DB; Binh, TH; Vo, HK; Nguyen, BM; Binh, HTT; Yu, S |
2023-06-21 | Variational co-embedding learning for attributed network clustering | Yang, S; Verma, S; Cai, B; Jiang, J; Yu, K; Chen, F; Yu, S |
2018-01-01 | Virtualization of Table Resources in Programmable Data Plane with Global Consideration | Xue, Y; Li, S; Han, K; Zhao, S; Huang, H; Yu, S; Zhu, Z |
2022-01-01 | VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated Learning | Wang, Y; Zhang, A; Wu, S; Yu, S |
2023-08-01 | VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems | Zhang, J; Liu, Y; Wu, D; Lou, S; Chen, B; Yu, S |
2022-07-01 | VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems | Liu, G; Zhang, W; Li, X; Fan, K; Yu, S |
2020-03-01 | Waiting times in aged care: What matters? | Yu, S; Byles, J |
2019 | What determines coverage by collective agreements or awards? | Yu, S; Peetz, D |
2016-01-01 | When Will You Have a New Mobile Phone? An Empirical Answer from Big Data | Ma, Q; Zhang, S; Zhou, W; Yu, S; Wang, C |
2020-10-01 | WiReader: Adaptive Air Handwriting Recognition Based on Commercial WiFi Signal | Guo, Z; Xiao, F; Sheng, B; Fei, H; Yu, S |
2020-10-01 | WiReader: Adaptive Air Handwriting Recognition Based on Commercial WiFi Signal | Guo, Z; Xiao, F; Sheng, B; Fei, H; Yu, S |