Browsing byAuthorYu, S

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 461 to 480 of 485< previous   next >
Issue DateTitleAuthor(s)
2023-05-01UAV Placement for VR Reconstruction: A Tradeoff Between Resolution and DelayTang, XW; Huang, Y; Shi, Y; Huang, XL; Yu, S
2024-02-15UAV-Assisted Secure Uplink Communications in Satellite-Supported IoT: Secrecy Fairness ApproachYin, Z; Cheng, N; Song, Y; Hui, Y; Li, Y; Luan, TH; Yu, S
2022-09-01Ubiquitous Transmission Service: Hierarchical Wireless Data Rate Provisioning in Space-Air-Ocean Integrated NetworksXu, Q; Su, Z; Lu, R; Yu, S
2022-01-01UCoin: An Efficient Privacy Preserving Scheme for CryptocurrenciesNosouhi, MR; Yu, S; Sood, K; Grobler, M; Jurdak, R; Dorri, A; Shen, S
2021-05-15Unknown hostile environment-oriented autonomous WSN deployment using a mobile robotFeng, S; Shi, H; Huang, L; Shen, S; Yu, S; Peng, H; Wu, C
2022-09-01Unsupervised Change Detection around Subways Based on SAR Combined Difference ImagesJiang, A; Dai, J; Yu, S; Zhang, B; Xie, Q; Zhang, H
2019-01-01User influence in the propagation of malicious attacksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2022-08-01USST: A two-phase privacy-preserving framework for personalized recommendation with semi-distributed trainingZhou, Y; Liu, J; Wang, JH; Wang, J; Liu, G; Wu, D; Li, C; Yu, S
2023-03-20Utility-Aware Privacy-Preserving Federated Learning through Information BottleneckGuo, S; Su, Z; Tian, Z; Yu, S
2022-08-01Value-based reinforcement learning approaches for task offloading in Delay Constrained Vehicular Edge ComputingSon, DB; Binh, TH; Vo, HK; Nguyen, BM; Binh, HTT; Yu, S
2023-06-21Variational co-embedding learning for attributed network clusteringYang, S; Verma, S; Cai, B; Jiang, J; Yu, K; Chen, F; Yu, S
2018-01-01Virtualization of Table Resources in Programmable Data Plane with Global ConsiderationXue, Y; Li, S; Han, K; Zhao, S; Huang, H; Yu, S; Zhu, Z
2022-01-01VOSA: Verifiable and Oblivious Secure Aggregation for Privacy-Preserving Federated LearningWang, Y; Zhang, A; Wu, S; Yu, S
2023-08-01VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systemsZhang, J; Liu, Y; Wu, D; Lou, S; Chen, B; Yu, S
2022-07-01VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systemsLiu, G; Zhang, W; Li, X; Fan, K; Yu, S
2020-03-01Waiting times in aged care: What matters?Yu, S; Byles, J
2019What determines coverage by collective agreements or awards?Yu, S; Peetz, D
2016-01-01When Will You Have a New Mobile Phone? An Empirical Answer from Big DataMa, Q; Zhang, S; Zhou, W; Yu, S; Wang, C
2020-10-01WiReader: Adaptive Air Handwriting Recognition Based on Commercial WiFi SignalGuo, Z; Xiao, F; Sheng, B; Fei, H; Yu, S
2020-10-01WiReader: Adaptive Air Handwriting Recognition Based on Commercial WiFi SignalGuo, Z; Xiao, F; Sheng, B; Fei, H; Yu, S