Showing results 163 to 182 of 217
< previous
next >
Issue Date | Title | Author(s) |
2022-01-01 | Privacy Data Propagation and Preservation in Social Media: a Real-world Case Study | Hu, X; Zhu, T; Zhai, X; Zhou, W; Zhao, W |
2018-12-01 | Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things | Qu, Y; Yu, S; Zhou, W; Peng, S; Wang, G; Xiao, K |
2022-01-01 | Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces | Abahussein, S; Cheng, Z; Zhu, T; Ye, D; Zhou, W |
2016-01-01 | Privacy-preserving topic model for tagging recommender systems | Zhu, T; Li, G; Zhou, W; Xiong, P; Yuan, C |
2022-02-01 | Private-encoder: Enforcing privacy in latent space for human face images | Zhao, Y; Liu, B; Zhu, T; Ding, M; Zhou, W |
2024-06-07 | Proactive image manipulation detection via deep semi-fragile watermark | Zhao, Y; Liu, B; Zhu, T; Ding, M; Yu, X; Zhou, W |
2023-01-01 | Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning | Abahussein, S; Zhu, T; Ye, D; Cheng, Z; Zhou, W |
2019-12 | Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions | Liu, B; Zhu, T; Zhou, W; Wang, K; Zhou, H; Ding, M |
2024-01-01 | Public and Private Blockchain Infusion: A Novel Approach to Federated Learning | Wang, M; Zhu, T; Zuo, X; Ye, D; Yu, S; Zhou, W |
2016-11-01 | Query verification schemes for cloud-hosted databases: a brief survey | Riaz-ud-Din, F; Zhou, W; Doss, R |
2021-12-01 | Recognizing Palm Vein in Smartphones Using RGB Images | Horng, S-J; Vu, D-T; Nguyen, T-V; Zhou, W; Lin, C-T |
2020 | Recognizing Very Small Face Images Using Convolution Neural Networks | Horng, S-J; Supardi, J; Zhou, W; Lin, C-T; Jiang, B |
2022-01-01 | Request Reliability Augmentation with Service Function Chain Requirements in Mobile Edge Computing | Liang, W; Ma, Y; Xu, W; Xu, Z; Jia, X; Zhou, W |
2019-01-01 | Resource Allocation Algorithm for MU-MIMO Systems with Double-Objective Optimization under the Existence of the Rank Deficient Channel Matrix | Pan, S; Yan, Y; Bonsu, KA; Zhou, W |
2022-01-15 | Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning | Tianqing, Z; Zhou, W; Ye, D; Cheng, Z; Li, J |
2019-01-01 | Restrain malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2023-10-09 | Revisiting model fairness via adversarial examples | Zhang, T; Zhu, T; Li, J; Zhou, W; Yu, PS |
2011-07-30 | RHOMBIC SILVER NANOPARTICLES ARRAY-BASED PLASMONIC FILTER | Fu, Y; Zhu, S; Zhou, X; Zhou, W; Zhao, W |
2016-10-30 | The role and interaction of superplasticizer and emulsifier in fresh cement asphalt emulsion paste through rheology study | Ouyang, J; Han, B; Cao, Y; Zhou, W; Li, W; Shah, SP |
2018-01-01 | Rumor Source Identification in Social Networks with Time-Varying Topology | Jiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W |