Browsing byAuthorZhou, W

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 163 to 182 of 217< previous   next >
Issue DateTitleAuthor(s)
2022-01-01Privacy Data Propagation and Preservation in Social Media: a Real-world Case StudyHu, X; Zhu, T; Zhai, X; Zhou, W; Zhao, W
2018-12-01Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of ThingsQu, Y; Yu, S; Zhou, W; Peng, S; Wang, G; Xiao, K
2022-01-01Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous SpacesAbahussein, S; Cheng, Z; Zhu, T; Ye, D; Zhou, W
2016-01-01Privacy-preserving topic model for tagging recommender systemsZhu, T; Li, G; Zhou, W; Xiong, P; Yuan, C
2022-02-01Private-encoder: Enforcing privacy in latent space for human face imagesZhao, Y; Liu, B; Zhu, T; Ding, M; Zhou, W
2024-06-07Proactive image manipulation detection via deep semi-fragile watermarkZhao, Y; Liu, B; Zhu, T; Ding, M; Yu, X; Zhou, W
2023-01-01Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement LearningAbahussein, S; Zhu, T; Ye, D; Cheng, Z; Zhou, W
2019-12Protecting Privacy-Sensitive Locations in Trajectories with Correlated PositionsLiu, B; Zhu, T; Zhou, W; Wang, K; Zhou, H; Ding, M
2024-01-01Public and Private Blockchain Infusion: A Novel Approach to Federated LearningWang, M; Zhu, T; Zuo, X; Ye, D; Yu, S; Zhou, W
2016-11-01Query verification schemes for cloud-hosted databases: a brief surveyRiaz-ud-Din, F; Zhou, W; Doss, R
2021-12-01Recognizing Palm Vein in Smartphones Using RGB ImagesHorng, S-J; Vu, D-T; Nguyen, T-V; Zhou, W; Lin, C-T
2020Recognizing Very Small Face Images Using Convolution Neural NetworksHorng, S-J; Supardi, J; Zhou, W; Lin, C-T; Jiang, B
2022-01-01Request Reliability Augmentation with Service Function Chain Requirements in Mobile Edge ComputingLiang, W; Ma, Y; Xu, W; Xu, Z; Jia, X; Zhou, W
2019-01-01Resource Allocation Algorithm for MU-MIMO Systems with Double-Objective Optimization under the Existence of the Rank Deficient Channel MatrixPan, S; Yan, Y; Bonsu, KA; Zhou, W
2022-01-15Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement LearningTianqing, Z; Zhou, W; Ye, D; Cheng, Z; Li, J
2019-01-01Restrain malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2023-10-09Revisiting model fairness via adversarial examplesZhang, T; Zhu, T; Li, J; Zhou, W; Yu, PS
2011-07-30RHOMBIC SILVER NANOPARTICLES ARRAY-BASED PLASMONIC FILTERFu, Y; Zhu, S; Zhou, X; Zhou, W; Zhao, W
2016-10-30The role and interaction of superplasticizer and emulsifier in fresh cement asphalt emulsion paste through rheology studyOuyang, J; Han, B; Cao, Y; Zhou, W; Li, W; Shah, SP
2018-01-01Rumor Source Identification in Social Networks with Time-Varying TopologyJiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W