Browsing byAuthorZhou, W

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 111 to 130 of 214< previous   next >
Issue DateTitleAuthor(s)
2022-01-01Label-Only Membership Inference Attacks and Defenses In Semantic Segmentation ModelsZhang, G; Liu, B; Zhu, T; Ding, M; Zhou, W
2023-01-01Label-Only Model Inversion Attacks: Attack With the Least InformationZhu, T; Ye, D; Zhou, S; Liu, B; Zhou, W
2021-07-01Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party ControlLiu, J; Hou, J; Yang, W; Xiang, Y; Zhou, W; Wu, W; Huang, X
2022-01-01Learning Games for Defending Advanced Persistent Threats in Cyber SystemsZhu, T; Ye, D; Cheng, Z; Zhou, W; Yu, PS
2018-03-31Location Privacy and Its Applications: A Systematic StudyLiu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y
2018Location Privacy in Mobile ApplicationsLiu, B; Zhou, W; Zhu, T; Xiang, Y; Wang, K
2023-01-01Location-Based Real-Time Updated Advising Method for Traffic Signal ControlZhu, C; Ye, D; Zhu, T; Zhou, W
2018-03-19Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing ArchitectureYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
2023-08-28Machine Unlearning: A SurveyXu, H; Zhu, T; Zhang, L; Zhou, W; Yu, PS
2023-11-01Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal AttackLiu, C; Chen, H; Zhu, T; Zhang, J; Zhou, W
2019Malicious Attack Propagation and Source IdentificationJiang, J; Wen, S; Liu, B; Yu, S; Xiang, Y; Zhou, W
2018-11-01Malware propagations in wireless Ad Hoc networksLiu, B; Zhou, W; Gao, L; Zhou, H; Luan, TH; Wen, S
2019-01-01A manifesto for future generation cloud computing: Research directions for the next decadeBuyya, R; Srirama, SN; Casale, G; Calheiros, R; Simmhan, Y; Varghese, B; Gelenbe, E; Javadi, B; Vaquero, LM; Netto, MAS; Toosi, AN; Rodriguez, MA; Llorente, IM; De Capitani Di Vimercati, S; Samarati, P; Milojicic, D; Varela, C; Bahsoon, R; Dias De Assuncao, M; Rana, O; Zhou, W; Jin, H; Gentzsch, W; Zomaya, AY; Shen, H
2022-05-01Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge ComputingLi, J; Liang, W; Xu, W; Xu, Z; Jia, X; Zhou, W; Zhao, J
2019-11-12MFE-HAR: Multiscale feature engineering for human activity recognition using wearable sensorsLu, J; Zheng, X; Sheng, QZ; Hussain, Z; Wang, J; Zhou, W
2022-02-14Model-Based Self-Advising for Multi-Agent Learning.Ye, D; Zhu, T; Zhu, C; Zhou, W; Yu, PS
2022-09-01More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism DesignZhang, L; Zhu, T; Xiong, P; Zhou, W; Yu, PS
2022-01-01More Than Privacy: Applying Differential Privacy in Key Areas of Artificial IntelligenceZhu, T; Ye, D; Wang, W; Zhou, W; Yu, P
2020-08-04More Than Privacy: Applying Differential Privacy in Key Areas of Artificial IntelligenceZhu, T; Ye, D; Wang, W; Zhou, W; Yu, PS
2019-07-01MPTC for PMSMs of EVs with Multi-Motor Driven System Considering Optimal Energy AllocationSun, X; Hu, C; Zhu, J; Wang, S; Zhou, W; Yang, Z; Lei, G; Li, K; Zhu, B; Guo, Y