Showing results 151 to 170 of 214
< previous
next >
Issue Date | Title | Author(s) |
2012-03-01 | Plasmonic properties of two-dimensional metallic nanoholes fabricated by focused ion beam lithography | Zhu, S; Zhou, W |
2018-05-01 | Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks | Wang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A |
2024 | PPFed: A Privacy-Preserving and Personalized Federated Learning Framework | Zhang, G; Liu, B; Zhu, T; Ding, M; Zhou, W |
2016-09-01 | PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation with Fault Tolerance | Han, S; Zhao, S; Li, Q; Ju, CH; Zhou, W |
2020-01-01 | Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms | Majbouri Yazdi, K; Majbouri Yazdi, A; Khodayi, S; Hou, J; Zhou, W; Saedy, S; Rostami, M |
2019-01-01 | Preliminary of identifying propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Preliminary of modeling malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2023-12-20 | Privacy and evolutionary cooperation in neural-network-based game theory | Cheng, Z; Zhu, T; Zhu, C; Ye, D; Zhou, W; Yu, PS |
2023-09-15 | Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff | Chen, H; Zhu, T; Zhang, T; Zhou, W; Yu, PS |
2022-01-01 | Privacy Data Diffusion Modeling and Preserving in Online Social Network | Hu, X; Zhu, T; Zhai, X; Wang, H; Zhou, W; Zhao, W |
2022-01-01 | Privacy Data Propagation and Preservation in Social Media: a Real-world Case Study | Hu, X; Zhu, T; Zhai, X; Zhou, W; Zhao, W |
2018-12-01 | Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things | Qu, Y; Yu, S; Zhou, W; Peng, S; Wang, G; Xiao, K |
2022-01-01 | Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces | Abahussein, S; Cheng, Z; Zhu, T; Ye, D; Zhou, W |
2016-01-01 | Privacy-preserving topic model for tagging recommender systems | Zhu, T; Li, G; Zhou, W; Xiong, P; Yuan, C |
2022-02-01 | Private-encoder: Enforcing privacy in latent space for human face images | Zhao, Y; Liu, B; Zhu, T; Ding, M; Zhou, W |
2023-01-01 | Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning | Abahussein, S; Zhu, T; Ye, D; Cheng, Z; Zhou, W |
2019-12 | Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions | Liu, B; Zhu, T; Zhou, W; Wang, K; Zhou, H; Ding, M |
2024-01-01 | Public and Private Blockchain Infusion: A Novel Approach to Federated Learning | Wang, M; Zhu, T; Zuo, X; Ye, D; Yu, S; Zhou, W |
2016-11-01 | Query verification schemes for cloud-hosted databases: a brief survey | Riaz-ud-Din, F; Zhou, W; Doss, R |
2021-12-01 | Recognizing Palm Vein in Smartphones Using RGB Images | Horng, S-J; Vu, D-T; Nguyen, T-V; Zhou, W; Lin, C-T |