Showing results 181 to 200 of 215
< previous
next >
Issue Date | Title | Author(s) |
2018-01-01 | SCARA: A framework for secure cloud-assisted RFID authentication for smart building access control | Al-Sudani, AR; Zhou, W; Wen, S; Al-Mansoori, A |
2020-07-01 | Secure Balance Planning of Off-blockchain Payment Channel Networks | Li, P; Miyazaki, T; Zhou, W |
2020-08-01 | Security and privacy in 6G networks: New areas and new challenges | Wang, M; Zhu, T; Zhang, T; Zhang, J; Yu, S; Zhou, W |
2022-07-01 | Self-driving shield: Intelligent systems, methodologies, and practice | Hu, M; Wu, B; Zhou, W; Wu, H; Li, G; Lu, J; Yu, G; Qin, Y |
2018-01-01 | A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning | Wu, L; Liu, Q; Zhou, W; Mao, G; Huang, J; Huang, H |
2010-01 | Sensitivity Of Triangular Hybrid Au-Ag Nanostructure Array | Zhu, S; Zhou, W |
2021-01-15 | Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge Computing | Li, J; Liang, W; Xu, Z; Zhou, W; Tan, HP; Khoukhi, L; Oteafy, S |
2022-05-01 | Service Provisioning for Multi-source IoT Applications in Mobile Edge Computing | Li, J; Liang, W; Xu, Z; Jia, X; Zhou, W |
2016-12-01 | Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks | Liu, B; Zhou, W; Zhu, T; Gao, L; Luan, TH; Zhou, H |
2020-01-01 | Simultaneously Advising via Differential Privacy in Cloud Servers Environment | Shen, S; Zhu, T; Ye, D; Yang, M; Liao, T; Zhou, W |
2019-01-01 | Source identification under complete observations: A maximum likelihood (ML) source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Source identification under sensor observations: A Gaussian source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Source identification under snapshots: A sample path based source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2016-03-01 | Spammers Are Becoming "smarter" on Twitter | Chen, C; Zhang, J; Xiang, Y; Zhou, W; Oliver, J |
2019-10-10 | Static malware clustering using enhanced deep embedding method | Ng, CK; Jiang, F; Zhang, LY; Zhou, W |
2017-04-01 | Statistical Features-Based Real-Time Detection of Drifted Twitter Spam | Chen, C; Wang, Y; Zhang, J; Xiang, Y; Zhou, W; Min, G |
2019-04-01 | STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation | Wang, D; Wu, T; Wen, S; Chen, X; Xiang, Y; Zhou, W |
2011-12-29 | A strategy for efficient observation pruning in multi-objective 3D SLAM | Miro, JV; Zhou, W; Dissanayake, G |
2021-03-22 | Sulfur-Doped Flowerlike Porous Carbon Derived from Metal-Organic Frameworks as a High-Performance Potassium-Ion Battery Anode | Zuo, Y; Li, P; Zang, R; Wang, S; Man, Z; Li, P; Wang, S; Zhou, W |
2022-06-01 | The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks | Zhu, T; Li, J; Hu, X; Xiong, P; Zhou, W |