Browsing byAuthorZhou, W

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 181 to 200 of 215< previous   next >
Issue DateTitleAuthor(s)
2018-01-01SCARA: A framework for secure cloud-assisted RFID authentication for smart building access controlAl-Sudani, AR; Zhou, W; Wen, S; Al-Mansoori, A
2020-07-01Secure Balance Planning of Off-blockchain Payment Channel NetworksLi, P; Miyazaki, T; Zhou, W
2020-08-01Security and privacy in 6G networks: New areas and new challengesWang, M; Zhu, T; Zhang, T; Zhang, J; Yu, S; Zhou, W
2022-07-01Self-driving shield: Intelligent systems, methodologies, and practiceHu, M; Wu, B; Zhou, W; Wu, H; Li, G; Lu, J; Yu, G; Qin, Y
2018-01-01A Semantic Web-Based Recommendation Framework of Educational Resources in E-LearningWu, L; Liu, Q; Zhou, W; Mao, G; Huang, J; Huang, H
2010-01Sensitivity Of Triangular Hybrid Au-Ag Nanostructure ArrayZhu, S; Zhou, W
2021-01-15Service Provisioning for IoT Applications with Multiple Sources in Mobile Edge ComputingLi, J; Liang, W; Xu, Z; Zhou, W; Tan, HP; Khoukhi, L; Oteafy, S
2022-05-01Service Provisioning for Multi-source IoT Applications in Mobile Edge ComputingLi, J; Liang, W; Xu, Z; Jia, X; Zhou, W
2016-12-01Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular NetworksLiu, B; Zhou, W; Zhu, T; Gao, L; Luan, TH; Zhou, H
2020-01-01Simultaneously Advising via Differential Privacy in Cloud Servers EnvironmentShen, S; Zhu, T; Ye, D; Yang, M; Liao, T; Zhou, W
2019-01-01Source identification under complete observations: A maximum likelihood (ML) source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Source identification under sensor observations: A Gaussian source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Source identification under snapshots: A sample path based source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2016-03-01Spammers Are Becoming "smarter" on TwitterChen, C; Zhang, J; Xiang, Y; Zhou, W; Oliver, J
2019-10-10Static malware clustering using enhanced deep embedding methodNg, CK; Jiang, F; Zhang, LY; Zhou, W
2017-04-01Statistical Features-Based Real-Time Detection of Drifted Twitter SpamChen, C; Wang, Y; Zhang, J; Xiang, Y; Zhou, W; Min, G
2019-04-01STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial ObservationWang, D; Wu, T; Wen, S; Chen, X; Xiang, Y; Zhou, W
2011-12-29A strategy for efficient observation pruning in multi-objective 3D SLAMMiro, JV; Zhou, W; Dissanayake, G
2021-03-22Sulfur-Doped Flowerlike Porous Carbon Derived from Metal-Organic Frameworks as a High-Performance Potassium-Ion Battery AnodeZuo, Y; Li, P; Zang, R; Wang, S; Man, Z; Li, P; Wang, S; Zhou, W
2022-06-01The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social NetworksZhu, T; Li, J; Hu, X; Xiong, P; Zhou, W