Showing results 1 to 20 of 42
next >
Issue Date | Title | Author(s) |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2019-08-01 | Sustainability Analysis for Fog Nodes with Renewable Energy Supplies | Jiang, J; Gao, L; Jin, J; Luan, TH; Yu, S; Xiang, Y; Garg, S |
2019-07-01 | Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach | Yang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W |
2019-05-15 | A reliable reputation computation framework for online items in E-commerce | Ma, L; Pei, Q; Xiang, Y; Yao, L; Yu, S |
2019-04-01 | Location privacy protection in smart health care system | Natgunanathan, I; Mehmood, A; Xiang, Y; Gao, L; Yu, S |
2019-04-01 | E-AUA: An efficient anonymous user authentication protocol for mobile IoT | Zeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W |
2019-03-01 | On exploiting priority relation graph for reliable multi-path communication in mobile social networks | Lin, L; Xu, L; Huang, Y; Xiang, Y; He, X |
2019-02-15 | Crack identification of functionally graded beams using continuous wavelet transform | Zhu, LF; Ke, LL; Zhu, XQ; Xiang, Y; Wang, YS |
2019-01-01 | Authenticated Medical Documents Releasing with Privacy Protection and Release Control | Liu, J; Ma, J; Xiang, Y; Zhou, W; Huang, X |
2019-01-01 | Source identification under complete observations: A maximum likelihood (ML) source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Introduction | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying propagation source in time-varying networks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Source identification under sensor observations: A Gaussian source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying propagation source in large-scale networks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Preliminary of identifying propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Identifying multiple propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | User influence in the propagation of malicious attacks | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Restrain malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Preliminary of modeling malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Source identification under snapshots: A sample path based source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |