Browsing byAuthorXiang, Y

Jump to a point in the index:
Showing results 1 to 20 of 42  next >
Issue DateTitleAuthor(s)
2019-10-10Adversaries or allies? Privacy and deep learning in big data eraLiu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W
2019-08-01Sustainability Analysis for Fog Nodes with Renewable Energy SuppliesJiang, J; Gao, L; Jin, J; Luan, TH; Yu, S; Xiang, Y; Garg, S
2019-07-01Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game ApproachYang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W
2019-05-15A reliable reputation computation framework for online items in E-commerceMa, L; Pei, Q; Xiang, Y; Yao, L; Yu, S
2019-04-01Location privacy protection in smart health care systemNatgunanathan, I; Mehmood, A; Xiang, Y; Gao, L; Yu, S
2019-04-01E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
2019-03-01On exploiting priority relation graph for reliable multi-path communication in mobile social networksLin, L; Xu, L; Huang, Y; Xiang, Y; He, X
2019-02-15Crack identification of functionally graded beams using continuous wavelet transformZhu, LF; Ke, LL; Zhu, XQ; Xiang, Y; Wang, YS
2019-01-01Authenticated Medical Documents Releasing with Privacy Protection and Release ControlLiu, J; Ma, J; Xiang, Y; Zhou, W; Huang, X
2019-01-01Source identification under complete observations: A maximum likelihood (ML) source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01IntroductionJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in time-varying networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Source identification under sensor observations: A Gaussian source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in large-scale networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Preliminary of identifying propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying multiple propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01User influence in the propagation of malicious attacksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Restrain malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Preliminary of modeling malicious attack propagationJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Source identification under snapshots: A sample path based source estimatorJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W