Browsing by Author Zhou, W

Showing results 1 to 20 of 61  next >
Issue DateTitleAuthor(s)
10-Oct-2019Adversaries or allies? Privacy and deep learning in big data eraLiu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W
1-Aug-2019Delay-Guaranteed Admission Control for LAA Coexisting with WiFiZhou, W; Sutton, GJ; Andrew Zhang, J; Liu, RP; Pan, S
1-Jul-2019Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game ApproachYang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W
1-May-2019A blockchain-based location privacy-preserving crowdsensing systemYang, M; Zhu, T; Liang, K; Zhou, W; Deng, RH
1-Apr-2019E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
1-Jan-2019A manifesto for future generation cloud computing: Research directions for the next decadeBuyya, R; Srirama, SN; Casale, G; Calheiros, R; Simmhan, Y; Varghese, B; Gelenbe, E; Javadi, B; Vaquero, LM; Netto, MAS; Toosi, AN; Rodriguez, MA; Llorente, IM; De Capitani Di Vimercati, S; Samarati, P; Milojicic, D; Varela, C; Bahsoon, R; Dias De Assuncao, M; Rana, O; Zhou, W; Jin, H; Gentzsch, W; Zomaya, AY; Shen, H
1-Jan-2019Resource Allocation Algorithm for MU-MIMO Systems with Double-Objective Optimization under the Existence of the Rank Deficient Channel MatrixPan, S; Yan, Y; Bonsu, KA; Zhou, W
1-Jan-2019Constructing Sn(ii)-doped SrNb<inf>2</inf>O<inf>6</inf> for visible light response driven H<inf>2</inf> and O<inf>2</inf> evolution from waterLiu, S; Li, P; Umezawa, N; Zhou, W; Abe, H; Wang, G
4-Dec-2018Traffic flow prediction for road intersection safetyAlajali, W; Zhou, W; Wen, S
4-Dec-2018Hiding RFID in the image matching based access control to a smart buildingAl-Sudani, AR; Zhou, W; Wen, S; Kassem, HA
1-Dec-2018Null Model and Community Structure in Multiplex NetworksZhai, X; Zhou, W; Fei, G; Liu, W; Xu, Z; Jiao, C; Lu, C; Hu, G
1-Dec-2018Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of ThingsQu, Y; Yu, S; Zhou, W; Peng, S; Wang, G; Xiao, K
1-Nov-2018Malware propagations in wireless Ad Hoc networksLiu, B; Zhou, W; Gao, L; Zhou, H; Luan, TH; Wen, S
1-Oct-2018Answering differentially private queries for continual datasets releaseZhu, T; Li, G; Xiong, P; Zhou, W
1-Sep-2018A hybrid privacy protection scheme in cyber-physical social networksQu, Y; Yu, S; Gao, L; Zhou, W; Peng, S
27-Jul-2018Improving Data Utility through Game Theory in Personalized Differential PrivacyQu, Y; Cui, L; Yu, S; Zhou, W; Wu, J
27-Jul-2018Who spread to whom? Inferring online social networks with user featuresWang, D; Zhou, W; Zheng, JX; Wen, S; Zhang, J; Xiang, Y
9-Jul-2018The Value of Ecosystem Services from Giant Panda ReservesWei, F; Costanza, R; Dai, Q; Stoeckl, N; Gu, X; Farber, S; Nie, Y; Kubiszewski, I; Hu, Y; Swaisgood, R; Yang, X; Bruford, M; Chen, Y; Voinov, A; Qi, D; Owen, M; Yan, L; Kenny, DC; Zhang, Z; Hou, R; Jiang, S; Liu, H; Zhan, X; Zhang, L; Yang, B; Zhao, L; Zheng, X; Zhou, W; Wen, Y; Gao, H; Zhang, W
6-Jul-2018Empirical study on taxi's mobility nature in dense urban areaQiu, Z; Zhang, S; Zhou, W; Yu, S
1-Jul-2018Twitter spam detection: Survey of new approaches and comparative studyWu, T; Wen, S; Xiang, Y; Zhou, W