Issue Date | Title | Author(s) |
2024-03-01 | A data-knowledge-driven interval type-2 fuzzy neural network with interpretability and self-adaptive structure | Bai, K; Zhang, W; Wen, S; Zhao, C; Meng, W; Zeng, Y; Jia, D |
2019-01-01 | Biological age estimated from retinal imaging: A novel biomarker of aging | Liu, C; Wang, W; Li, Z; Jiang, Y; Han, X; Ha, J; Meng, W; He, M |
2020-03-01 | Coupled Bilinear Discriminant Projection for Cross-View Gait Recognition | Ben, X; Gong, C; Zhang, P; Yan, R; Wu, Q; Meng, W |
2019-06-01 | Coupled Patch Alignment for Matching Cross-View Gaits | Ben, X; Gong, C; Zhang, P; Jia, X; Wu, Q; Meng, W |
2023 | Detecting Violations of Differential Privacy for Quantum Algorithms. | Guan, J; Fang, W; Huang, M; Ying, M; Meng, W; Jensen, CD; Cremers, C; Kirda, E |
2016-01-01 | Empirical risk minimization for metric learning using privileged information | Xun, Y; Meng, W; Luming, Z; Tao, D |
2019-06-01 | A general tensor representation framework for cross-view gait recognition | Ben, X; Zhang, P; Lai, Z; Yan, R; Zhai, X; Meng, W |
2016-10-05 | On the distance metric learning between cross-domain gaits | Ben, X; Zhang, P; Meng, W; Yan, R; Yang, M; Liu, W; Zhang, H |
2023-01-01 | Optimal Repair Strategy Against Advanced Persistent Threats under Time-Varying Networks | Wang, Z; Li, J; Wang, Y; Su, Z; Yu, S; Meng, W |
2020-07-01 | THP: A Novel Authentication Scheme to Prevent Multiple Attacks in SDN-Based IoT Network | Fang, L; Li, Y; Yun, X; Wen, Z; Ji, S; Meng, W; Cao, Z; Tanveer, M |
2018-06-01 | Towards Bayesian-Based Trust Management for Insider Attacks in Healthcare Software-Defined Networks | Meng, W; Choo, KKR; Furnell, S; Vasilakos, AV; Probst, CW |