Browsing byAuthorXiang, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 50  next >
Issue DateTitleAuthor(s)
2020-01-01A study of data pre-processing techniques for imbalanced biomedical data classificationLiu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D
2020-01-01A study of data pre-processing techniques for imbalanced biomedical data classificationLiu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D
2020-04-01Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud DataLi, H; Yang, Y; Dai, Y; Yu, S; Xiang, Y
2019-10-10Adversaries or allies? Privacy and deep learning in big data eraLiu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W
2019-01-01Authenticated Medical Documents Releasing with Privacy Protection and Release ControlLiu, J; Ma, J; Xiang, Y; Zhou, W; Huang, X
2020-11-01Background-free fibre optic Brillouin probe for remote mapping of micromechanicsXiang, Y; Basirun, C; Chou, J; Warkiani, ME; Török, P; Wang, Y; Gao, S; Kabakova, IV
2013-12-25A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computingDeng, K; Ren, K; Song, J; Yuan, D; Xiang, Y; Chen, J
2019-01-01Comparative study and numerical analysisJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-02-15Crack identification of functionally graded beams using continuous wavelet transformZhu, LF; Ke, LL; Zhu, XQ; Xiang, Y; Wang, YS
2018-05-29A data-driven attack against support vectors of SVMLiu, S; Zhou, W; Zhang, J; Xiang, Y; Wangt, Y; De Vel, O
2018-03-16Density-Based Location Preservation for Mobile Crowdsensing with Differential PrivacyYang, M; Zhu, T; Xiang, Y; Zhou, W
2015-01-01Design and implementation of the hadoop-based crawler for SaaS service discoveryAlkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y
2018-01-01A differential game approach to patch injectionYang, LX; Li, P; Yang, X; Xiang, Y; Zhou, W
2018-05-27Differential Private POI Queries via Johnson-Lindenstrauss TransformYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
2018-01-01Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databasesLiu, J; Ma, J; Zhou, W; Xiang, Y; Huang, X
2019-04-01E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
2019-07-01Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game ApproachYang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W
2020-10-15Free vibration and damage identification of cracked functionally graded platesZhu, LF; Ke, LL; Xiang, Y; Zhu, XQ
2019-01-01Future directions and conclusionJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying multiple propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W