Showing results 1 to 20 of 60
next >
Issue Date | Title | Author(s) |
2020-01-01 | A study of data pre-processing techniques for imbalanced biomedical data classification | Liu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D |
2020-01-01 | A study of data pre-processing techniques for imbalanced biomedical data classification | Liu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D |
2020-04-01 | Achieving Secure and Efficient Dynamic Searchable Symmetric Encryption over Medical Cloud Data | Li, H; Yang, Y; Dai, Y; Yu, S; Xiang, Y |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2021-01-01 | An Extension of BIM Using AI: A Multi Working-Machines Pathfinding Solution | Xiang, Y; Liu, K; Su, T; Li, J; Ouyang, S; Mao, SS; Geimer, M |
2019-01-01 | Authenticated Medical Documents Releasing with Privacy Protection and Release Control | Liu, J; Ma, J; Xiang, Y; Zhou, W; Huang, X |
2020-11-01 | Background-free fibre optic Brillouin probe for remote mapping of micromechanics | Xiang, Y; Basirun, C; Chou, J; Warkiani, ME; Török, P; Wang, Y; Gao, S; Kabakova, IV |
2013-12-25 | A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing | Deng, K; Ren, K; Song, J; Yuan, D; Xiang, Y; Chen, J |
2019-01-01 | Comparative study and numerical analysis | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-02-15 | Crack identification of functionally graded beams using continuous wavelet transform | Zhu, LF; Ke, LL; Zhu, XQ; Xiang, Y; Wang, YS |
2018-05-29 | A data-driven attack against support vectors of SVM | Liu, S; Zhou, W; Zhang, J; Xiang, Y; Wangt, Y; De Vel, O |
2018-03-16 | Density-Based Location Preservation for Mobile Crowdsensing with Differential Privacy | Yang, M; Zhu, T; Xiang, Y; Zhou, W |
2015-01-01 | Design and implementation of the hadoop-based crawler for SaaS service discovery | Alkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y |
2021-01-01 | Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification | Zhao, J; Zong, T; Xiang, Y; Gao, L; Zhou, W; Beliakov, G |
2018-01-01 | A differential game approach to patch injection | Yang, LX; Li, P; Yang, X; Xiang, Y; Zhou, W |
2018-05-27 | Differential Private POI Queries via Johnson-Lindenstrauss Transform | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases | Liu, J; Ma, J; Zhou, W; Xiang, Y; Huang, X |
2019-04-01 | E-AUA: An efficient anonymous user authentication protocol for mobile IoT | Zeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W |
2021-01-01 | Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat | Yang, LX; Li, P; Yang, X; Xiang, Y; Jiang, F; Zhou, W |
2019-07-01 | Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach | Yang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W |