Browsing byAuthorXiang, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 42  next >
Issue DateTitleAuthor(s)
2019-10-10Adversaries or allies? Privacy and deep learning in big data eraLiu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W
2019-01-01Authenticated Medical Documents Releasing with Privacy Protection and Release ControlLiu, J; Ma, J; Xiang, Y; Zhou, W; Huang, X
2013-12-25A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computingDeng, K; Ren, K; Song, J; Yuan, D; Xiang, Y; Chen, J
2019-01-01Comparative study and numerical analysisJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-02-15Crack identification of functionally graded beams using continuous wavelet transformZhu, LF; Ke, LL; Zhu, XQ; Xiang, Y; Wang, YS
2018-05-29A data-driven attack against support vectors of SVMLiu, S; Zhou, W; Zhang, J; Xiang, Y; Wangt, Y; De Vel, O
2018-03-16Density-Based Location Preservation for Mobile Crowdsensing with Differential PrivacyYang, M; Zhu, T; Xiang, Y; Zhou, W
2015-01-01Design and implementation of the hadoop-based crawler for SaaS service discoveryAlkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y
2018-01-01A differential game approach to patch injectionYang, LX; Li, P; Yang, X; Xiang, Y; Zhou, W
2018-05-27Differential Private POI Queries via Johnson-Lindenstrauss TransformYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
2018-01-01Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databasesLiu, J; Ma, J; Zhou, W; Xiang, Y; Huang, X
2019-04-01E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
2019-07-01Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game ApproachYang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W
2019-01-01Future directions and conclusionJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying multiple propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in large-scale networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in time-varying networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01IntroductionJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2018-03-01An iteration-based differentially private social network data releaseZhu, T; Yang, M; Xiong, P; Xiang, Y; Zhou, W
2018-03-31Location Privacy and Its Applications: A Systematic StudyLiu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y