Showing results 1 to 20 of 215
next >
Issue Date | Title | Author(s) |
2024-02-15 | A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy | Zhou, W; Zhu, T; Ye, D; Ren, W; Choo, KKR |
2021-01-01 | A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries | Ye, D; Zhu, T; Shen, S; Zhou, W |
2016-05-01 | A Feasible IP Traceback Framework through Dynamic Deterministic Packet Marking | Yu, S; Zhou, W; Guo, S; Guo, M |
2023 | A Game-theoretic Federated Learning Framework for Data Quality Improvement | Zhang, L; Zhu, T; Xiong, P; Zhou, W; Yu, PS |
2023-01-01 | A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems | Zhang, L; Zhu, T; Hussain, FK; Ye, D; Zhou, W |
2022-05-18 | A highly selective superphane for ReO<inf>4</inf><sup>−</sup> recognition and extraction | Zhou, W; Li, A; Gale, PA; He, Q |
2023-12-01 | A location-based advising method in teacher-student frameworks | Zhu, C; Ye, D; Huo, H; Zhou, W; Zhu, T |
2022-01-01 | A Robust Game-theoretical Federated Learning Framework with Joint Differential Privacy | Zhang, L; Zhu, T; Xiong, P; Zhou, W; Yu, P |
2017-07-20 | A secure search protocol for low cost passive RFID tags | Sundaresan, S; Doss, R; Piramuthu, S; Zhou, W |
2020-01-01 | A study of data pre-processing techniques for imbalanced biomedical data classification | Liu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D |
2020-01-01 | A study of data pre-processing techniques for imbalanced biomedical data classification | Liu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D |
2022-01-01 | Adversarial Attacks Against Deep Generative Models on Data: A Survey | Sun, H; Zhu, T; Zhang, Z; Jin, D; Xiong, P; Zhou, W |
2022-12-23 | Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity | Zhou, S; Liu, C; Ye, D; Zhu, T; Zhou, W; Yu, PS |
2023-08-13 | Adversarial Deep Learning in Cybersecurity Attack Taxonomies, Defence Mechanisms, and Learning Theories | Chivukula, AS; Yang, X; Liu, B; Liu, W; Zhou, W |
2023-01-01 | Adversarial Machine Learning: Attack Surfaces, Defence Mechanisms, Learning Theories in Artificial Intelligence | Chivukula, AS; Yang, X; Liu, B; Liu, W; Zhou, W |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2018-10-01 | Answering differentially private queries for continual datasets release | Zhu, T; Li, G; Xiong, P; Zhou, W |
2023-01-01 | Attribute-Based Membership Inference Attacks and Defenses on GANs | Sun, H; Zhu, T; Li, J; Ji, S; Zhou, W |
2023-09 | Australia-China trade: Opportunity, risk, mitigation, ballast - progress? | Laurenceson, J; Zhou, W; Reilly, J; Yuan, J |
2019-01-01 | Authenticated Medical Documents Releasing with Privacy Protection and Release Control | Liu, J; Ma, J; Xiang, Y; Zhou, W; Huang, X |