Showing results 1 to 20 of 113
next >
Issue Date | Title | Author(s) |
2017-01-01 | A cyber-threat analytic model for autonomous detection of virtual property theft | Patterson, N; Hobbs, M; Zhu, T |
2016-06-01 | A differentially private algorithm for location data release | Xiong, P; Zhu, T; Niu, W; Li, G |
2021-08-01 | A Differentially Private Auction Mechanism in Online Social Networks | Hu, X; Ye, D; Zhu, T; Huo, H |
2021-01-01 | A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries | Ye, D; Zhu, T; Shen, S; Zhou, W |
2020-01-01 | A flexible method to defend against computationally resourceful miners in blockchain proof of work | Ren, W; Hu, J; Zhu, T; Ren, Y; Choo, KKR |
2023-01-01 | A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems | Zhang, L; Zhu, T; Hussain, FK; Ye, D; Zhou, W |
2020-09-01 | A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things | Xu, C; Ren, W; Yu, L; Zhu, T; Choo, KKR |
2021 | A novel differentially private advising framework in cloud server environment | Shen, S; Zhu, T; Ye, D; Wang, M; Zuo, X; Zhou, A |
2022-01-01 | A Robust Game-theoretical Federated Learning Framework with Joint Differential Privacy | Zhang, L; Zhu, T; Xiong, P; Zhou, W; Yu, P |
2022-01-01 | Adversarial Attacks Against Deep Generative Models on Data: A Survey | Sun, H; Zhu, T; Zhang, Z; Jin, D; Xiong, P; Zhou, W |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2021-03-01 | An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps | Zhang, Y; Xiao, G; Zheng, Z; Zhu, T; Tsang, IW; Sui, Y |
2021-11-01 | An optimized differential privacy scheme with reinforcement learning in VANET | Chen, X; Zhang, T; Shen, S; Zhu, T; Xiong, P |
2018-10-01 | Answering differentially private queries for continual datasets release | Zhu, T; Li, G; Xiong, P; Zhou, W |
2022-11-01 | Attacking neural machine translations via hybrid attention learning | Ni, M; Wang, C; Zhu, T; Yu, S; Liu, W |
2022-12-08 | Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria. | Zhang, T; Zhu, T; Gao, K; Zhou, W; Yu, PS |
2019-05-01 | A blockchain-based location privacy-preserving crowdsensing system | Yang, M; Zhu, T; Liang, K; Zhou, W; Deng, RH |
2019-01-01 | CaACBIM: A context-aware access control model for BIM | Zheng, R; Jiang, J; Hao, X; Ren, W; Xiong, F; Zhu, T |
2021-01-01 | Correlated data in differential privacy: Definition and analysis | Zhang, T; Zhu, T; Liu, R; Zhou, W |
2020-03-01 | Correlated Differential Privacy: Feature Selection in Machine Learning | Zhang, T; Zhu, T; Xiong, P; Huo, H; Tari, Z; Zhou, W |