Showing results 1 to 20 of 162
next >
Issue Date | Title | Author(s) |
2023-02-01 | A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things | Liu, Y; Hao, X; Ren, W; Xiong, R; Zhu, T; Choo, KKR; Min, G |
2024-02-15 | A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy | Zhou, W; Zhu, T; Ye, D; Ren, W; Choo, KKR |
2017-01-01 | A cyber-threat analytic model for autonomous detection of virtual property theft | Patterson, N; Hobbs, M; Zhu, T |
2016-06-01 | A differentially private algorithm for location data release | Xiong, P; Zhu, T; Niu, W; Li, G |
2021-08-01 | A Differentially Private Auction Mechanism in Online Social Networks | Hu, X; Ye, D; Zhu, T; Huo, H |
2021-01-01 | A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries | Ye, D; Zhu, T; Shen, S; Zhou, W |
2020-01-01 | A flexible method to defend against computationally resourceful miners in blockchain proof of work | Ren, W; Hu, J; Zhu, T; Ren, Y; Choo, KKR |
2023 | A Game-theoretic Federated Learning Framework for Data Quality Improvement | Zhang, L; Zhu, T; Xiong, P; Zhou, W; Yu, PS |
2023-01-01 | A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems | Zhang, L; Zhu, T; Hussain, FK; Ye, D; Zhou, W |
2020-09-01 | A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things | Xu, C; Ren, W; Yu, L; Zhu, T; Choo, KKR |
2023-11-01 | A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning | Xiang, Y; Li, T; Ren, W; Zhu, T; Choo, KKR |
2023-12-01 | A location-based advising method in teacher-student frameworks | Zhu, C; Ye, D; Huo, H; Zhou, W; Zhu, T |
2021 | A novel differentially private advising framework in cloud server environment | Shen, S; Zhu, T; Ye, D; Wang, M; Zuo, X; Zhou, A |
2022-01-01 | A Robust Game-theoretical Federated Learning Framework with Joint Differential Privacy | Zhang, L; Zhu, T; Xiong, P; Zhou, W; Yu, P |
2022-01-01 | Adversarial Attacks Against Deep Generative Models on Data: A Survey | Sun, H; Zhu, T; Zhang, Z; Jin, D; Xiong, P; Zhou, W |
2022-12-23 | Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity | Zhou, S; Liu, C; Ye, D; Zhu, T; Zhou, W; Yu, PS |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2021-03-01 | An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps | Zhang, Y; Xiao, G; Zheng, Z; Zhu, T; Tsang, IW; Sui, Y |
2021-11-01 | An optimized differential privacy scheme with reinforcement learning in VANET | Chen, X; Zhang, T; Shen, S; Zhu, T; Xiong, P |
2018-10-01 | Answering differentially private queries for continual datasets release | Zhu, T; Li, G; Xiong, P; Zhou, W |