Browsing "School of Computer Science" byAuthorXiang, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 44  next >
Issue DateTitleAuthor(s)
2016-01-01A General QoS Aware Flow-Balancing and Resource Management Scheme in Distributed Software-Defined NetworksSood, K; Yu, S; Xiang, Y; Cheng, H
2023-11-01A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learningXiang, Y; Li, T; Ren, W; Zhu, T; Choo, KKR
2020-01-01A study of data pre-processing techniques for imbalanced biomedical data classificationLiu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D
2020-01-01A study of data pre-processing techniques for imbalanced biomedical data classificationLiu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D
2021-12-01A Tutorial on Next Generation Heterogeneous IoT Networks and Node AuthenticationSood, K; Yu, S; Nguyen, DDN; Xiang, Y; Feng, B; Zhang, X
2024-01-01AgrAmplifier: Defending Federated Learning Against Poisoning Attacks Through Local Update AmplificationGong, Z; Shen, L; Zhang, Y; Zhang, LY; Wang, J; Bai, G; Xiang, Y
2019-01-01Authenticated Medical Documents Releasing with Privacy Protection and Release ControlLiu, J; Ma, J; Xiang, Y; Zhou, W; Huang, X
2023-02-08BASS: Blockchain-Based Asynchronous SignSGD for Robust Collaborative Data MiningXu, C; Qu, Y; Xiang, Y; Gao, L; Smith, D; Yu, S
2022-01-01Current Methods of Privacy Protection in IoTsQu, Y; Gao, L; Yu, S; Xiang, Y
2021-01-01Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient ModificationZhao, J; Zong, T; Xiang, Y; Gao, L; Zhou, W; Beliakov, G
2022-01-01Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channelsZong, T; Zhao, J; Xiang, Y; Natgunanathan, I; Gao, L; Zhou, W
2019-04-01E-AUA: An efficient anonymous user authentication protocol for mobile IoTZeng, X; Xu, G; Zheng, X; Xiang, Y; Zhou, W
2021-01-01Effective Quarantine and Recovery Scheme Against Advanced Persistent ThreatYang, LX; Li, P; Yang, X; Xiang, Y; Jiang, F; Zhou, W
2022-11Event detection in online social network: Methodologies, state-of-art, and evolutionHu, X; Ma, W; Chen, C; Wen, S; Zhang, J; Xiang, Y; Fei, G
2022-01-01FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin NetworksQu, Y; Gao, L; Xiang, Y; Shen, S; Yu, S
2019-01-01Future directions and conclusionJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2017-12-01Fuzzy-Based Information Decomposition for Incomplete and Imbalanced Data LearningLiu, S; Zhang, J; Xiang, Y; Zhou, W
2019-01-01Identifying multiple propagation sourcesJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2019-01-01Identifying propagation source in time-varying networksJiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W
2017-01-01Identifying Propagation Sources in Networks: State-of-the-Art and Comparative StudiesJiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W