Issue Date | Title | Author(s) |
2018-03-15 | Influence analysis in social networks: A survey | Peng, S; Zhou, Y; Cao, L; Yu, S; Niu, J; Jia, W |
2021-03-01 | PoisonGAN: Generative Poisoning Attacks against Federated Learning in Edge Computing Systems | Zhang, J; Chen, B; Cheng, X; Binh, HTT; Yu, S |
2021-01-01 | Fast Containment of Infectious Diseases with E-healthcare Mobile Social Internet of Things | Xu, Q; Su, Z; Zhang, K; Yu, S |
2021-03-15 | Deep-Reinforcement-Learning-Based User Profile Perturbation for Privacy-Aware Recommendation | Xiao, Y; Xiao, L; Lu, X; Zhang, H; Yu, S; Poor, HV |
2021-05-15 | Unknown hostile environment-oriented autonomous WSN deployment using a mobile robot | Feng, S; Shi, H; Huang, L; Shen, S; Yu, S; Peng, H; Wu, C |
2021-01-15 | Protected Resource Allocation in Space Division Multiplexing-Elastic Optical Networks with Fluctuating Traffic | Zhu, R; Samuel, A; Wang, P; Li, S; Oun, BK; Li, L; Lv, P; Xu, M; Yu, S |
2020-09-01 | A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things | Xu, C; Ren, W; Yu, L; Zhu, T; Choo, KKR |
2020 | Targeted Attention Attack on Deep Learning Models in Road Sign Recognition | Yang, X; Liu, W; Zhang, S; Liu, W; Tao, D |
2021-01-01 | A Privacy-Aware PUFs-Based Multi-Server Authentication Protocol in Cloud-Edge IoT Systems Using Blockchain | Zhang, Y; Li, B; Liu, B; Hu, Y; Zheng, H |
2021-01-01 | Context-aware Adaptive Route Mutation Scheme: A Reinforcement Learning Approach | Xu, C; Zhang, T; Kuang, X; Zhou, Z; Yu, S |