Issue Date | Title | Author(s) |
2021-06-01 | A survey of Intel SGX and its applications | Zheng, W; Wu, Y; Wu, X; Feng, C; Sui, Y; Luo, X; Zhou, Y |
2020-10-06 | Game theory for mobile location privacy | Wu, X; Ji, G; Dou, W; Yu, S; Qi, L |
2022-02-11 | Crowdsourcing-based multi-device communication cooperation for mobile high-quality video enhancement | Wu, X; Qi, L; Xu, X; Yu, S; Dou, W; Zhang, X |
2017-01-01 | Incremental Subgraph Feature Selection for Graph Classification | Wang, H; Zhang, P; Zhu, X; Tsang, IWH; Chen, L; Zhang, C; Wu, X |
2021-11-01 | Bittm: A core biterms-based topic model for targeted analysis | Wang, J; Chen, L; Li, L; Wu, X |
2016-12-01 | DDoS attacks on data plane of software-defined network: are they possible? | Wu, X; Liu, M; Dou, W; Yu, S |
2016-01-01 | A scalable and automatic mechanism for resource allocation in self-organizing cloud | Wu, X; Liu, M; Dou, WC; Gao, L; Yu, S |
2021-12-01 | A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification | Zheng, W; Xun, Y; Wu, X; Deng, Z; Chen, X; Sui, Y |
2023-09-01 | Optimal privacy preservation strategies with signaling Q-learning for edge-computing-based IoT resource grant systems | Shen, S; Wu, X; Sun, P; Zhou, H; Wu, Z; Yu, S |
2023-06-27 | Disentangling Stochastic PDE Dynamics for Unsupervised Video Prediction. | Wu, X; Lu, J; Yan, Z; Zhang, G |