Issue Date | Title | Author(s) |
2022-01-01 | Peripheral-free Device Pairing by RandomlySwitching Power | Shao, Z; Weng, J; Zhang, Y; Wu, Y; Li, M; Weng, J; Luo, W; Yu, S |
2022-01-01 | LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check | Chen, Z; Wang, S; Fu, A; Gao, Y; Yu, S; Deng, RH |
2022-01-01 | IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in Clouds | Huang, L; Zhou, J; Zhang, G; Sun, J; Wei, T; Yu, S; Hu, S |
2016-12-01 | On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks | Sayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W |
2016-09-01 | PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation with Fault Tolerance | Han, S; Zhao, S; Li, Q; Ju, CH; Zhou, W |
2022-03-01 | A clustering-based approach for prioritizing health, safety and environment risks integrating fuzzy C-means and hybrid decision-making methods | Valipour, M; Yousefi, S; Jahangoshai Rezaee, M; Saberi, M |
2017-04-01 | Statistical Features-Based Real-Time Detection of Drifted Twitter Spam | Chen, C; Wang, Y; Zhang, J; Xiang, Y; Zhou, W; Min, G |
2022-01-01 | UCoin: An Efficient Privacy Preserving Scheme for Cryptocurrencies | Nosouhi, MR; Yu, S; Sood, K; Grobler, M; Jurdak, R; Dorri, A; Shen, S |
2023 | RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial Network | Ma, C; Li, J; Ding, M; Liu, B; Wei, K; Weng, J; Poor, HV |
2021-01-01 | A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries | Ye, D; Zhu, T; Shen, S; Zhou, W |