Issue Date | Title | Author(s) |
2019-01-01 | Preliminary of modeling malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-10-01 | Low-Cost and Confidentiality-Preserving Data Acquisition for Internet of Multimedia Things | Zhang, Y; He, Q; Xiang, Y; Zhang, LY; Liu, B; Chen, J; Xie, Y |
2018-03-01 | Spread Spectrum Audio Watermarking Using Multiple Orthogonal PN Sequences and Variable Embedding Strengths and Polarities | Xiang, Y; Natgunanathan, I; Peng, D; Hua, G; Liu, B |
2022-01-01 | FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks | Qu, Y; Gao, L; Xiang, Y; Shen, S; Yu, S |
2019-01-01 | Preliminary of identifying propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2022-09-01 | Social Media Event Prediction using DNN with Feedback Mechanism | Ma, W; Hu, X; Chen, C; Wen, S; Choo, KKR; Xiang, Y |
2019-01-01 | Restrain malicious attack propagation | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2022-11 | Event detection in online social network: Methodologies, state-of-art, and evolution | Hu, X; Ma, W; Chen, C; Wen, S; Zhang, J; Xiang, Y; Fei, G |
2019-01-01 | Identifying multiple propagation sources | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2020-01-01 | A study of data pre-processing techniques for imbalanced biomedical data classification | Liu, S; Zhang, J; Xiang, Y; Zhou, W; Xiang, D |