Issue Date | Title | Author(s) |
2016-04-25 | Semantic analysis in location privacy preserving | Xiong, P; Zhang, L; Zhu, T |
2020-12-01 | Transformer based Deep Intelligent Contextual Embedding for Twitter sentiment analysis | Naseem, U; Razzak, I; Musial, K; Imran, M |
2020-02-01 | Blockchain for secure location verification | Nosouhi, MR; Yu, S; Zhou, W; Grobler, M; Keshtiar, H |
2021-06-01 | Energy efficiency with service availability guarantee for Network Function Virtualization | Mai, L; Ding, Y; Zhang, X; Fan, L; Yu, S; Xu, Z |
2016-11-01 | Towards Practical and Near-Optimal Coflow Scheduling for Data Center Networks | Luo, S; Yu, H; Zhao, Y; Wang, S; Yu, S; Li, L |
2022-10-01 | Fog node discovery and selection: A Systematic literature review | Bukhari, A; Hussain, FK; Hussain, OK |
2018-10-01 | RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms | Li, Y; Ren, W; Zhu, T; Ren, Y; Qin, Y; Jie, W |
- | Face image de‐identification by feature space adversarial perturbation | Xue, H; Liu, B; Yuan, X; Ding, M; Zhu, T |
2020-02-20 | Tensor mutual information and its application | Huang, ML; Lu, L; Ren, X; Cui, C; Luo, Y |
2020-07-01 | Real time dataset generation framework for intrusion detection systems in IoT | Al-Hadhrami, Y; Hussain, FK |