Issue Date | Title | Author(s) |
2022-01-01 | Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels | Zong, T; Zhao, J; Xiang, Y; Natgunanathan, I; Gao, L; Zhou, W |
2022-01-01 | Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential Privacy | Qu, Y; Gao, L; Yu, S; Xiang, Y |
2022-01-01 | Current Methods of Privacy Protection in IoTs | Qu, Y; Gao, L; Yu, S; Xiang, Y |
2022-01-01 | Summary and Outlook | Qu, Y; Gao, L; Yu, S; Xiang, Y |
2023-02-08 | BASS: Blockchain-Based Asynchronous SignSGD for Robust Collaborative Data Mining | Xu, C; Qu, Y; Xiang, Y; Gao, L; Smith, D; Yu, S |
2016-03-01 | Spammers Are Becoming "smarter" on Twitter | Chen, C; Zhang, J; Xiang, Y; Zhou, W; Oliver, J |
2016-12-01 | On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks | Sayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W |
2021-01-01 | Desynchronization Attacks Resilient Watermarking Method Based on Frequency Singular Value Coefficient Modification | Zhao, J; Zong, T; Xiang, Y; Gao, L; Zhou, W; Beliakov, G |
2021-01-01 | Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat | Yang, LX; Li, P; Yang, X; Xiang, Y; Jiang, F; Zhou, W |
2021-07-01 | Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party Control | Liu, J; Hou, J; Yang, W; Xiang, Y; Zhou, W; Wu, W; Huang, X |