Search

Current filters:
Add Filter:

Results

Customise results display
Item hits:
Issue DateTitleAuthor(s)
2022-01-01Peripheral-free Device Pairing by RandomlySwitching PowerShao, Z; Weng, J; Zhang, Y; Wu, Y; Li, M; Weng, J; Luo, W; Yu, S
2022-01-01LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency CheckChen, Z; Wang, S; Fu, A; Gao, Y; Yu, S; Deng, RH
2022-01-01IPANM: Incentive Public Auditing Scheme for Non-Manager Groups in CloudsHuang, L; Zhou, J; Zhang, G; Sun, J; Wei, T; Yu, S; Hu, S
2016-12-01On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor NetworksSayad Haghighi, M; Wen, S; Xiang, Y; Quinn, B; Zhou, W
2016-09-01PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation with Fault ToleranceHan, S; Zhao, S; Li, Q; Ju, CH; Zhou, W
2022-03-01A clustering-based approach for prioritizing health, safety and environment risks integrating fuzzy C-means and hybrid decision-making methodsValipour, M; Yousefi, S; Jahangoshai Rezaee, M; Saberi, M
2017-04-01Statistical Features-Based Real-Time Detection of Drifted Twitter SpamChen, C; Wang, Y; Zhang, J; Xiang, Y; Zhou, W; Min, G
2022-01-01UCoin: An Efficient Privacy Preserving Scheme for CryptocurrenciesNosouhi, MR; Yu, S; Sood, K; Grobler, M; Jurdak, R; Dorri, A; Shen, S
2023RDP-GAN: A Rényi-Differential Privacy Based Generative Adversarial NetworkMa, C; Li, J; Ding, M; Liu, B; Wei, K; Weng, J; Poor, HV
2021-01-01A Differentially Private Game Theoretic Approach for Deceiving Cyber AdversariesYe, D; Zhu, T; Shen, S; Zhou, W
Results 11-20 of 53 (Search time: 0.009 seconds).