Issue Date | Title | Author(s) |
2021-01-01 | Fooling intrusion detection systems using adversarially autoencoder | Chen, J; Wu, D; Zhao, Y; Sharma, N; Blumenstein, M; Yu, S |
2020-01-01 | Spam detection in reviews using lstm-based multi-entity temporal features | Xiang, L; Guo, G; Li, Q; Zhu, C; Chen, J; Ma, H |
2022-01-01 | Time-Enabled and Verifiable Secure Search for Blockchain-Empowered Electronic Health Record Sharing in IoT | Nie, X; Zhang, A; Chen, J; Qu, Y; Yu, S; Megias, D |
2022-01-01 | Blockchain-Empowered Secure and Privacy-Preserving Health Data Sharing in Edge-Based IoMT | Nie, X; Zhang, A; Chen, J; Qu, Y; Yu, S; Wang, D |
2022-03-22 | Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks | Zhao, Y; Chen, J; Zhang, J; Wu, D; Blumenstein, M; Yu, S |
2022-01-01 | Modeling market fluctuations under investor sentiment with a Hawkes-Contact process | Zhang, J; Wen, J; Chen, J |
2016-10-01 | Graph Theory-Based QoE-Driven Cooperation Stimulation for Content Dissemination in Device-To-Device Communication | Zhang, A; Chen, J; Zhou, L; Yu, S |
2016-12-25 | Caching algorithms for broadcasting and multicasting in disruption tolerant networks | Tian, F; Liu, B; Zhou, H; Rui, Y; Chen, J; Xiong, J; Gui, L |
2017-04-01 | A Parallel Random Forest Algorithm for Big Data in a Spark Cloud Computing Environment | Chen, J; Li, K; Tang, Z; Bilal, K; Yu, S; Weng, C; Li, K |
2018-09-01 | Conversational agents in healthcare: a systematic review. | Laranjo, L; Dunn, AG; Tong, HL; Kocaballi, AB; Chen, J; Bashir, R; Surian, D; Gallego, B; Magrabi, F; Lau, AYS; Coiera, E |