Issue Date | Title | Author(s) |
2013-12-01 | The foundation of fuzzy rule interchange in the Semantic Web | Wang, X; Chen, J; Cao, L; Meng, X |
2012-09-01 | A QoS-aware composition method supporting cross-platform service invocation in cloud environment | Qi, L; Dou, W; Zhang, X; Chen, J |
2018-01-01 | Secure Message Dissemination in Vehicular Networks: A Topological Approach | Chen, J; Mao, G |
2017-10-02 | Sequential multi-objective optimization method for electromagnetic inverse problems | Li, Y; Lei, G; He, L; Chen, J; Zhang, AJ |
2021-01-01 | Some new Pythagorean fuzzy correlation techniques via statistical viewpoint with applications to decision-making problems | Ejegwa, PA; Wen, S; Feng, Y; Zhang, W; Chen, J |
2016-12-01 | Secure data-centric access control for smart grid services based on publish/subscribe systems | Duan, L; Liu, D; Zhang, Y; Chen, S; Liu, RP; Cheng, B; Chen, J |
2014-01-01 | A security framework in G-Hadoop for big data computing across distributed Cloud data centres | Zhao, J; Wang, L; Tao, J; Chen, J; Sun, W; Ranjan, R; Kołodziej, J; Streit, A; Georgakopoulos, D |
2017-12-27 | MLE-based localization and performance analysis in probabilistic LOS/NLOS environment | Shi, X; Mao, G; Yang, Z; Chen, J |
2016-01-01 | Informedia @ TRecviD 2016 Med and AVs | Liang, J; Chen, J; Huang, P; Li, X; Jiang, L; Lan, Z; Pan, P; Fan, H; Jin, Q; Sun, J; Chen, Y; Yang, Y; Hauptmann, A |
2015-12-02 | Efficient searchable symmetric encryption for storing multiple source data on cloud | Liu, C; Zhu, L; Chen, J |