Issue Date | Title | Author(s) |
2018-01-01 | Using Adversarial Noises to Protect Privacy in Deep Learning Era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2018-05-01 | Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks | Wang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2013-12-25 | A clustering based coscheduling strategy for efficient scientific workflow execution in cloud computing | Deng, K; Ren, K; Song, J; Yuan, D; Xiang, Y; Chen, J |
2015-01-01 | Design and implementation of the hadoop-based crawler for SaaS service discovery | Alkalbani, A; Shenoy, A; Hussain, FK; Hussain, OK; Xiang, Y |
2018-05-27 | Differential Private POI Queries via Johnson-Lindenstrauss Transform | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Source identification under complete observations: A maximum likelihood (ML) source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-07-01 | Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach | Yang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W |
2019-04-01 | Location privacy protection in smart health care system | Natgunanathan, I; Mehmood, A; Xiang, Y; Gao, L; Yu, S |
2018-05-29 | A data-driven attack against support vectors of SVM | Liu, S; Zhou, W; Zhang, J; Xiang, Y; Wangt, Y; De Vel, O |