Issue Date | Title | Author(s) |
2019-01-01 | Source identification under snapshots: A sample path based source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2019-01-01 | Comparative study and numerical analysis | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-03-31 | Location Privacy and Its Applications: A Systematic Study | Liu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y |
2019-05-15 | A reliable reputation computation framework for online items in E-commerce | Ma, L; Pei, Q; Xiang, Y; Yao, L; Yu, S |
2018-03-19 | Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | SPARSE: Privacy-Aware and Collusion Resistant Location Proof Generation and Verification | Reza Nosouhi, M; Yu, S; Grobler, M; Xiang, Y; Zhu, Z |
2020-02-01 | A Fog-Based Recommender System | Wang, X; Gu, B; Ren, Y; Ye, W; Yu, S; Xiang, Y; Gao, L |
2018-01-01 | Dissemination of authenticated tree-structured data with privacy protection and fine-grained control in outsourced databases | Liu, J; Ma, J; Zhou, W; Xiang, Y; Huang, X |
2020-07-01 | Alleviating Heterogeneity in SDN-IoT Networks to Maintain QoS and Enhance Security | Sood, K; Karmakar, KK; Yu, S; Varadharajan, V; Pokhrel, SR; Xiang, Y |
2018-01-01 | Rumor Source Identification in Social Networks with Time-Varying Topology | Jiang, J; Wen, S; Yu, S; Xiang, Y; Zhou, W |