Issue Date | Title | Author(s) |
2018-01-01 | Using Adversarial Noises to Protect Privacy in Deep Learning Era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2018-05-01 | Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks | Wang, D; Wu, T; Wen, S; Liu, D; Xiang, Y; Zhou, W; Hassan, H; Alelaiwi, A |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2019-01-01 | A manifesto for future generation cloud computing: Research directions for the next decade | Buyya, R; Srirama, SN; Casale, G; Calheiros, R; Simmhan, Y; Varghese, B; Gelenbe, E; Javadi, B; Vaquero, LM; Netto, MAS; Toosi, AN; Rodriguez, MA; Llorente, IM; De Capitani Di Vimercati, S; Samarati, P; Milojicic, D; Varela, C; Bahsoon, R; Dias De Assuncao, M; Rana, O; Zhou, W; Jin, H; Gentzsch, W; Zomaya, AY; Shen, H |
2005-12-01 | Vision-based SLAM using natural features in indoor environments | Miró, JV; Dissanayake, G; Zhou, W |
2018-05-27 | Differential Private POI Queries via Johnson-Lindenstrauss Transform | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2018-01-01 | Integrating ant colony algorithm and node centrality to improve prediction of information diffusion in social networks | Majbouri Yazdi, K; Yazdi, AM; Khodayi, S; Hou, J; Zhou, W; Saedy, S |
2019-01-01 | Source identification under complete observations: A maximum likelihood (ML) source estimator | Jiang, J; Wen, S; Yu, S; Liu, B; Xiang, Y; Zhou, W |
2018-10-01 | Answering differentially private queries for continual datasets release | Zhu, T; Li, G; Xiong, P; Zhou, W |
2019-07-01 | Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach | Yang, LX; Li, P; Zhang, Y; Yang, X; Xiang, Y; Zhou, W |