126 results on '"Zhang, Gongxuan"'
Search Results
2. QoE and Reliability-Aware Task Scheduling for Multi-user Mobile-Edge Computing
3. Device Identity Recognition Based on an Adaptive Environment for Intrinsic Security Fingerprints
4. Obtaining strength and ductility synergy for directed energy deposited Ti17 alloys by machine learning
5. Epidemic spreading in wireless sensor networks with node sleep scheduling
6. Improvements Based on JWT and RBAC for Spring Security Framework
7. Traffic-Driven Epidemic Spreading in Networks: Considering the Transition of Infection From Being Mild to Severe
8. A TPM-Based Secure Multi-Cloud Storage Architecture Grounded on Erasure Codes
9. Promoted phase transformation of α2 to O in Ti2AlNb alloy with improved mechanical performance via laser shock peening
10. Gradient microstructure response in different phases of Ti2AlNb alloy with laser shock peening
11. One-to-Multiple Clean-Label Image Camouflage (Omclic) Based Backdoor Attack on Deep Learning
12. Deadline and Reliability Aware Multiserver Configuration Optimization for Maximizing Profit
13. An approach for unsupervised contextual anomaly detection and characterization
14. Hypergraph-Based Resource Allocation for Ultra-Dense Wireless Network in Industrial IoT
15. Design and Evaluation of a Multi-Domain Trojan Detection Method on Deep Neural Networks
16. Uniformly asymptotic normality of the weighted estimator in nonparametric regression model with φ-mixing errors
17. A Multiserver Configuration and Request Distribution Framework for Profit Maximization in a Three-Tier Cloud Service Architecture
18. Cyclic quantum state sharing with a nine-qubit entangled state
19. LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV
20. APDP: Attribute-Based Personalized Differential Privacy Data Publishing Scheme for Social Networks
21. Location Privacy Protection Scheme Without Trusted Third Party
22. Multiserver System Configuration Scheme for Profit Maximization
23. Lifetime-Driven Scheduling of Security-Critical Internet-of-Things Applications on Real-Time Heterogeneous Multicore Systems
24. A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services
25. Matrix Factorization for User Behavior Analysis of Location-Based Social Network
26. Heuristic Search for Scheduling Flexible Manufacturing Systems Using Multiple Heuristic Functions
27. EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles
28. A Distributed Load Balancing Clustering Algorithm for Wireless Sensor Networks
29. A near-autonomous and incremental intrusion detection system through active learning of known and unknown attacks
30. Improvement in oxidation resistance of Ti2AlNb alloys at high temperatures by laser shock peening
31. Security and trust in ubiquitous systems
32. A Cloud Computing System for Snore Signals Processing
33. Hierarchical Clustering Routing Protocol Based on Optimal Load Balancing in Wireless Sensor Networks
34. Power-Efficient Layer Mapping for CNNs on Integrated CPU and GPU Platforms
35. Side Channel Leakage Alignment Based on Longest Common Subsequence
36. Scalable and Updatable Attribute-based Privacy Protection Scheme for Big Data Publishing
37. A Two-Layer Duplicate Filtering Approach for RFID Data Streams
38. A TCM-Enabled Access Control Scheme
39. An intelligent and blind dual color image watermarking for authentication and copyright protection
40. A Joint Operation Method of Fuzzy Test and Dynamic Symbol Execution
41. A Robust Image Watermarking Approach Using Cycle Variational Autoencoder
42. Evaluation of Channel Coding Techniques for Massive Machine-Type Communication in 5G Cellular Network
43. An outlier ensemble for unsupervised anomaly detection in honeypots data
44. A modified LOF-based approach for outlier characterization in IoT
45. Certificateless Public Verification for Data Storage and Sharing in the Cloud
46. PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT
47. Customer Perceived Value- and Risk-Aware Multiserver Configuration for Profit Maximization
48. Ensuing Security in a Proposed Tertiary Institution Cloud Computing Environment: Introducing a NoHype Framework to the Private Cloud as a Way of Securing the IaaS Model
49. An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics
50. A Data Storage and Sharing Scheme for Cyber-Physical-Social Systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.