102 results on '"Xianmin Wang"'
Search Results
2. A spatiotemporal and motion information extraction network for action recognition.
3. Optimal Granularity of Machine Learning Models: A Perspective of Granular Computing.
4. Locally Private Set-Valued Data Analyses: Distribution and Heavy Hitters Estimation.
5. A Survey of Privacy Preserving Subgraph Matching Methods.
6. Experimental Comparison of Graph Edit Distance Computation Methods.
7. A Hidden Markov Model-based fuzzy modeling of multivariate time series.
8. AR2PNET: an adversarially robust re-weighting prototypical network for few-shot learning.
9. Near real-time spatial prediction of earthquake-induced landslides: A novel interpretable self-supervised learning method.
10. Feature evolvable learning with image streams.
11. OR-AutoRec: An Outlier-Resilient Autoencoder-based Recommendation model.
12. Robust semi-supervised learning with reciprocal weighted mixing distribution alignment.
13. GDSNet: A gated dual-stream convolutional neural network for automatic recognition of coseismic landslides.
14. Near-Real Prediction of Earthquake-Triggered Landslides on the Southeastern Margin of the Tibetan Plateau.
15. A Hierarchical Approach to Interpretability of TS Rule-Based Models.
16. Identification of Fuzzy Rule-Based Models With Collaborative Fuzzy Clustering.
17. Contrastive distortion-level learning-based no-reference image-quality assessment.
18. Towards explainable model extraction attacks.
19. DE-RSTC: A rational secure two-party computation protocol based on direction entropy.
20. Task-aware swapping for efficient DNN inference on DRAM-constrained edge systems.
21. An effective and practical gradient inversion attack.
22. 3D-Fingerprint Augment based on Super-Resolution for Indoor 3D WiFi Localization.
23. Super-Resolution Based Fingerprint Augment for Indoor WiFi Localization.
24. Machine Learning Assisted OSP Approach for Improved QoS Performance on 3D Charge-Trap Based SSDs.
25. Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching.
26. An improved anti-quantum MST3 public key encryption scheme for remote sensing images.
27. Generating transferable adversarial examples based on perceptually-aligned perturbation.
28. Identification of Fuzzy Rule-Based Models With Output Space Knowledge Guidance.
29. Design of Interval Type-2 Information Granules Based on the Principle of Justifiable Granularity.
30. Aggregation of Order-2 Fuzzy Sets.
31. Research and application of intrusion detection method based on hierarchical features.
32. Energy trading scheme based on consortium blockchain and game theory.
33. A Novel Deep Learning Method for Automatic Recognition of Coseismic Landslides.
34. Signal Distribution Oriented Mean Functions in GPR based Fingerprint Augment.
35. Clustering of Information Granules in Hotspot Identification.
36. Alternating Renewal Theory Based MAC-Layer Sensing Period Optimization in CRNs with Hybrid OFF/ON Channel State Length Distributions.
37. DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models.
38. Adversarial attacks on deep-learning-based radar range profile target recognition.
39. Identity-based data storage scheme with anonymous key generation in fog computing.
40. Experimental Evaluation of Transformer Internal Fault Detection Based on V-I Characteristics.
41. Hyperplane Division in Fuzzy C-Means: Clustering Big Data.
42. Approximation of Fuzzy Sets by Interval Type-2 Trapezoidal Fuzzy Sets.
43. Machine learning assisted OSP approach for improved QoS performance on 3D charge-trap based SSDs.
44. Position Paper on Blockchain Technology: Smart Contract and Applications.
45. A packet-reordering covert channel over VoLTE voice and video traffics.
46. A hierarchical group key agreement protocol using orientable attributes for cloud computing.
47. Multilevel similarity model for high-resolution remote sensing image registration.
48. Multi-level multi-secret sharing scheme for decentralized e-voting in cloud computing.
49. The security of machine learning in an adversarial setting: A survey.
50. Clustering Homogeneous Granular Data: Formation and Evaluation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.