34 results on '"Zhuo-Ma"'
Search Results
2. ACT-R Theory Can Promote Personality Analysis of Social Network Subjects.
3. Efficiently Answering Quality Constrained Shortest Distance Queries in Large Graphs.
4. TripleLP: Privacy-Preserving Log Parsing Based on Blockchain.
5. Secondary Labeling: A Novel Labeling Strategy for Image Manipulation Detection.
6. Design and Verification of an Active Lower Limb Exoskeleton for Micro-low Gravity Simulation Training.
7. A Temporal-Context-Aware Approach for Individual Human Mobility Inference Based on Sparse Trajectory Data.
8. Backdoor Defense with Machine Unlearning.
9. Compressed Federated Learning Based on Adaptive Local Differential Privacy.
10. Deep Reinforcement Learning-based UAV-assisted Mobile Edge Computing Offloading and Resource Allocation Decision.
11. Dynamic Resource Scheduling and Frequency Scaling in NOMA-Based Multi-access Edge Computing System.
12. SeInspect: Defending Model Stealing via Heterogeneous Semantic Inspection.
13. Deep Reinforcement Learning Based Dynamic Content Placement and Bandwidth Allocation in Internet of Vehicles.
14. A Performance Evaluating Platform for Variable Stiffness Exoskeleton Joint.
15. Novel pneumatic artificial muscle based on film thermoforming and wire weaving.
16. Deep Deterministic Policy Gradient Based Resource Allocation in Internet of Vehicles.
17. Boosting Privately: Federated Extreme Gradient Boosting for Mobile Crowdsensing.
18. Medical Privacy-preserving Service Recommendation.
19. PE-HEALTH: Enabling Fully Encrypted CNN for Health Monitor with Optimized Communication.
20. A Decentralized Weighted Vote Traffic Congestion Detection Framework for ITS.
21. Deep Reinforcement Learning for Pre-caching and Task Allocation in Internet of Vehicles.
22. Efficient Hierarchical Data Access Control for Resource-Limited Users in Cloud-Based e-Health.
23. Privacy-Preserving Compressive Sensing for Traffic Estimation.
24. Cross-Organizational Access Control for EHRs: Trustworthy, Flexible, Transparent.
25. An empirical study of SMS one-time password authentication in Android apps.
26. Time Series Based Bandwidth Allocation Strategy in Cloud Datacenter.
27. Attribute-Based Influence Maximization in Social Networks.
28. A simple frequency-domain equalizer over doubly-selective channel without feedback.
29. Poster Abstract: A Practical Sybil-Proof Incentive Mechanism for Multichannel Allocation.
30. A 40nm/65nm process adaptive low jitter phase-locked loop.
31. Data Directed Estimation Based Turbo Equalization in HF Communication.
32. An adaptive multi-modulus frequency divider.
33. A noise rejective VCO with build-in active LC filter.
34. Provably Secure Trusted Access Protocol for WLAN Mesh Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.