15 results on '"Xiaolin Chang"'
Search Results
2. SES2: A Secure and Efficient Symmetric Searchable Encryption Scheme for Structured Data.
3. Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
4. Mal-LSGAN: An Effective Adversarial Malware Example Generation Model.
5. Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications.
6. Trade-offs in large blockchain-based IoT system design.
7. Multiple entry point PBFT for IoT systems.
8. Model-based Performance Evaluation of a Moving Target Defense System.
9. Making Transaction Propagation More Efficient: Deferred Transaction Relay in Bitcoin.
10. Exploiting Dynamic Platform Protection Technique for Increasing Service MTTF.
11. On Ledger Inconsistency Time in Bitcoin's Blockchain Delivery Network.
12. Kernel Based Estimation of Domain Parameters at IoT Proxy.
13. Efficient Traffic Reduction in IoT Domains Using Bernoulli Scheduling of Proactive Cache Refresh.
14. An integral sliding mode based AQM mechanism for stable queue length.
15. Adaptive marking threshold for improving bandwidth assurance in a differentiated services network.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.