Search

Your search keyword '"Wanlei Zhou"' showing total 454 results

Search Constraints

Start Over You searched for: Author "Wanlei Zhou" Remove constraint Author: "Wanlei Zhou" Language undetermined Remove constraint Language: undetermined
454 results on '"Wanlei Zhou"'

Search Results

1. Differentially Private Crowdsourcing With the Public and Private Blockchain

2. Adversarial Attacks Against Deep Generative Models on Data: A Survey

6. Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack

7. Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity

8. Privacy Intelligence: A Survey on Image Privacy in Online Social Networks

9. New challenges in reinforcement learning: a survey of security and privacy

10. Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks

11. Request Reliability Augmentation With Service Function Chain Requirements in Mobile Edge Computing

12. Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks

13. Fairness in graph-based semi-supervised learning

15. The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks

16. Maximizing User Service Satisfaction for Delay-Sensitive IoT Applications in Edge Computing

17. Image fairness in deep learning: problems, models, and challenges

18. Recognizing Very Small Face Images Using Convolution Neural Networks

25. Game Theoretical Adversarial Deep Learning With Variational Adversaries

27. More than Privacy

34. Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels

36. Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria

37. Authenticated Medical Documents Releasing with Privacy Protection and Release Control

38. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks

39. An Identity-Based and Revocable Data-Sharing Scheme in VANETs

40. GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems

41. Private collaborative filtering under untrusted recommender server

42. Differentially private model publishing in cyber physical systems

43. Network sparse representation: Decomposition, dimensionality-reduction and reconstruction

44. Correlated Differential Privacy: Feature Selection in Machine Learning

45. Blockchain for secure location verification

46. Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning

48. Private‐encoder: Enforcing privacy in latent space for human face images

49. A blockchain-based location privacy-preserving crowdsensing system

50. E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT

Catalog

Books, media, physical & digital resources