62 results on '"Jianming Zhu"'
Search Results
2. Locally Differential Private Federated Learning with Controllable Perturbation Domains.
3. A Novel Federated Learning with Bidirectional Adaptive Differential Privacy.
4. A Virtual Reinforcement Learning Method for Aero-engine Intelligent Control.
5. Stochastic Model for Rumor Blocking Problem in Social Networks Under Rumor Source Uncertainty.
6. Ownership Tokenization and Incentive Design for Learning-based User-Generated Content.
7. BMSC: A Novel Anonymous Trading Scheme Based on Zero-Knowledge Proof in Ethereum.
8. Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption.
9. KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment.
10. Decentralized Blockchain Transaction Scheme Based on Digital Commitment.
11. Application Research of Safety Helmet Detection Based on Low Computing Power Platform Using YOLO v5.
12. On Forecasting Dynamics In Online Discussion Forums.
13. Code Will Speak: Early detection of Ponzi Smart Contracts on Ethereum.
14. IoT Security Situational Awareness Based on Q-Learning and Bayesian Game.
15. Privacy Protection Model for Blockchain Data Sharing Based on zk-SNARK.
16. Trustworthy Blockchain Data Sharing Model Based on Multi-authority ABE and zk-SNARK.
17. Blockchain Empowered Reliable Federated Learning by Worker Selection: A Trustworthy Reputation Evaluation Method.
18. Measurement and Analysis of Network Data Based on MQTT Protocol.
19. Trustworthy Dynamic Target Detection and Automatic Monitor Scheme for Mortgage Loan with Blockchain-Based Smart Contract.
20. A New Attack Method for Malicious Nodes in Tangle Network.
21. A Review on the Study on MQTT Security Challenge.
22. Empirical Study on the Correlation and Volatility between Bitcoin and the Blockchain Index: Based on Granger causality test and GARCH-class model.
23. Profit Maximization Under Group Influence Model in Social Networks.
24. Research on the Security Criteria of Hash Functions in the Blockchain.
25. CPS Information Security Risk Evaluation System Based on Petri Net.
26. Model and Algorithm for Rescue Resource Assignment Problem in Disaster Response Based on Demand-Ability-Equipment Matching.
27. A Study on MQTT Node Selection.
28. Privacy-Preserving Access Control Scheme for Outsourced Data in Cloud.
29. Study Two-Stages Relief Supplies Distribution Problem Based on Characteristics of Disaster Situation Information.
30. Monoecism Watermarking Algorithm.
31. Connected distribution center location problem under traffic network in emergency management.
32. Secret Sharing Scheme with Fairness.
33. Intelligent Digital Photo Management System Using Ontology and SWRL.
34. A New Scheme to Privacy-Preserving Collaborative Data Mining.
35. A Hybrid Vulnerability Analysis Method against Non-Security Protocols.
36. New Algorithm for Minimum Multicast Time Problem in Wireless Sensor Networks.
37. Minimum Multicast Time Problem in Wireless Sensor Networks.
38. Effects of Phase Noise at Both Transmitter and Receiver on the Performance of OFDM Systems.
39. Design and Implementation of Survivable Network Systems.
40. Minimum Data Aggregation Time Problem in Wireless Sensor Networks.
41. Power allocation algorithm in MC-CDMA.
42. An Improved Privacy-Preserving Collaborative Filtering Recommendation Algorithm.
43. A Research of E-Government Website Performance and its Relations with Economic Development.
44. Optimal information security investment analyses with the consideration of the benefits of investment and using evolutionary game theory.
45. The application of game theory in mobile social media security analysis for companies.
46. An Adaptive Replicas Creation Algorithm with Fault Tolerance in the Distributed Storage Network
47. A Trust-Aware Mobile Multiple Micro-Payment Mechanism Based on Smart Agent in Distributed Environment
48. A Labeling Algorithm for the Earliest and Latest Time-Varying Maximum Flow Problems.
49. Equitable resource allocation problem with multiple depots in emergency management.
50. Privacy-preserving distributed association rule mining based on the secret sharing technique.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.