33 results on '"Xiong, Jinbo"'
Search Results
2. FLAP: Federated Learning Aggregation Scheme Based on Privileged Secret Sharing
3. Blockchain-enabled Secure Distributed Data Aggregation and Verification Mechanism for IIoT
4. Anonymous Hierarchical Identity-based Encryption EHR Sharing Mechanism Based on SM9
5. Secure YOLOv3-SPP: Edge-Cooperative Privacy-preserving Object Detection for Connected Autonomous Vehicles
6. An incentive mechanism for collaborative intelligence
7. Outsourced and Practical Privacy-Preserving K-Prototype Clustering supporting Mixed Data
8. Achieving trustworthiness, Transferable, Cross-domain Dynamic Accumulator Authentication in Industrial Internet of Things
9. A Three-party Repeated Game Model for Data Privacy in Mobile Edge Crowdsensing of IoT
10. A Personalized Privacy Protection Data Uploading Scheme for Mobile Crowdsensing
11. Low-Latency High-Level Data Sharing for Connected and Autonomous Vehicular Networks
12. Distributed and Application-Aware Task Scheduling in Edge-Clouds
13. A Novel Data Secure Deletion Scheme for Mobile Devices
14. Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game Theory
15. DPLK-Means: A Novel Differential Privacy K-Means Mechanism
16. Research Survey on Support Vector Machine
17. A novel role symmetric encryption algorithm for authorized deduplication in cloud
18. A Secure Data Deduplication Scheme Based on Differential Privacy
19. A Multi-replica Associated Deleting Scheme in Cloud
20. Role and Time-Based Access Control with Efficient Revocation for Cloud Storage
21. An efficient CGA algorithm against DoS attack on duplicate address detection process
22. Achieving Lightweight and Secure Access Control in Multi-authority Cloud
23. Trustworthy Service Composition in Service-Oriented Mobile Social Networks
24. Structured Document Model and Its Secure Access Control in Cloud Computing
25. Attribute Based Sequential Aggregate Signature
26. Attribute Based Multi-signature Scheme in the Standard Model
27. A Secure Document Self-Destruction Scheme: An ABE Approach
28. Fully Secure Decentralized Key-Policy Attribute-Based Encryption
29. A Secure Document Self-Destruction Scheme with Identity Based Encryption
30. Ciphertext-Policy Weighted Attribute Based Encryption for Fine-Grained Access Control
31. PRAM
32. An Interest-Based Recommending Framework of Folksonomies
33. Syncretizing Context Information into the Collaborative Filtering Recommendation
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.