Search

Your search keyword '"Xiong, Jinbo"' showing total 72 results

Search Constraints

Start Over You searched for: Author "Xiong, Jinbo" Remove constraint Author: "Xiong, Jinbo" Publication Type eBooks Remove constraint Publication Type: eBooks
72 results on '"Xiong, Jinbo"'

Search Results

2. FPPNet: Fast Privacy-Preserving Neural Network via Three-Party Arithmetic Secret Sharing

3. Image Classification with Transfer Learning and FastAI

4. Who Distributes It? Privacy-Preserving Image Sharing Scheme with Illegal Distribution Detection

5. Workload-Aware Page-Level Flash Translation Layer for NAND Flash-Based Storage Systems

6. Achieving Proof of Shared Ownership for the Shared File in Collaborative Cloud Applications

7. Personal Health Records Integrity Verification Using Attribute Based Proxy Signature in Cloud Computing

8. TNC-eSA: An Echanced Security Access Solution to Office Networks

9. Application of Yolov5 Algorithm in Identification of Transmission Line Insulators

10. Ship Detection in SAR Images Based on an Improved Detector with Rotational Boxes

11. Detection and Localization Algorithm Based on Sparse Reconstruction

12. High Spatial Resolution Remote Sensing Classification with Lightweight CNN Using Dilated Convolution

13. Chinese License Plate Recognition System Design Based on YOLOv4 and CRNN + CTC Algorithm

14. Automatic Modulation Classification Using Convolutional Recurrent Attention Network

15. RSS Fingerprint Based Signal Source Localization Using Singular Value Decomposition

16. An Object Detection and Tracking Algorithm Combined with Semantic Information

17. Construct Forensic Evidence Networks from Information Fragments

18. Improved Speech Emotion Recognition Using LAM and CTC

19. Automatic Modulation Classification Based on Multimodal Coordinated Integration Architecture and Feature Fusion

20. Matching Ontologies Through Siamese Neural Network

21. A New Ensemble Pruning Method Based on Margin and Diversity

22. LSTM-Based Battlefield Electromagnetic Situation Prediction

23. Activity Behavior Pattern Mining and Recognition

24. Mining Personal Health Satisfaction and Disease Index from Medical Examinations

25. Study on the Influence of Attention Mechanism in Large-Scale Sea Surface Temperature Prediction Based on Temporal Convolutional Network

26. ADS-B Signal Separation Via Complex Neural Network

27. Research Progress and Future Trend Analysis of Network Security Situational Awareness

28. UserRBPM: User Retweet Behavior Prediction with Graph Representation Learning

29. Visualizing Symbolic Music via Textualization: An Empirical Study on Chinese Traditional Folk Music

30. BMP Color Images Steganographer Detection Based on Deep Learning

31. A Smart Access Control Mechanism Based on User Preference in Online Social Networks

32. Network Security Situational Awareness Model Based on Threat Intelligence

33. Intrusion Detection System Based on Improved Artificial Immune Algorithm

34. Multi-scale Two-Way Deblurring Network for Non-uniform Single Image Deblurring

35. De-anonymization Attack Method of Mobility Trajectory Data Based on Semantic Trajectory Pattern

36. An Improved DDoS Attack Detection Model Based on Unsupervised Learning in Smart Grid

37. Real-Time Stream Statistics via Local Differential Privacy in Mobile Crowdsensing

38. Scale Variable Dynamic Stream Anomaly Detection with Multi-chain Queue Structure

39. Vendor-Based Privacy-Preserving POI Recommendation Network

40. Privacy-Preserving Computation Tookit on Floating-Point Numbers

41. Towards Efficient Fine-Grained Access Control and Data Privacy Protection for Smart Home

42. Fine-Grained Collaborative Access Control for IPFS with Efficient Revocation

43. A Novel Location Privacy-Preserving Task Allocation Scheme for Spatial Crowdsourcing

44. A Rational Delegating Computation Protocol Based on Smart Contract

45. Privacy-Preserving Property Prediction for New Drugs with MPNN

46. Privacy-Preserving Subset Aggregation with Local Differential Privacy in Fog-Based IoT

47. Improved Attribute Proxy Re-encryption Scheme

48. An Efficient Certificateless Cloud Data Integrity Detection Scheme for Ecological Data

49. Friendship Protection: A Trust-Based Shamir Secret Sharing Anti-collusion Attack Strategy for Friend Search Engines

50. A Survey on Spatial Keyword Search over Encrypted Data

Catalog

Books, media, physical & digital resources