48 results on '"Yang, Yixian"'
Search Results
2. Lightweight Voice Spoofing Detection using Improved One-Class Learning and Knowledge Distillation
3. Fast and Privacy-Preserving Attribute-Based Keyword Search in Cloud Document Services
4. Privacy-Preserving Traceable Attribute-Based Keyword Search in Multi-Authority Medical Cloud
5. Privacy-Preserving Spatio-Temporal Keyword Search for Outsourced Location-Based Services
6. P2GT: Fine-Grained Genomic Data Access Control With Privacy-Preserving Testing in Cloud Computing
7. Privacy-Preserving Subgraph Matching Scheme With Authentication in Social Networks
8. Constructions and Weight Distributions of Optimal Locally Repairable Codes
9. Secure Data Group Sharing and Conditional Dissemination with Multi-Owner in Cloud Computing
10. Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry
11. Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud
12. Certificateless Designated Verifier Anonymous Aggregate Signature Scheme for Healthcare Wireless Sensor Networks
13. Chaotic Deep Network for Mobile D2D Communication
14. Privacy-Preserving Media Sharing with Scalable Access Control and Secure Deduplication in Mobile Cloud Computing
15. Privacy-Preserving Verifiable Graph Intersection Scheme With Cryptographic Accumulators in Social Networks
16. Privacy-Preserving Multidimensional Data Aggregation Scheme Without Trusted Authority in Smart Grid
17. Secure ABE Scheme for Access Management in Blockchain-Based IoT
18. Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach
19. Secure and Traceable Image Transmission Scheme Based on Semitensor Product Compressed Sensing in Telemedicine System
20. Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant DC–DC Converter With GaN Devices
21. Intermittent Pinning Synchronization of Memristor-Based Switching Networks With Multi-Links and Mixed Delays
22. Using User Behavior to Measure Privacy on Online Social Networks
23. Finite-Time Synchronization of Multi-Linked Memristor-Based Neural Networks With Mixed Time-Varying Delays
24. Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization
25. Efficient and Secure Image Communication System Based on Compressed Sensing for IoT Monitoring Applications
26. Robust Privacy-Preserving Mutual Authenticated Key Agreement Scheme in Roaming Service for Global Mobility Networks
27. Flexible and Secure Data Transmission System Based on Semitensor Compressive Sensing in Wireless Body Area Networks
28. P-Tensor Product in Compressed Sensing
29. LRM: A Location Recombination Mechanism for Achieving Trajectory $k$ -Anonymity Privacy Protection
30. Certificateless Short Aggregate Signature Scheme for Mobile Devices
31. New Construction of Blind Signatures From Braid Groups
32. Optimal Weakly Secure Minimum Storage Regenerating Codes Scheme
33. Securing Named Data Networking: Attribute-Based Encryption and Beyond
34. A Novel Digital Watermarking Based on General Non-Negative Matrix Factorization
35. A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing
36. Fixed-Time Synchronization of Memristive Fuzzy BAM Cellular Neural Networks With Time-Varying Delays Based on Feedback Controllers
37. Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing
38. Correction to “Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things”
39. Adaptive Lag Synchronization of Memristive Neural Networks With Mixed Delays
40. An overview of general theory of security
41. Secure and Energy-Efficient Data Transmission System Based on Chaotic Compressive Sensing in Body-to-Body Networks
42. General Theory of Security and a Study Case in Internet of Things
43. Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things
44. Prediction of Rising Stars in the Game of Cricket
45. Compressive Sensing‐Based Audio Semi‐fragile Zero‐Watermarking Algorithm
46. Input Generation via Taintdata Identification: Finding Hidden Path in the Environment‐Intensive Program
47. Hierarchical identity-based broadcast encryption scheme from LWE
48. A Note on the Multiple-Unicast Network Coding Conjecture
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.