87 results on '"Chen, Honglong"'
Search Results
2. Towards unifying pre-trained language models for semantic text exchange
3. Shared Dictionary Learning Via Coupled Adaptations for Cross-Domain Classification
4. Towards time-constrained task allocation in semi-opportunistic mobile crowdsensing
5. Generation-based parallel particle swarm optimization for adversarial text attacks
6. BFSearch: Bloom filter based tag searching for large-scale RFID systems
7. Edge data based trailer inception probabilistic matrix factorization for context-aware movie recommendation
8. Multi-view learning for hyperspectral image classification: An overview
9. Securing wireless communications from the perspective of physical layer: A survey
10. Optimizing task allocation with temporal‐spatial privacy protection in mobile crowdsensing.
11. Route recommendation based on temporal–spatial metric
12. Worm computing: A blockchain-based resource sharing and cybersecurity framework
13. Methods of improving Secrecy Transmission Capacity in wireless random networks
14. PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks
15. PAN: Pipeline assisted neural networks model for data-to-text generation in social internet of things
16. EUMD: Efficient slot utilization based missing tag detection with unknown tags
17. RMTS: A robust clock synchronization scheme for wireless sensor networks
18. A Novel Distributed algorithm for constructing virtual backbones in wireless sensor networks
19. Efficient 3-dimensional localization for RFID systems using jumping probe
20. Cost-effective barrier coverage formation in heterogeneous wireless sensor networks
21. Achieving location error tolerant barrier coverage for wireless sensor networks
22. SINR based shortest link scheduling with oblivious power control in wireless networks
23. CRPD: a novel clustering routing protocol for dynamic wireless sensor networks
24. Contact expectation based routing for delay tolerant networks
25. Probabilistic Coverage Constraint Task Assignment with Privacy Protection in Vehicular Crowdsensing.
26. Securing DV-Hop localization against wormhole attacks in wireless sensor networks
27. On protecting end-to-end location privacy against local eavesdropper in Wireless Sensor Networks
28. GAR: Group aware cooperative routing protocol for resource-constraint opportunistic networks
29. Channel State Information Based Indoor Fingerprinting Localization.
30. Adaptive Anti-Over-Fitting Soft Sensing Method Based on Local Learning
31. Nonlinear process fault diagnosis using kernel ICA and improved FDA
32. Fast and Effective Tag Searching for Multi-Group RFID Systems.
33. ARPCNN: Auxiliary Review-Based Personalized Attentional CNN for Trustworthy Recommendation.
34. Incorporating multi‐interest into recommendation with graph convolution networks.
35. A Novel Secure Localization Approach in Wireless Sensor Networks
36. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
37. SAN: Attention‐based social aggregation neural networks for recommendation system.
38. OPAT: Optimized Allocation of Time-Dependent Tasks for Mobile Crowdsensing.
39. Fast and Reliable Missing Tag Detection for Multiple-Group RFID Systems.
40. DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems.
41. From edge data to recommendation: A double attention-based deformable convolutional network.
42. Guest Editorial: Special Section on Distributed Intelligence Over Internet of Things.
43. Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems.
44. A Secure Localization Approach against Wormhole Attacks Using Distance Consistency
45. A Novel Secure Localization Approach in Wireless Sensor Networks
46. Trust‐aware generative adversarial network with recurrent neural network for recommender systems.
47. Efficient Link Scheduling in Wireless Networks Under Rayleigh-Fading and Multiuser Interference.
48. Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems.
49. When Mobile Crowdsensing Meets Privacy.
50. Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.