122 results on '"Zhang, Gongxuan"'
Search Results
2. One-to-Multiple Clean-Label Image Camouflage (OmClic) based backdoor attack on deep learning
3. Epidemic spreading in wireless sensor networks with node sleep scheduling
4. Promoted phase transformation of α2 to O in Ti2AlNb alloy with improved mechanical performance via laser shock peening
5. Gradient microstructure response in different phases of Ti2AlNb alloy with laser shock peening
6. A Distributed Load Balancing Clustering Algorithm for Wireless Sensor Networks
7. EC-BAAS: Elliptic curve-based batch anonymous authentication scheme for Internet of Vehicles
8. Improvement in oxidation resistance of Ti2AlNb alloys at high temperatures by laser shock peening
9. A modified LOF-based approach for outlier characterization in IoT
10. An intelligent and blind dual color image watermarking for authentication and copyright protection
11. PRTA: A Proxy Re-encryption based Trusted Authorization scheme for nodes on CloudIoT
12. An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics
13. Robust and hybrid SVD-based image watermarking schemes:: A survey
14. Traffic-driven epidemic spreading and its control strategies
15. DIPOR: An IDA-based dynamic proof of retrievability scheme for cloud storage systems
16. Thermal-aware correlated two-level scheduling of real-time tasks with reduced processor energy on heterogeneous MPSoCs
17. A trust enhancement scheme for cluster-based wireless sensor networks
18. Power allocation algorithm based on mixed integer nonlinear programming in WSN
19. Device Identity Recognition Based on an Adaptive Environment for Intrinsic Security Fingerprints.
20. Privacy-Preserving Public Auditing for Non-manager Group Shared Data
21. Privacy-aware cross-cloud service recommendations based on Boolean historical invocation records
22. Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t, n) secret sharing for LTE/LTE-A networks
23. Accelerating Biomedical Signal Processing Using GPU: A Case Study of Snore Sound Feature Extraction
24. Search strategy for scheduling flexible manufacturing systems simultaneously using admissible heuristic functions and nonadmissible heuristic functions
25. Mapping ozone risks for rice in China for years 2000 and 2020 with flux-based and exposure-based doses
26. ApproxCCA: An approximate correlation analysis algorithm for multidimensional data streams
27. Fast and Secure Handover Authentication Scheme Based on Ticket for WiMAX and WiFi Heterogeneous Networks
28. Snore related signals processing in a private cloud computing system
29. An approach for unsupervised contextual anomaly detection and characterization.
30. Hypergraph-Based Resource Allocation for Ultra-Dense Wireless Network in Industrial IoT.
31. A privacy protection method for continuous query based on location services
32. Sampled-data state estimation for delayed neural networks with Markovian jumping parameters
33. GHAP: An Efficient Group-based Handover Authentication Mechanism for IEEE 802.16m Networks
34. A Multiserver Configuration and Request Distribution Framework for Profit Maximization in a Three-Tier Cloud Service Architecture.
35. Uniformly asymptotic normality of the weighted estimator in nonparametric regression model with φ-mixing errors.
36. A New Privacy Protection Approach Based on K-Anonymity for Location-Based Cloud Services.
37. A Robust Image Watermarking Approach Using Cycle Variational Autoencoder.
38. Makespan–Cost–Reliability-Optimized Workflow Scheduling Using Evolutionary Techniques in Clouds.
39. An outlier ensemble for unsupervised anomaly detection in honeypots data.
40. Customer Perceived Value- and Risk-Aware Multiserver Configuration for Profit Maximization.
41. A Review of Recent Techniques in Mixed-Criticality Systems.
42. A Review of Cost and Makespan-Aware Workflow Scheduling in Clouds.
43. DHC: A Distributed Hierarchical Clustering Algorithm for Large Datasets.
44. A Short Review of Security-Aware Techniques in Real-Time Embedded Systems.
45. Certificateless Public Verification for the Outsourced Data Integrity in Cloud Storage.
46. Cost-Constrained QoS Optimization for Approximate Computation Real-Time Tasks in Heterogeneous MPSoCs.
47. Flexible, Secure, and Reliable Data Sharing Service Based on Collaboration in Multicloud Environment.
48. NNB: An efficient nearest neighbor search method for hierarchical clustering on large datasets.
49. A Private Cloud Instances Placement Algorithm Based on Maximal Flow Algorithm.
50. A New Self-Management Model for Large-Scale Event-Driven Wireless Sensor Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.