Search

Your search keyword '"Wanlei Zhou"' showing total 242 results

Search Constraints

Start Over You searched for: Author "Wanlei Zhou" Remove constraint Author: "Wanlei Zhou" Topic computer Remove constraint Topic: computer
242 results on '"Wanlei Zhou"'

Search Results

1. More than Privacy

2. Authenticated Medical Documents Releasing with Privacy Protection and Release Control

3. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks

4. GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems

5. Correlated Differential Privacy: Feature Selection in Machine Learning

6. Blockchain for secure location verification

7. Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning

8. Differential Advising in Multiagent Reinforcement Learning

9. Leakage-Free Dissemination of Authenticated Tree-Structured Data with Multi-Party Control

10. A blockchain-based location privacy-preserving crowdsensing system

11. Novel Multi-Keyword Search on Encrypted Data in the Cloud

12. Effective Quarantine and Recovery Scheme Against Advanced Persistent Threat

13. Correlated data in differential privacy: Definition and analysis

14. From distributed machine learning to federated learning: In the view of data privacy and security

15. Evolution of cooperation in malicious social networks with differential privacy mechanisms

16. Non-Linear-Echo Based Anti-Collusion Mechanism for Audio Signals

17. Fairness in Semi-supervised Learning: Unlabeled Data Help to Reduce Discrimination

18. A Semantic Web-Based Recommendation Framework of Educational Resources in E-Learning

19. Malware Propagations in Wireless Ad Hoc Networks

20. Answering differentially private queries for continual datasets release

21. Null Model and Community Structure in Multiplex Networks

22. Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture

23. Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions

24. MFE-HAR

25. Differentially Private Malicious Agent Avoidance in Multiagent Advising Learning

26. Static malware clustering using enhanced deep embedding method

27. Preliminary of identifying propagation sources

28. A Study of Data Pre-processing Techniques for Imbalanced Biomedical Data Classification

29. Discovery of stop regions for understanding repeat travel behaviors of moving objects

30. Adversaries or allies? Privacy and deep learning in big data era

31. Data Authentication with Privacy Protection

32. FBI: Friendship Learning-Based User Identification in Multiple Social Networks

33. Message from the ISPA 2018 Chairs

34. Privacy of Things: Emerging Challenges and Opportunities in Wireless Internet of Things

35. User Influence in the Propagation of Malicious Attacks

36. Identifying Multiple Propagation Sources

37. Identifying Propagation Source in Large-Scale Networks

38. Restrain Malicious Attack Propagation

39. Comparative Study and Numerical Analysis

40. Traffic Flow Prediction for Road Intersection Safety

41. A hybrid privacy protection scheme in cyber-physical social networks

42. Improving Data Utility through Game Theory in Personalized Differential Privacy

43. A Data-driven Attack against Support Vectors of SVM

44. Who Spread to Whom? Inferring Online Social Networks with User Features

45. SCARA: A framework for secure cloud-assisted RFID authentication for smart building access control

46. Location Privacy in Mobile Social Network Applications

47. Dissemination of Authenticated Tree-Structured Data with Privacy Protection and Fine-Grained Control in Outsourced Databases

48. Integrating ant colony algorithm and node centrality to improve prediction of information diffusion in social networks

49. Location Privacy-Preserving Mechanisms

50. Location Privacy in Mobile Crowd Sensing Applications

Catalog

Books, media, physical & digital resources