Search

Your search keyword '"Xiaolin Chang"' showing total 41 results

Search Constraints

Start Over You searched for: Author "Xiaolin Chang" Remove constraint Author: "Xiaolin Chang" Topic computer Remove constraint Topic: computer
41 results on '"Xiaolin Chang"'

Search Results

1. On Selfholding Attack Impact on Imperfect PoW Blockchain Networks

2. Understanding Selfish Mining in Imperfect Bitcoin and Ethereum Networks With Extended Forks

3. Bit2CV: A Novel Bitcoin Anti-Fraud Deposit Scheme for Connected Vehicles

4. BOPE: Boundary Order-Preserving Encryption Scheme in Relational Database System

5. Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach

6. Analyzing Software Rejuvenation Techniques in a Virtualized System: Service Provider and User Views

7. Exploring Function Call Graph Vectorization and File Statistical Features in Malicious PE File Classification

8. A Novel Privacy-Preserving Neural Network Computing Approach for E-Health Information System

9. Transient Security and Dependability Analysis of MEC Micro Datacenter under Attack

10. LSGAN-AT: enhancing malware detector robustness against adversarial examples

11. Model-based Performance Evaluation of a Moving Target Defense System

12. On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

13. Assessing Security and Dependability of a Network System Susceptible to Lateral Movement Attacks

14. Stochastic Model-Based Quantitative Analysis of Edge UPF Service Dependability

16. NE-IIBEFM for problems with body forces: A seamless integration of the boundary type meshfree method and the NURBS boundary in CAD

17. LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X

18. NURBS-enhanced boundary element method based on independent geometry and field approximation for 2D potential problems

19. Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking

20. Survivability model for security and dependability analysis of a vulnerable critical system

21. Towards a Blockchain-Based Healthcare Information System : Invited Paper

22. Assessing transferability of adversarial examples against malware detection classifiers

23. Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views

24. Modeling Heterogeneous Virtual Machines on IaaS Data Centers

25. Performance Analysis Model for Fog Services under Multiple Resource Types

26. A novel approach for software vulnerability classification

27. OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines

28. Performability Analysis for IaaS Cloud Data Center

29. Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack

30. Performance of AI algorithms for mining meaningful roles

31. Effective and efficient AI-based approaches to cloud resource provisioning

32. Embedding Virtual Infrastructure Based on Genetic Algorithm

33. E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure

34. Network state aware virtual network parallel embedding

35. Reducing power consumption in embedding virtual infrastructures

36. Robust and Efficient Response to TCG TOCTOU Attacks in TPVM

37. ZRTP-based Trusted Transmission of VoIP Traffic and Formal Verification

38. Formal Analysis of a Response Mechanism for TCG TOCTOU Attacks

39. Defeating TCG TOCTOU Attacks in Trusted HVM

40. LWRM: A lightweight response mechanism for TCG TOCTOU attack

41. Applying adaptive virtual queue to improve the performance of the assured forwarding service

Catalog

Books, media, physical & digital resources