Search

Your search keyword '"Wanlei Zhou"' showing total 99 results

Search Constraints

Start Over You searched for: Author "Wanlei Zhou" Remove constraint Author: "Wanlei Zhou" Topic computer networks and communications Remove constraint Topic: computer networks and communications
99 results on '"Wanlei Zhou"'

Search Results

1. Differentially Private Crowdsourcing With the Public and Private Blockchain

3. Near Optimal Learning-Driven Mechanisms for Stable NFV Markets in Multitier Cloud Networks

4. Request Reliability Augmentation With Service Function Chain Requirements in Mobile Edge Computing

5. Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks

7. A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems

8. Desynchronization-attack-resilient audio watermarking mechanism for stereo signals using the linear correlation between channels

9. Time-optimal and privacy preserving route planning for carpool policy

10. Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria

11. Customizable Reliable Privacy-Preserving Data Sharing in Cyber-Physical Social Networks

12. An Identity-Based and Revocable Data-Sharing Scheme in VANETs

13. Model-Based Self-Advising for Multi-Agent Learning

14. GAN-Driven Personalized Spatial-Temporal Private Data Sharing in Cyber-Physical Social Systems

15. Private collaborative filtering under untrusted recommender server

16. Differentially private model publishing in cyber physical systems

17. Blockchain for secure location verification

18. Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning

19. Private‐encoder: Enforcing privacy in latent space for human face images

20. A blockchain-based location privacy-preserving crowdsensing system

21. E-AUA: An Efficient Anonymous User Authentication Protocol for Mobile IoT

22. Correlated data in differential privacy: Definition and analysis

23. From distributed machine learning to federated learning: In the view of data privacy and security

24. Can Steering Wheel Detect Your Driving Fatigue

25. Security and privacy in 6G networks: New areas and new challenges

26. Prediction optimization of diffusion paths in social networks using integration of ant colony and densest subgraph algorithms

27. Answering differentially private queries for continual datasets release

28. Edge-based stochastic network model reveals structural complexity of edges

29. Using epidemic betweenness to measure the influence of users in complex networks

30. On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks

31. Effective Repair Strategy Against Advanced Persistent Threat: A Differential Game Approach

32. Static malware clustering using enhanced deep embedding method

33. Adversaries or allies? Privacy and deep learning in big data era

34. PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance

35. Discovery of stop regions for understanding repeat travel behaviors of moving objects

36. K-Center: An Approach on the Multi-Source Identification of Information Diffusion

37. Privacy preserving data release for tagging recommender systems

38. Modeling malicious activities in cyber space

39. HUMAN-DRIVEN EDGE COMPUTING AND COMMUNICATION: PART 2

40. Robust Network Traffic Classification

41. Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

42. A secure search protocol for low cost passive RFID tags

43. Statistical Features-Based Real-Time Detection of Drifted Twitter Spam

44. HUMAN-DRIVEN EDGE COMPUTING AND COMMUNICATION: PART 1

45. A survey of recommendation techniques based on offline data processing

46. Detection and defense of application-layer DDoS attacks in backbone web traffic

47. Are the popular users always important for information dissemination in online social networks?

48. Internet traffic clustering with side information

49. An effective privacy preserving algorithm for neighborhood-based collaborative filtering

50. Detecting stepping stones by abnormal causality probability

Catalog

Books, media, physical & digital resources