321 results on '"Niu, Wenjia"'
Search Results
52. Privacy Preserving in Location Data Release: A Differential Privacy Approach
53. Improving the Robustness of Pedestrian Detection in Autonomous Driving With Generative Data Augmentation
54. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN
55. A Cross-Modal CCA-Based Astroturfing Detection Approach
56. Adversarial attack and defense in reinforcement learning-from AI security view
57. Boosting imbalanced data learning with Wiener process oversampling
58. An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance
59. An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network
60. Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks
61. Frequency-Adaptive Cluster Head Election in Wireless Sensor Network
62. Hierarchical Workflow Management in Wireless Sensor Network
63. Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network
64. A Reference Model for Virtual Resource Description and Discovery in Virtual Networks
65. Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition
66. A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering
67. Multi-agent and Workflow-Based Web Service Management Model
68. A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network
69. Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks
70. A novel cache size optimization scheme based on manifold learning in Content Centric Networking
71. Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization
72. Similarity Based Semantic Web Service Match
73. A Context Model for Service Composition Based on Dynamic Description Logic
74. Semantic Filtering for DDL-Based Service Composition
75. A Hidden Astroturfing Detection Approach Base on Emotion Analysis
76. Beyond the Aggregation of Its Members—A Novel Group Recommender System from the Perspective of Preference Distribution
77. Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks
78. Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy
79. A differentially private algorithm for location data release
80. Security Analysis on Blockchain-Powered Mobile APPs Connected with In-Vehicle Networks by Context-Based Reverse Engineering
81. Development and Comprehensive Evaluation of Ecological Agriculture Industry Chain System Based on Genetic Algorithm
82. Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation
83. Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks
84. An Audit Risk Model Based on Improved BP Neural Network Data Mining Algorithm
85. CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition
86. Multi-granularity context model for dynamic Web service composition
87. An approach for adaptive associative classification
88. Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System
89. Context-Aware Service Ranking in Wireless Sensor Networks
90. Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches
91. You Can’t Hide: A Novel Methodology to Defend DDoS Attack Based on Botcloud
92. Structural Analysis of IWA Social Network
93. Blockchain-based decentralized federated learning: A secure and privacy-preserving system
94. Survey on Astroturfing Detection and Analysis from an Information Technology Perspective
95. Congestion Attack Detection in Intelligent Traffic Signal System: Combining Empirical and Analytical Methods
96. A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks
97. An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP Algorithm
98. A DBN-Based Classifying Approach to Discover the Internet Water Army
99. Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory
100. A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.