486 results on '"Xiaolin Chang"'
Search Results
52. Understanding Performance of a Vulnerable Heterogeneous Edge Data Center: A Modeling Approach.
53. Toward Heterogeneous Environment: Lyapunov-Orientated ImpHetero Reinforcement Learning for Task Offloading.
54. Understanding NFV-Enabled Vehicle Platooning Application: A Dependability View.
55. Joint Task Offloading and Resource Allocation: A Historical Cumulative Contribution Based Collaborative Fog Computing Model.
56. Design of Proof-of-Stake PBFT Algorithm for IoT Environments.
57. Towards UAV-Based MEC Service Chain Resilience Evaluation: A Quantitative Modeling Approach.
58. TISM-CAE: A Fast Unsupervised Learning Method for Trajectory Similarity Measure via Convolutional Auto-Encoder.
59. Metaverse-AKA: A Lightweight and PrivacyPreserving Seamless Cross-Metaverse Authentication and Key Agreement Scheme.
60. LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X.
61. Assessing Anonymous and Selfish Free-rider Attacks in Federated Learning.
62. Dual-UAV Aided Secure Dynamic G2U Communication.
63. Delegated Proof of Stake Consensus with Mobile Voters and Multiple Entry PBFT Voting.
64. How Does FAW Attack Impact an Imperfect PoW Blockchain: A Simulation-based Approach.
65. Arbitration Mechanisms for Multiple Entry Capability in PBFT for IoT Systems.
66. Proof of Stake Voting in Multiple Entry PBFT System.
67. Maintenance Worker Scheduling for Charging Pile Fault: a Multi-Agent RL Approach.
68. Evaluating Checkpointing Capability against Eclipse-based Stake-Bleeding Attack in PoS Blockchain.
69. Evaluating fork after withholding (FAW) attack in Bitcoin.
70. An adaptive phase-field model based on bilinear elements for tensile-compressive-shear fracture.
71. DI-AA: An interpretable white-box attack for fooling deep neural networks.
72. Quantitative understanding serial-parallel hybrid sfc services: a dependability perspective.
73. Reducing the number of transaction messages in bitcoin.
74. DHL: Deep reinforcement learning-based approach for emergency supply distribution in humanitarian logistics.
75. Understanding MEC empowered vehicle task offloading performance in 6G networks.
76. A high performance two-layer consensus architecture for blockchain-based IoT systems.
77. Revisiting FAW attack in an imperfect PoW blockchain system.
78. Scalable Self-Sovereign Identity Architecture.
79. Job Completion Time Under Migration-Based Dynamic Platform Technique.
80. IWA: Integrated gradient-based white-box attacks for fooling deep neural networks.
81. Quantitative Comparison of Two Chain-Selection Protocols Under Selfish Mining Attack.
82. Efficient Blockchain Scheme for IoT Data Storage and Manipulation in Smart City Environment.
83. Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach.
84. Optimal Multi-Tier Clustering of Permissioned Blockchain Systems for IoT.
85. Improving Dual-UAV Aided Ground-UAV Bi-Directional Communication Security: Joint UAV Trajectory and Transmit Power Optimization.
86. PA-iMFL: Communication-Efficient Privacy Amplification Method against Data Reconstruction Attack in Improved Multi-Layer Federated Learning.
87. CRS-FL: Conditional Random Sampling for Communication-Efficient and Privacy-Preserving Federated Learning.
88. Towards Semi-Markov Model-based Dependability Evaluation of VM-based Multi-Domain Service Function Chain.
89. Delay Impact on Stubborn Mining Attack Severity in Imperfect Bitcoin Network.
90. On Metaverse Application Dependability Analysis.
91. Understanding Container-based Services under Software Aging: Dependability and Performance Views.
92. Is Stubborn Mining Severe in Imperfect GHOST Bitcoin-like Blockchains? Quantitative Analysis.
93. RSMS: Towards Reliable and Secure Metaverse Service Provision.
94. Towards Runtime Customizable Trusted Execution Environment on FPGA-SoC.
95. Practical Solutions in Fully Homomorphic Encryption - A Survey Analyzing Existing Acceleration Methods.
96. Voting control in multiple entry PBFT blockchain systems for IoT.
97. The Impact of Vote Counting Policy on the Performance of PBFT: Invited Paper.
98. Mal-LSGAN: An Effective Adversarial Malware Example Generation Model.
99. Coping with smartly malicious leaders: PBFT with arbitration for blockchain-based IoT applications.
100. Trade-offs in large blockchain-based IoT system design.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.