983 results on '"Ximeng LIU"'
Search Results
102. PAM3S: Progressive Two-Stage Auction-Based Multi-Platform Multi-User Mutual Selection Scheme in MCS.
103. A Survey on Searchable Symmetric Encryption.
104. Intelligent Adaptive Gossip-Based Broadcast Protocol for UAV-MEC Using Multi-Agent Deep Reinforcement Learning.
105. POTA: Privacy-Preserving Online Multi-Task Assignment With Path Planning.
106. Watermarking in Secure Federated Learning: A Verification Framework Based on Client-Side Backdooring.
107. Fast RS-IOP Multivariate Polynomial Commitments and Verifiable Secret Sharing.
108. CDN Cannon: Exploiting CDN Back-to-Origin Strategies for Amplification Attacks.
109. SemiAdv: Query-Efficient Black-Box Adversarial Attack with Unlabeled Images.
110. Towards Trustworthy Unsupervised Domain Adaptation: A Representation Learning Perspective for Enhancing Robustness, Discrimination, and Generalization.
111. MFA-Net: Multi-Scale feature fusion attention network for liver tumor segmentation.
112. Efficient privacy-preserving federated learning under dishonest-majority setting.
113. New Cryptographic Bent Functions from Permutations and Linear Translator in Cyber Security.
114. Some Classes of Cryptographic Power Functions and Permutation Polynomials with Low (-1)-Differential Uniformity in Cyber Security.
115. Fedward: Flexible Federated Backdoor Defense Framework with Non-IID Data.
116. An Adaptive Model Ensemble Adversarial Attack for Boosting Adversarial Transferability.
117. FedCML: Federated Clustering Mutual Learning with non-IID Data.
118. Clustered Federated Learning with Inference Hash Codes Based Local Sensitive Hashing.
119. Globally Consistent Federated Graph Autoencoder for Non-IID Graphs.
120. Efficient and Secure Spatial Range Query over Large-scale Encrypted Data.
121. IPES: Improved Pre-trained Encoder Stealing Attack in Contrastive Learning.
122. DTrust: Toward Dynamic Trust Levels Assessment in Time-Varying Online Social Networks.
123. Enhance Transferability of Adversarial Examples with Model Architecture.
124. Graph Unlearning Using Knowledge Distillation.
125. Q-TrHDRI: A Qurey-Based Transformer for High Dynamic Range Imaging with Dynamic Scenes.
126. FedCMK: An Efficient Privacy-Preserving Federated Learning Framework.
127. SRoUDA: Meta Self-Training for Robust Unsupervised Domain Adaptation.
128. Efficacy of judicial independence in explaining financial markets in emerging markets
129. Differentially Private Recurrent Variational Autoencoder For Text Privacy Preservation.
130. Model poisoning attack in differential privacy-based federated learning.
131. CITS-MEW: Multi-Party Entangled Watermark in Cooperative Intelligent Transportation System.
132. Achieving Privacy-Preserving and Verifiable Support Vector Machine Training in the Cloud.
133. EGIA: An External Gradient Inversion Attack in Federated Learning.
134. CrowdFA: A Privacy-Preserving Mobile Crowdsensing Paradigm via Federated Analytics.
135. An Accessional Signature Scheme With Unmalleable Transaction Implementation to Securely Redeem Cryptocurrencies.
136. Push Stricter to Decide Better: A Class-Conditional Feature Adaptive Framework for Improving Adversarial Robustness.
137. Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme.
138. Smaug: A TEE-Assisted Secured SQLite for Embedded Systems.
139. Learn to Forget: Machine Unlearning via Neuron Masking.
140. Achieving Efficient and Privacy-Preserving Neural Network Training and Prediction in Cloud Environments.
141. Learning in Your 'Pocket': Secure Collaborative Deep Learning With Membership Privacy.
142. LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems.
143. DivTheft: An Ensemble Model Stealing Attack by Divide-and-Conquer.
144. Forward/Backward and Content Private DSSE for Spatial Keyword Queries.
145. VerifyTL: Secure and Verifiable Collaborative Transfer Learning.
146. NAH: neighbor-aware attention-based heterogeneous relation network model in E-commerce recommendation.
147. Accuracy Degrading: Toward Participation-Fair Federated Learning.
148. A Multi-CUAV Multi-UAV Electricity Scheduling Scheme: From Charging Location Selection to Electricity Transaction.
149. Reschedule Gradients: Temporal Non-IID Resilient Federated Learning.
150. A Scalable and Auditable Secure Data Sharing Scheme With Traceability for Fog-Based Smart Logistics.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.