900 results on '"Wanlei Zhou"'
Search Results
152. Adjacency Cache: Fast Web Cache Indexing and Lookup.
153. Dynamic Feature Selection for Spam Filtering Using Support Vector Machine.
154. An Enhanced Parallel Downloading Algorithm for BT.
155. A Resource-Search and Routing Algorithm within PCDN Autonomy Area.
156. Email Categorization Using Multi-stage Classification Technique.
157. A Parallel Downloading Algorithm for Redundant Networks.
158. Novel Data Management Algorithms in Peer-to-Peer Content Distribution Networks.
159. Architecture of Adaptive Spam Filtering Based on Machine Learning Algorithms.
160. Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity.
161. Privacy Intelligence: A Survey on Image Privacy in Online Social Networks.
162. Lease Based Addressing for Event-Driven Wireless Sensor Networks.
163. Frequency Distribution of TATA Box and Extension Sequences on Human Promoters.
164. Adversarial Perturbation for Privacy Preservation
165. Adversarial Machine Learning
166. Adversarial Deep Learning
167. Game Theoretical Adversarial Deep Learning
168. Physical World Adversarial Attacks on Images and Texts
169. Adversarial Defense Mechanisms for Supervised Learning
170. A Reactive Framework for Supporting Knowledge Management.
171. The Multifaceted and Ever-Changing Directions of Information Security - Australia Get Ready!
172. A Parallel Euler Approach for Large-Scale Biological Sequence Assembly.
173. Employing Wikis for Online Collaboration in the E-Learning Environment: Case Study.
174. A Defense System against DDoS Attacks by Large-Scale IP Traceback.
175. Safeguard Information Infrastructure Against DDoS Attacks: Experiments and Modeling.
176. An Innovative Spam Filtering Model Based on Support Vector Machine.
177. A Sensor Enabled Multi-Agent Infrastructure for Applications Integration.
178. Understanding Transition towards Information Security Culture Change.
179. Security in the Online E-Learning Environment.
180. A Mesh Based Anycast Routing Protocol for Ad Hoc Networks.
181. Intelligent DDoS Packet Filtering in High-Speed Networks.
182. Spam Filtering based on Preference Ranking.
183. Distributed Defense Against Distributed Denial-of-Service Attacks.
184. Reducing the Bandwidth Requirements of P2P Keyword Indexing.
185. An Efficient Reliable Architecture for Application Layer Anycast Service.
186. Clock Synchronization State Graphs Based on Clock Precision Difference.
187. The Cost of Recovery Protocols in Web-based Database Systems.
188. From e-Learning to Virtual Learning Community: Bridging the Gap.
189. A Novel Middleware Based Web Database Model.
190. A Fast and Robust Method Applied in Telecommunication Systems.
191. Improving the Performance of Equalization and a Fast Start-Up Technique for Communication Systems.
192. Protect Grids from DDoS Attacks.
193. Minicast: A Multicast-Anycast Protocol for Message Delivery.
194. CIFair: Constructing continuous domains of invariant features for image fair classifications
195. Exploring the Foundations of Practicing Online Collaboration.
196. Cultural Issues Relating to Teaching IT Professional Ethics Online: Lessons Learned.
197. Fault-Tolerant Servers for Anycast Communication.
198. GHIRS: Integration of Hotel Management Systems by Web Services.
199. Improving the Performance of Equalization in Communication Systems.
200. Towards an Interactive Architecture for Web-Based Databases.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.