486 results on '"Xiaolin Chang"'
Search Results
152. IWA: Integrated Gradient based White-box Attacks for Fooling Deep Neural Networks.
153. A novel DL approach to PE malware detection: exploring Glove vectorization, MCC_RCNN and feature fusion.
154. Towards Interpretable Ensemble Learning for Image-based Malware Detection.
155. DI-AA: An Interpretable White-box Attack for Fooling Deep Neural Networks.
156. Towards interpreting ML-based automated malware detection models: a survey.
157. Deep-Dive Analysis of Selfish and Stubborn Mining in Bitcoin and Ethereum.
158. Performance Analysis Model for Fog Services under Multiple Resource Types.
159. Plaintext-Dependent Selective Image Encryption Scheme Based on Chaotic Maps and DNA Coding.
160. Stochastic Modeling Approaches for Analyzing Blockchain: A Survey.
161. AB-FGSM: AdaBelief optimizer and FGSM-based approach to generate adversarial examples.
162. Transient performance analysis of smart grid with dynamic power distribution.
163. Regularized moving least-square method and regularized improved interpolating moving least-square method with nonsingular moment matrices.
164. NE-IIBEFM for problems with body forces: A seamless integration of the boundary type meshfree method and the NURBS boundary in CAD.
165. Modeling and Analysis of High Availability Techniques in a Virtualized System.
166. Survivability Modeling and Analysis of Cloud Service in Distributed Data Centers.
167. Effective Modeling Approach for IaaS Data Center Performance Analysis under Heterogeneous Workload.
168. Model-based sensitivity analysis of IaaS cloud availability.
169. Resource-Aware Virtual Network Parallel Embedding Based on Genetic Algorithm.
170. Performability Analysis for IaaS Cloud Data Center.
171. Model-Based Survivability Analysis of a Virtualized System.
172. Survivability Analysis of a Computer System Under an Advanced Persistent Threat Attack.
173. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric).
174. Combining Popularity and Locality to Enhance In-Network Caching Performance and Mitigate Pollution Attacks in Content-Centric Networking.
175. The Boundary Element Method with a Fast Multipole Accelerated Integration Technique for 3D Elastostatic Problems with Arbitrary Body Forces.
176. Towards Robust Green Virtual Cloud Data Center Provisioning.
177. Service Availability Analysis in a Virtualized System: A Markov Regenerative Model Approach
178. Job Completion Time Under Migration-Based Dynamic Platform Technique
179. LPC: A lightweight pseudonym changing scheme with robust forward and backward secrecy for V2X.
180. Modeling Active Virtual Machines on IaaS Clouds Using an M/G/m/m+K Queue.
181. Performance of AI algorithms for mining meaningful roles.
182. Review of studies on the stick-slip behavior of granular fault gouge
183. Elastic geopolymer based on nanotechnology: Synthesis, characterization, properties, and applications
184. Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views.
185. An efficient adaptive length scale insensitive phase-field model for three-dimensional fracture of solids using trilinear multi-node elements
186. Identifying strain-dependent structural defects in granular materials from the hidden structure-plasticity relationship
187. Joint Task Offloading and Resource Allocation for Fog-Based Intelligent Transportation Systems: A UAV-Enabled Multi-Hop Collaboration Paradigm
188. High-flexural-strength of geopolymer composites with self-assembled nanofiber networks
189. OB-IMA: out-of-the-box integrity measurement approach for guest virtual machines.
190. Modeling Heterogeneous Virtual Machines on IaaS Data Centers.
191. Effective and efficient AI-based approaches to cloud resource provisioning.
192. Green cloud virtual network provisioning based ant colony optimization.
193. Migration cost aware virtual network re-embedding in presence of resource failures.
194. E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure.
195. Embedding Virtual Infrastructure Based on Genetic Algorithm.
196. Robust and Efficient Response to TCG TOCTOU Attacks in TPVM.
197. Reducing power consumption in embedding virtual infrastructures.
198. IWA: Integrated gradient‐based white‐box attacks for fooling deep neural networks
199. LWRM: A lightweight response mechanism for TCG TOCTOU attack.
200. Analysis of Interrupt Coalescing Schemes for Receive-Livelock Problem in Gigabit Ethernet Network Hosts.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.