168 results on '"Guangshun, Li."'
Search Results
2. Blockchain-Based Device Reputation Assessment in the Industrial Internet of Things.
3. Efficient and secure privacy protection scheme and consensus mechanism in MEC enabled e-commerce consortium blockchain
4. Data privacy protection model based on blockchain in mobile edge computing.
5. Inductive Bias Integration for Transformer Enhancement in Small-scale Segmentation Tasks.
6. Validating Concept Transfer Across Different Datasets.
7. WSSS-DM: Advancing Weakly Supervised Semantic Segmentation by Harnessing Diffusion Models.
8. Combining Reverse Temporal Attention Mechanism and Dynamic Similarity Analysis for Disease Prediction.
9. SARA: Slot Attention for Robust Adversarial Training.
10. Epoch: Enabling Path Concealing Payment Channel Hubs with Optimal Path Encryption.
11. An Updatable Key Management Scheme for Underwater Wireless Sensor Networks.
12. Communication-Efficient Personalized Federated Learning on Non-IID Data.
13. Indicative significance of hydrochemical characteristics in geothermal resource investigations in the Enshi Basin
14. IoV data sharing scheme based on the hybrid architecture of blockchain and cloud-edge computing
15. Blockchain-Based Privacy-Preserving Positioning Data Sharing for IoT-Enabled Maritime Transportation Systems.
16. Privacy-Aware Traffic Flow Prediction Based on Multi-Party Sensor Data with Zero Trust in Smart City.
17. Blockchain-based Secure Medical Data Management and Disease Prediction.
18. Increasing the Accuracy of Secure Model for Medical Data Sharing in the Internet of Things.
19. Securing uRLLC in UAV-assisted NOMA Wireless Network.
20. A Truth Inference Algorithm Using Bidirectional Convolution Autoencoder for Crowdsourcing Image Segmentation.
21. CD-Net: Cross-Domain Description and Detection for 2D-3D Learning Local Features.
22. A New Secure Crowdfunding Transaction Scheme Based on Blockchain.
23. Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation.
24. Design of vehicle certification schemes in IoV based on blockchain.
25. An intelligent forecast for COVID-19 based on single and multiple features.
26. Intelligent federated learning on lattice-based efficient heterogeneous signcryption.
27. The impact of mobility on physical layer security in 5G uRLLC.
28. Secure storage scheme of trajectory data for digital tracking mechanism.
29. Concatenated Masked Autoencoders as Spatial-Temporal Learner.
30. Blockchain-Based Privacy-Preserving Medical Data Sharing Scheme Using Federated Learning.
31. An Edge Trajectory Protection Approach Using Blockchain.
32. Multi-sensor Data Fusion Algorithm Based on Adaptive Trust Estimation and Neural Network.
33. A Location-Based Path Privacy Protection Scheme in Internet of Vehicles.
34. Blockchain-based mobile edge computing system.
35. PDM: Privacy-Aware Deployment of Machine-Learning Applications for Industrial Cyber-Physical Cloud Systems.
36. Dimension Reduction Algorithm Based on Adaptive Maximum Linear Neighborhood Selection in Edge Computing.
37. On Constructing t -Spanner in IoT under SINRI.
38. Noniterative Sparse LS-SVM Based on Globally Representative Point Selection.
39. Shortest link scheduling in wireless networks under the Rayleigh fading model
40. Resource Management Framework Based on the Stackelberg Game in Vehicular Edge Computing.
41. Securing transmissions by friendly jamming scheme in wireless networks.
42. Distributed Shortest Link Scheduling Algorithms With Constant Time Complexity in IoT Under Rayleigh Fading.
43. A self-attention-based destruction and construction learning fine-grained image classification method for retail product recognition.
44. A new load balancing strategy by task allocation in edge computing based on intermediary nodes
45. A Fast Quantum Clustering Approach for Cancer Gene Clustering.
46. DV-Hop Localization Algorithm Based on Minimum Mean Square Error in Internet of Things.
47. RFID Location Algorithm Based on Target Search and Repeat Calibration.
48. Trajectory Privacy Protection Method Based on Location Service in Fog Computing.
49. Dynamic Computation Offloading Based on Graph Partitioning in Mobile Edge Computing.
50. Energy Consumption Optimization With a Delay Threshold in Cloud-Fog Cooperation Computing.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.