459 results on '"Kwok-Yan Lam"'
Search Results
2. Resource Allocation in Satellite-Based Internet of Things Using Pattern Search Method
3. Trading-Based Dynamic Spectrum Access and Allocation in Cognitive Internet of Things
4. Energy Efficiency Optimization for NOMA-Based Cognitive Radio With Energy Harvesting
5. Author Correction: Lead federated neuromorphic learning for wireless edge artificial intelligence
6. Spectrum Optimization for Cognitive Satellite Communications With Cournot Game Model
7. Spectrum Allocation With Asymmetric Monopoly Model for Multibeam-Based Cognitive Satellite Networks
8. Privacy Preserving User Based Web Service Recommendations
9. An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding
10. Behavior-Interior-Aware User Preference Analysis Based on Social Networks
11. Proactive Detection of Physical Inter-rule Vulnerabilities in IoT Services Using a Deep Learning Approach.
12. Unlearnable Examples Detection via Iterative Filtering.
13. Effective Intrusion Detection in Heterogeneous Internet-of-Things Networks via Ensemble Knowledge Distillation-Based Federated Learning.
14. Network Traffic Prediction Using PSO-LightGBM- TM.
15. Causality-Inspired Single-Source Domain Generalization for Face Anti-Spoofing.
16. SSTA: Salient Spatially Transformed Attack.
17. Object-level Copy-Move Forgery Image Detection based on Inconsistency Mining.
18. Improving the Accuracy of Locally Differentially Private Community Detection by Order-consistent Data Perturbation.
19. Non-interactive Zero-Knowledge Functional Proofs.
20. FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring.
21. ThreatLand: Extracting Intelligence from Audit Logs via NLP methods.
22. Honey-Gauge: Enabling User-Centric Honeypot Classification.
23. Do NoT Open (DOT): A Unified Generic and Specialized Models for Detecting Malicious Email Attachments.
24. SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack.
25. APTer: Towards the Investigation of APT Attribution.
26. Dipping PLMs Sauce: Bridging Structure and Text for Effective Knowledge Graph Completion via Conditional Soft Prompting.
27. Membership Inference Vulnerabilities in Peer-to-Peer Federated Learning.
28. Privacy-Enhanced Knowledge Transfer with Collaborative Split Learning over Teacher Ensembles.
29. Automatic Detection and Analysis towards Malicious Behavior in IoT Malware.
30. UAV-Assisted Semantic Communication with Hybrid Action Reinforcement Learning.
31. Applying Large Language Models for Enhancing Contract Drafting.
32. Separate-and-Aggregate: A Transformer-Based Patch Refinement Model for Knowledge Graph Completion.
33. A Learning-based Incentive Mechanism for Mobile AIGC Service in Decentralized Internet of Vehicles.
34. A Practical Intrusion Detection System Trained on Ambiguously Labeled Data for Enhancing IIoT Security.
35. CAAW'24: The 3rd International Cryptoasset Analytics Workshop.
36. Knowledge Is Flat: A Seq2Seq Generative Framework for Various Knowledge Graph Completion.
37. Facial Landmark Predictions with Applications to Metaverse.
38. Resource Allocation and Resolution Control in the Metaverse with Mobile Augmented Reality.
39. Edge-Cloud Cooperation for DNN Inference via Reinforcement Learning and Supervised Learning.
40. Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
41. A Multi-task Learning Approach for Predicting Intentions Using Smart Home IoT Services.
42. Differentiated Security in the Age of Cognitive Internet of Things (CIoT).
43. 3D Beamforming Based on Deep Learning for Secure Communication in 5G and Beyond Wireless Networks.
44. Privacy-Enhanced Federated Learning with Weighted Aggregation.
45. UAV-Assisted 5G/6G Networks: Joint Scheduling and Resource Allocation Based on Asynchronous Reinforcement Learning.
46. Deep Reinforcement Learning Based Resource Allocation for Heterogeneous Networks.
47. Effective Anomaly Detection Model Training with only Unlabeled Data by Weakly Supervised Learning Techniques.
48. Resource Optimization in Satellite-Based Internet of Things.
49. A Review on Malware Variants Detection Techniques for Threat Intelligence in Resource Constrained Devices: Existing Approaches, Limitations and Future Direction.
50. An Analysis of Blockchain Consistency in Asynchronous Networks: Deriving a Neat Bound.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.