2024
A stage-driven construction algorithm of undirected independence graph for Bayesian network structure learning.
Soft Comput., October, 2024
Path planning of greenhouse electric crawler tractor based on the improved A* and DWA algorithms.
,
,
,
,
,
,
,
,
,
,
,
Comput. Electron. Agric., 2024
2023
A decomposition hybrid structure learning algorithm for Bayesian network using expert knowledge.
Knowl. Inf. Syst., July, 2023
A recursive local search method of separators for Bayesian network decomposition structure learning algorithm.
Soft Comput., April, 2023
2020
An efficient Bayesian network structure learning algorithm using the strategy of two-stage searches.
Intell. Data Anal., 2020
2018
A Hybrid Structure Learning Algorithm for Bayesian Network Using Experts' Knowledge.
Entropy, 2018
2017
Secure function chaining enabled by Information-Centric Networking.
Proceedings of the 2017 International Conference on Computing, 2017
ICN-FC: An Information-Centric Networking based framework for efficient functional chaining.
Proceedings of the IEEE International Conference on Communications, 2017
2016
Research on Key Techniques for Enginery Teaching Platform Based on Computer Dynamic Simulation Technique.
Int. J. Emerg. Technol. Learn., 2016
NDNWiFi: Named Data Networking Enabled WiFi in Challenged Communication Environments.
Proceedings of the 2016 IEEE Globecom Workshops, Washington, DC, USA, December 4-8, 2016, 2016
Demonstration of a Functional Chaining System Enabled by Named-Data Networking.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016
2014
New Competitive Influence Propagation Models in Social Networks.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
2010
Web Usage Mining with Fine-Grained Browsing Activity Tracking.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010
Internet Voting Protocol Design and Implementation.
Proceedings of the 2010 International Conference on Security & Management, 2010
A New Approach to Detecting Malicious Modification to Streaming Data Using Integer Stuffing.
Proceedings of the 2010 International Conference on Security & Management, 2010
A Multiple-Bits Watermark for Relational Data.
Proceedings of the Principle Advancements in Database Management Technologies: New Applications and Frameworks, 2010
2009
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks for Multi Owner Databases.
Proceedings of the 2009 International Conference on Security & Management, 2009
Multiple Watermarking for Relational Data.
Proceedings of the 2009 International Conference on Security & Management, 2009
A Multiple-Bits Watermark for Relational Data.
Proceedings of the Database Technologies: Concepts, 2009
2008
Achieving simultaneous distribution control and privacy protection for Internet media delivery.
ACM Trans. Multim. Comput. Commun. Appl., 2008
The Price of Security: A Performance Study of Web Application Security.
Proceedings of the 2008 International Conference on Internet Computing, 2008
An Improved Indexing Scheme for Range Queries.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
Chaining watermarks for detecting malicious modifications to streaming data.
Inf. Sci., 2007
Sharing the Original Image in a Joint Ownership Watermarking Scheme.
Proceedings of the 2007 International Conference on Multimedia Systems and Applications, 2007
2006
A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci., 2006
A robust watermarking system based on <i>SVD</i> compression.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006
Continuous improvement of the Computer Science Undergraduate Program at CSULA.
Proceedings of the 2006 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2006
2005
Jointly Verifying Ownership of an Image Using Digital Watermarking.
Multim. Tools Appl., 2005
2004
Tamper detection and localization for categorical data using fragile watermarks.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
2003
A novel approach to digital image watermarking based on a generalized secret sharing scheme.
Multim. Syst., 2003
Joint ownership verification for an image using digital watermarking.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003
Digital image watermarking for joint ownership verification without a trusted dealer.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
2002
Digital image watermarking for joint ownership.
Proceedings of the 10th ACM International Conference on Multimedia 2002, 2002