Differentially Private Numerical Vector Analyses in the Local and Shuffle Model.
IEEE Trans. Dependable Secur. Comput., 2025
A spatiotemporal and motion information extraction network for action recognition.
Wirel. Networks, August, 2024
Security and Privacy Issues in Deep Reinforcement Learning: Threats and Countermeasures.
ACM Comput. Surv., June, 2024
Ideal uniform multipartite secret sharing schemes.
Inf. Sci., January, 2024
Optimizing resource allocation in UAV-assisted ultra-dense networks for enhanced performance and security.
Inf. Sci., 2024
DPGazeSynth: Enhancing eye-tracking virtual reality privacy with differentially private data synthesis.
Inf. Sci., 2024
Pseudo unlearning via sample swapping with hash.
Inf. Sci., 2024
Linkable ring signature scheme with stronger security guarantees.
Inf. Sci., 2024
Efficient and precise visual location estimation by effective priority matching-based pose verification in edge-cloud collaborative IoT.
Future Gener. Comput. Syst., 2024
Machine Unlearning in Large Language Models.
CoRR, 2024
ChatGraph: Chat with Your Graphs.
CoRR, 2024
ChatGraph: Chat with Your Graphs.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Smart contract vulnerability detection based on a semantic code structure and a self-designed neural network.
Comput. Electr. Eng., August, 2023
Collaborative Energy Price Computing Based on Sarima-Ann and Asymmetric Stackelberg Games.
Symmetry, February, 2023
Machine-Learning-Based UAV-Assisted Agricultural Information Security Architecture and Intrusion Detection.
IEEE Internet Things J., 2023
A Lightweight, Secure Big Data-Based Authentication and Key-Agreement Scheme for IoT with Revocability.
Int. J. Intell. Syst., 2023
GanFinger: GAN-Based Fingerprint Generation for Deep Neural Network Ownership Verification.
CoRR, 2023
A mobile energy trading scheme based on Lightning Network.
Concurr. Comput. Pract. Exp., 2023
From Passive Defense to Proactive Defence: Strategies and Technologies.
Proceedings of the Artificial Intelligence Security and Privacy, 2023
An Algorithm for Mining Indirect Dependencies From Loop-Choice-Driven Loop Structure via Petri Nets.
IEEE Trans. Syst. Man Cybern. Syst., 2022
Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things.
Mob. Inf. Syst., 2021
Data security sharing method based on CP-ABE and blockchain.
J. Intell. Fuzzy Syst., 2021
A process mining algorithm to mixed multiple-concurrency short-loop structures.
Inf. Sci., 2021
An energy-aware approach for resource managing in the fog-based Internet of Things using a hybrid algorithm.
Int. J. Commun. Syst., 2021
An energy-aware method for task allocation in the Internet of things using a hybrid optimization algorithm.
Concurr. Comput. Pract. Exp., 2021
A New optimized sequential method for lung tumor diagnosis based on deep learning and converged search and rescue algorithm.
Biomed. Signal Process. Control., 2021
An enhanced energy optimization routing protocol for WSNs.
Ann. des Télécommunications, 2021
The discovery and identification of video page based on topic web crawler.
Proceedings of the 15th IEEE/ACIS International Conference on Computer and Information Science, 2016
A New Estimation Model for Wireless Sensor Networks Based on the Spatial-Temporal Correlation Analysis.
J. Inform. and Commun. Convergence Engineering, 2015
A Novel Recognition Method of Multimedia Data for Social Network.
Proceedings of the 3rd International Conference on Applied Computing and Information Technology, 2015
An Improved Algorithm for the Solution of Geodetic Problems.
Proceedings of the Second International Joint Conference on Computational Sciences and Optimization, 2009