Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             55 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Advances in privacy-preserving computing Xue, Kaiping

14 3 p. 1348-1352
artikel
2 AENEA: A novel autoencoder-based network embedding algorithm Xu, Xiaolong

14 3 p. 1829-1840
artikel
3 All-in-one: Toward hybrid data collection and energy saving mechanism in sensing-based IoT applications Ibrahim, Marwa

14 3 p. 1154-1173
artikel
4 A location privacy protection scheme for convoy driving in autonomous driving era Ye, Xin

14 3 p. 1388-1400
artikel
5 A machine learning based approach for user privacy preservation in social networks Zhang, Yuanming

14 3 p. 1596-1607
artikel
6 A mathematical model to describe resource discovery failure in distributed exascale computing systems Adibi, Elham

14 3 p. 1021-1043
artikel
7 A message transmission scheduling algorithm based on time-domain interference alignment in UWANs Zhao, Nan

14 3 p. 1058-1070
artikel
8 An efficient clustering-based anonymization scheme for privacy-preserving data collection in IoT based healthcare services Onesimu, J. Andrew

14 3 p. 1629-1649
artikel
9 An efficient latency aware resource provisioning in cloud assisted mobile edge framework Mulinti, Rajasekhar Bandapalle

14 3 p. 1044-1057
artikel
10 An energy-efficient cluster-based routing protocol using unequal clustering and improved ACO techniques for WSNs Moussa, Noureddine

14 3 p. 1334-1347
artikel
11 An improved steganography without embedding based on attention GAN Yu, Cong

14 3 p. 1446-1457
artikel
12 Anonymized noise addition in subspaces for privacy preserved data mining in high dimensional continuous data Virupaksha, Shashidhar

14 3 p. 1608-1628
artikel
13 A novel spread estimation based abnormal flow detection in high-speed networks Bu, Xiaofei

14 3 p. 1401-1413
artikel
14 A novel trust management method to preserve privacy in vehicular ad-hoc networks Behzad, Davood

14 3 p. 1118-1131
artikel
15 A provably secure RFID authentication protocol based on ECQV for the medical internet of things Agrahari, Abhay Kumar

14 3 p. 1277-1289
artikel
16 A reputation-based cooperative content delivery with parking vehicles in vehicular ad-hoc networks Zhu, Zihao

14 3 p. 1531-1547
artikel
17 A robust and secure multi-authority access control system for cloud storage Gu, Jin

14 3 p. 1488-1499
artikel
18 A robust provable-secure privacy-preserving authentication protocol for Industrial Internet of Things Rangwani, Diksha

14 3 p. 1548-1571
artikel
19 A secure peer to peer multiparty transaction scheme based on blockchain Hong, Hanshu

14 3 p. 1106-1117
artikel
20 ASFGNN: Automated separated-federated graph neural network Zheng, Longfei

14 3 p. 1692-1704
artikel
21 A uniformization-based approach to preserve individuals’ privacy during process mining analyses Batista, Edgar

14 3 p. 1500-1519
artikel
22 Backdoors hidden in facial features: a novel invisible backdoor attack against face recognition systems Xue, Mingfu

14 3 p. 1458-1474
artikel
23 Blockchain based Privacy Preserving User Authentication Protocol for Distributed Mobile Cloud Environment Vivekanandan, Manojkumar

14 3 p. 1572-1595
artikel
24 Cellular traffic prediction on blockchain-based mobile networks using LSTM model in 4G LTE network Kurri, Varun

14 3 p. 1088-1105
artikel
25 Computing tasks assignment optimization among edge computing servers via SDN Bu, Chao

14 3 p. 1190-1206
artikel
26 Copyright protection method of big data based on nash equilibrium and constraint optimization Xu, Yabin

14 3 p. 1520-1530
artikel
27 Correction to: Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks Chawra, Vrajesh Kumar

14 3 p. 1316
artikel
28 Correction to: SDN-based offloading policy to reduce the delay in fog-vehicular networks Khadir, Alla Abbas

14 3 p. 1276
artikel
29 Cost-effective migration-based dynamic platform defense technique: a CTMDP approach Zhang, Yipin

14 3 p. 1207-1217
artikel
30 CP-ABSEL: Ciphertext-policy attribute-based searchable encryption from lattice in cloud storage Varri, Uma Sankararao

14 3 p. 1290-1302
artikel
31 Efficient privacy-preserving authentication for V2G networks Zhang, Yinghui

14 3 p. 1366-1378
artikel
32 Exploiting peer-to-peer communications for query privacy preservation in voice assistant systems Tran, Bang

14 3 p. 1475-1487
artikel
33 Group task allocation approach for heterogeneous software crowdsourcing tasks Yin, Xiaojing

14 3 p. 1736-1747
artikel
34 Guest editorial special issue on “P2P computing for deep learning” Li, Ying

14 3 p. 1734-1735
artikel
35 High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism C, Gopala Krishnan

14 3 p. 1229-1241
artikel
36 High-throughput secure multiparty multiplication protocol via bipartite graph partitioning Xu, Yi

14 3 p. 1414-1430
artikel
37 Hybrid meta-heuristic techniques based efficient charging scheduling scheme for multiple Mobile wireless chargers based wireless rechargeable sensor networks Chawra, Vrajesh Kumar

14 3 p. 1303-1315
artikel
38 Impact of data correlation on privacy budget allocation in continuous publication of location statistics Hemkumar, D.

14 3 p. 1650-1665
artikel
39 Improved differentiable neural architecture search for single image super-resolution Weng, Yu

14 3 p. 1806-1815
artikel
40 Influencing factors analysis in pear disease recognition using deep learning Yang, Fang

14 3 p. 1816-1828
artikel
41 Joint resource allocation and routing optimization for spectrum aggregation based CRAHNs Chen, Jian

14 3 p. 1317-1333
artikel
42 Machine learning models and techniques for VANET based traffic management: Implementation issues and challenges Khatri, Sahil

14 3 p. 1778-1805
artikel
43 Modeling & analysis of software defined networks under non-stationary conditions Vuppalapati, Navya

14 3 p. 1174-1189
artikel
44 New incentive mechanism to enhance cooperation in wireless P2P networks Singha, Nitin

14 3 p. 1218-1228
artikel
45 Non-cryptography countermeasure against controllable event triggering attack in WSNs Hu, Haoran

14 3 p. 1071-1087
artikel
46 Obfuscation of images via differential privacy: From facial images to general images Croft, William L.

14 3 p. 1705-1733
artikel
47 Packet classification based aerial intelligent relay-road side unit (air-rsu) framework for vehicular ad-hoc networks Raj, A. Samson Arun

14 3 p. 1132-1153
artikel
48 Privacy-aware smart card based biometric authentication scheme for e-health Chen, Li

14 3 p. 1353-1365
artikel
49 Privacy-preserving neural networks with Homomorphic encryption: Challenges and opportunities Pulido-Gaytan, Bernardo

14 3 p. 1666-1691
artikel
50 Privacy-preserving two-parties logistic regression on vertically partitioned data using asynchronous gradient sharing Wei, Qianjun

14 3 p. 1379-1387
artikel
51 SDN-based offloading policy to reduce the delay in fog-vehicular networks Khadir, Alla Abbas

14 3 p. 1261-1275
artikel
52 Surface and high-altitude combined rainfall forecasting using convolutional neural network Zhang, Pengcheng

14 3 p. 1765-1777
artikel
53 The throughput optimization for wireless sensor networks adopting interference alignment and successive interference cancellation Ding, Xu

14 3 p. 1748-1764
artikel
54 Three-stage Stackelberg game based edge computing resource management for mobile blockchain Fan, Yuqi

14 3 p. 1431-1445
artikel
55 Towards software defined low maintenance structured peer-to-peer overlays Shukla, Nitin

14 3 p. 1242-1260
artikel
                             55 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland