527 results on '"Jianhua, Li"'
Search Results
2. TCMIDP: A Comprehensive Database of Traditional Chinese Medicine for Network Pharmacology Research.
3. LinkGuard: Link Locally Privacy-Preserving Graph Neural Networks with Integrated Denoising and Private Learning.
4. Trading Trust for Privacy: Socially-Motivated Personalized Privacy-Preserving Collaborative Learning in IoT.
5. Regulating Covert Communication Capacity with Full-Duplex Receiver Against Location-Uncertain Eavesdropper.
6. Reputation-Aware Incentive Mechanism of Federated Learning: A Mean Field Game Approach.
7. Towards Multi-Task Generative-AI Edge Services with an Attention-based Diffusion DRL Approach.
8. Digital Twin Enhanced Data Protection Based on Cloud-Edge Collaboration in Healthcare System.
9. DPLE: A Privacy-Enhanced and Straggler-Resilient Distributed Learning Framework for Smart Cloud.
10. Covert and Reliable Semantic Communication Against Cross-Layer Privacy Inference over Wireless Edge Networks.
11. Local Differential Private Spatio- Temporal Dynamic Graph Learning for Wireless Social Networks.
12. Joint Top-K Sparsification and Shuffle Model for Communication-Privacy-Accuracy Tradeoffs in Federated-Learning-Based IoV.
13. Privacy-Preserving Few-Shot Traffic Detection Against Advanced Persistent Threats via Federated Meta Learning.
14. Leveraging Digital Twin and DRL for Collaborative Context Offloading in C-V2X Autonomous Driving.
15. Pre-Stability Control for In-Wheel-Motor-Driven Electric Vehicles With Dynamic State Prediction.
16. Active collision avoidance for teleoperated multi-segment continuum robots toward minimally invasive surgery.
17. Blockchain and Multi-Agent Learning Empowered Incentive IRS Resource Scheduling for Intelligent Reconfigurable Networks.
18. BlockAgents: Towards Byzantine-Robust LLM-Based Multi-Agent Coordination via Blockchain.
19. OpticGAI: Generative AI-aided Deep Reinforcement Learning for Optical Networks Optimization.
20. LateBA: Latent Backdoor Attack on Deep Bug Search via Infrequent Execution Codes.
21. rLLM: Relational Table Learning with LLMs.
22. DCS Chain: A Flexible Private Blockchain System.
23. Multi-Agent RL-Based Industrial AIGC Service Offloading over Wireless Edge Networks.
24. OpticGAI: Generative AI-aided Deep Reinforcement Learning for Optical Networks Optimization.
25. Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness.
26. Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices.
27. Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions.
28. Towards Multi-Task Generative-AI Edge Services with an Attention-based Diffusion DRL Approach.
29. Ensuring Minority Group Rights in Social IoT with Fairness-aware Federated Graph Node Classification.
30. AdvBinSD: Poisoning the Binary Code Similarity Detector via Isolated Instruction Sequences.
31. Content Style-triggered Backdoor Attack in Non-IID Federated Learning via Generative AI.
32. PBE-Plan: Periodic Backdoor Erasing Plan for Trustworthy Federated Learning.
33. Reinforcement Learning-Empowered Decentralized Channel Selection for Dense Wi-Fi 7 Networks.
34. HiSec: Towards Cyber Threat Correlation and Discovery Based on Hierarchical Graph Neural Networks.
35. SemSBA: Semantic-perturbed Stealthy Backdoor Attack on Federated Semi-supervised Learning.
36. Hierarchical Swarm Learning for Edge-Assisted Collaborative Vehicle Trajectory Prediction.
37. Swarm Reinforcement Learning for Collaborative Content Caching in Information Centric Networks.
38. Toward the Tradeoffs Between Privacy, Fairness and Utility in Federated Learning.
39. Wireless Coded Distributed Learning with Gaussian-based Local Differential Privacy.
40. Adapting ICT Entrepreneurship and Innovation Education to a Changing World: A Case Study of Australian Universities.
41. Black-Box Graph Backdoor Defense.
42. Multi-Level ACE-based IoT Knowledge Sharing for Personalized Privacy-Preserving Federated Learning.
43. DPG-DT: Differentially Private Generative Digital Twin for Imbalanced Learning in Industrial IoT.
44. ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detection Scheme for ICS.
45. Securing Smart UAV Delivery Systems Using Zero Trust Principle-Driven Blockchain Architecture.
46. A Differential Fault Attack on Security Vehicle System Applied SIMON Block Cipher.
47. Vulnerability-Aware Task Scheduling for Edge Intelligence Empowered Trajectory Analysis in Intelligent Transportation Systems.
48. VM performance-aware virtual machine migration method based on ant colony optimization in cloud environment.
49. A positive and unlabeled learning framework based on extreme learning machine for drug-drug interactions discovery.
50. Refined education mechanism based on edge computing for college student management.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.