27 results on '"Jianhua, Li"'
Search Results
2. DCS Chain: A Flexible Private Blockchain System.
3. Multi-Agent RL-Based Industrial AIGC Service Offloading over Wireless Edge Networks.
4. OpticGAI: Generative AI-aided Deep Reinforcement Learning for Optical Networks Optimization.
5. Trustworthy AI-Generative Content in Intelligent 6G Network: Adversarial, Privacy, and Fairness.
6. Spikewhisper: Temporal Spike Backdoor Attacks on Federated Neuromorphic Learning over Low-power Devices.
7. Graph Neural Backdoor: Fundamentals, Methodologies, Applications, and Future Directions.
8. Towards Multi-Task Generative-AI Edge Services with an Attention-based Diffusion DRL Approach.
9. From Cluster Assumption to Graph Convolution: Graph-based Semi-Supervised Learning Revisited.
10. Toward the Tradeoffs between Privacy, Fairness and Utility in Federated Learning.
11. Current Status and Trends of Engineering Entrepreneurship Education in Australian Universities.
12. Case-Aware Adversarial Training.
13. Video Annotation for Visual Tracking via Selection and Refinement.
14. Too Expensive to Attack: A Joint Defense Framework to Mitigate Distributed Attacks for the Internet of Things Grid.
15. Too Expensive to Attack: Enlarge the Attack Expense through Joint Defense at the Edge.
16. A Fast and Scalable Authentication Scheme in IoT for Smart Living.
17. High-Performance Long-Term Tracking with Meta-Updater.
18. Leveraging AI and Intelligent Reflecting Surface for Energy-Efficient Communication in 6G IoT.
19. FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT.
20. GelSlim: A High-Resolution, Compact, Robust, and Calibrated Tactile-sensing Finger.
21. Fog-enabled Edge Learning for Cognitive Content-Centric Networking in 5G.
22. Slip Detection with Combined Tactile and Visual Information.
23. Deep Learning-Based Food Calorie Estimation Method in Dietary Assessment.
24. Computer vision-based food calorie estimation: dataset, method, and experiment.
25. An Anti-attack Model Based on Complex Network Theory in P2P networks
26. Lower Bounds on the Algebraic Immunity of Boolean Functions
27. Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.