Search

Your search keyword '"Xuehui Du"' showing total 63 results

Search Constraints

Start Over You searched for: Author "Xuehui Du" Remove constraint Author: "Xuehui Du" Language english Remove constraint Language: english
63 results on '"Xuehui Du"'

Search Results

1. An image partition security-sharing mechanism based on blockchain and chaotic encryption.

2. Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model

3. A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs

4. Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines

5. A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model

6. Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition

7. Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation

8. Building a Cloud IDS Using an Efficient Feature Selection Method and SVM

9. Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network

10. Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection

11. HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony

12. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing

13. A quality-of-service-aware dynamic evolution model for space–ground integrated network

14. A cross-domain access control mechanism based on model migration and semantic reasoning.

15. Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure.

16. DroidFDR: Automatic Classification of Android Malware Using Model Checking

17. Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines

18. Image Feature Fusion Method Based on Edge Detection.

19. Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network

20. Android Malware Detection Based on Structural Features of the Function Call Graph

21. A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification

22. Efficient Access Control Permission Decision Engine Based on Machine Learning

23. Access Control Role Evolution Mechanism for Open Computing Environment

24. HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony

25. Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow

26. Multilevel Security Network Communication Model Based on Multidimensional Control

27. Optically Active Oxygen Defects in Titanium Dioxide Doped with Inorganic Acid Ions

28. The association between fatty liver index and onset of diabetes: secondary analysis of a population-based cohort study

29. m6A-induced repression of SIAH1 facilitates alternative splicing of androgen receptor variant 7 by regulating CPSF1

30. Protective effects and potential mechanisms of fermented egg-milk peptides on the damaged intestinal barrier

33. Using Dempster-Shafer theory and ontology in XML latent information retrieval.

34. A modified process anomaly detection using Boolean function.

35. Chinese Remainder Theorem based DTN group key management.

36. A Novel Grid Service Discovery Algorithm Based on Service Behavior Semantic Annotation.

Catalog

Books, media, physical & digital resources