50 results on '"Chen, Keke"'
Search Results
2. Foreground/Background-Masked Interaction Learning for Spatio-temporal Action Detection
3. A color image encryption scheme based on block compressive sensing and chaotic systems
4. Demo: SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments
5. A Deadline-Constrained and Cost-Minimized approach for Workflow scheduling in IaaS clouds
6. Scalable Sequence Clustering for Large-Scale Immune Repertoire Analysis
7. Image Disguising for Protecting Data and Model Confidentiality in Outsourced Deep Learning
8. Class-Specific Affinity based Weakly Supervised Semantic Segmentation with Neutral Region Exploration
9. Face Angle Identification with Ensemble Learning
10. Design of Virtual Simulation Experiment Platform Based on ARINC 653 Specification
11. Example-Guided Identify Preserving Face Synthesis by Metric Learning
12. Real-time Extension Technologies on the Windows Operation System
13. Multi-region Coverage Path Planning for Heterogeneous Unmanned Aerial Vehicles Systems
14. Knowledge Graph Enhanced Community Detection and Characterization
15. Survey and Research of Tourists' Satisfaction in Regional Tourism Demonstration Zone Based on IPA Analysis Taking Jizhou District of Tianjin as an Example
16. Privacy-Preserving Boosting with Random Linear Classifiers
17. Image Disguising for Privacy-preserving Deep Learning
18. Shilling Attack Detection Using Rated Item Correlation for Collaborative Filtering
19. Unsupervised Shilling Attack Detection Model Based on Rated Item Correlation Analysis
20. Joint source power allocation and secure relay beamforming in non-orthogonal multiple access amplify-and-forward relay networks
21. Adaptive training instance selection for cross-domain emotion identification
22. PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs
23. Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds
24. Tweet Properly
25. A color image encryption scheme based on block compressive sensing and chaotic systems.
26. Scalable Euclidean Embedding for Big Data
27. Identifying Regrettable Messages from Tweets
28. The Influence Analysis of Expansion Angle and Internal Fluid Cavitation Phenomena for Zoom Nozzle
29. Research on the theory and simulation of torsional vibration for CODAD systems
30. PerturBoost: Practical Confidential Classifier Learning in the Cloud
31. Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud
32. Privacy preserving boosting in the cloud with secure half-space queries
33. A case study of mobile popularization of science and technology infrastructures in China.
34. The contrast of the two evaluation systems of the development of popularization of science and technology infrastructures.
35. Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services
36. Flying under the radar
37. Towards Optimal Resource Provisioning for Running MapReduce Programs in Public Clouds
38. Session details: Novel applications of privacy techniques
39. RASP
40. On domain similarity and effectiveness of adapting-to-rank
41. VisGBT: Visually analyzing evolving datasets for adaptive learning
42. Trada
43. Space adaptation
44. A regression framework for learning ranking functions using relative relevance judgments
45. Towards Attack-Resilient Geometric Data Perturbation
46. Detecting the Change of Clustering Structure in Categorical Data Streams
47. Efficiently clustering transactional data with weighted coverage density
48. ClusterMap
49. Cluster rendering of skewed datasets via visualization
50. CUTE Labs: Low-Cost Open-Source Instructional Laboratories for Cloud Computing Education
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.