40 results on '"Xu, Fengyuan"'
Search Results
2. SIEGE: Self-Supervised Incremental Deep Graph Learning for Ethereum Phishing Scam Detection
3. Dataset Preparation for Arbitrary Object Detection: An Automatic Approach based on Web Information in English
4. GAPter: Gray-Box Data Protector for Deep Learning Inference Services at User Side
5. Manipulating Transfer Learning for Property Inference
6. Towards Automated Safety Vetting of Smart Contracts in Decentralized Applications
7. Privacy-Preserving and Robust Federated Deep Metric Learning
8. Towards Practical and Efficient Long Video Summary
9. DIComP: Lightweight Data-Driven Inference of Binary Compiler Provenance with High Accuracy
10. PECAM
11. AsyMo
12. Privacy-Preserving Optimal Recovering for the Nearly Exhausted Payment Channels
13. DAPter: Preventing User Data Abuse in Deep Learning Inference Services
14. Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence
15. A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence
16. Efficient Architecture Paradigm for Deep Learning Inference as a Service
17. Exploiting Adversarial Examples to Drain Computational Resources on Mobile Deep Learning Systems
18. EMO
19. Detecting GAN-based Privacy Attack in Distributed Learning
20. Graph-to-Tree Neural Networks for Learning Structured Input-Output Translation with Applications to Semantic Parsing and Math Word Problem
21. Automated Finite State Machine Extraction
22. DeepIntent
23. Broken Relationship of Mobile User Intentions and Permission Control of Shared System Resources
24. Occlumency
25. secGAN
26. Privacy-Preserving Data Integrity Verification in Mobile Edge Computing
27. NodeMerge
28. Learning from Differentially Private Neural Activations with Edge Computing
29. MobiCrowd: Mobile Crowdsourcing on Location-based Social Networks
30. High Fidelity Data Reduction for Big Data Security Dependency Analyses
31. Optimizing background email sync on smartphones
32. Fast Mencius: Mencius with low commit latency
33. Extracting secret key from wireless link dynamics in vehicular environments
34. MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
35. IMDGuard: Securing implantable medical devices with the external wearable guardian
36. Designing a Practical Access Point Association Protocol
37. Individuation Learning Components in Intelligent Education Games
38. Gippy: Campus GIS Information System Supported by P2P
39. Performance Evaluation of JXTA Based P2P Distributed Computing System
40. A MPLS and VPN Based eGovernment System
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.