112 results on '"Zhang Xiaosong"'
Search Results
2. Batch Verification-Based Anonymous and Traceable Data Sharing Scheme in Industrial Internet of Things
3. HM-SAF: Cross-Layer Static Analysis Framework For HarmonyOS
4. SegmentGeneva: Packet segmentation strategy and genetic algorithm based escape detection technique
5. A Blockchain Method to IoT Sensors for Data Security in Aviation Surveillance
6. Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts
7. FeatureSpy: Detecting Learning-Content Attacks via Feature Inspection in Secure Deduplicated Storage
8. LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph
9. An intrusion detection system based on multiple interpretation methods
10. IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM
11. Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models
12. Defending Data Poisoning Attack via Trusted Platform Module and Blockchain Oracle
13. Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism
14. Revisiting Frequency Analysis against Encrypted Deduplication via Statistical Distribution
15. Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation
16. AGSS: An Airline Ground Service Supervising System Based on Blockchain
17. Improving Performance of Log Anomaly Detection With Semantic and Time Features Based on BiLSTM-Attention
18. Enabling Auction-based Cross-Blockchain Protocol for Online Anonymous Payment
19. A Linear Piezoelectric Stick-Slip Actuator via Triangular Displacement Amplification Mechanism
20. Improving Velocity of Stick-Slip Piezoelectric Actuators With Optimized Flexure Hinges Based on SIMP Method
21. AutoSup: Driving Behaviors Recognition Supervision via Incentive Mechanism
22. Beyond Bounding-Box: Convex-hull Feature Adaptation for Oriented and Densely Packed Object Detection
23. End-To-End Android Malware Classification Based on Pure Traffic Images
24. A Piezoelectric Stick-Slip Nanopositioning Stage With Ultra-High Load Capacity Realizing by Decoupling the Driving and Moving Units
25. Convex-Hull Feature Adaptation for Oriented and Densely Packed Object Detection.
26. A Verifiable Privacy-Preserving Machine Learning Prediction Scheme for Edge-Enhanced HCPSs.
27. Learning to Match Anchors for Visual Object Detection.
28. Android Malware Classification Approach Based on Host-Level Encrypted Traffic Shaping
29. An Electric Vehicle Charging Reservation Approach based on Blockchain
30. A Successive Framework: Enabling Accurate Identification and Secure Storage for Data in Smart Grid
31. CEPS: A Cross-Blockchain based Electronic Health Records Privacy-Preserving Scheme
32. An Efficient Privacy-Preserving Public Auditing Protocol for Cloud-Based Medical Storage System.
33. Enabling Secure and Space-Efficient Metadata Management in Encrypted Deduplication.
34. Building Blockchains with Secure and Practical Public-Key Cryptographic Algorithms: Background, Motivations and Example.
35. A Secure Multi-Party Computing System Based on SGX Technology for Trusted Data Circulation
36. A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts
37. DataEther: Data Exploration Framework For Ethereum
38. Orthogonal Decomposition Network for Pixel-Wise Binary Classification
39. An Improved Convolutional Neural Network Model for Intrusion Detection in Networks
40. Metadedup: Deduplicating Metadata in Encrypted Deduplication via Indirection
41. A Hybrid Technique To Detect Botnets, Based on P2P Traffic Similarity
42. Compiler-Based Efficient CNN Model Construction for 5G Edge Devices.
43. A SDIO-Interface Wi-Fi Packet Capture Scheme Based on Android Kernel Extension
44. A Robust Packet-Dropout Covert Channel over Wireless Networks.
45. Achieving Intelligent Trust-Layer for Internet-of-Things via Self-Redactable Blockchain.
46. Toward Secure Storage in Cloud-based eHealth Systems: A Blockchain-Assisted Approach.
47. Botnet Detection based on Fuzzy Association Rules
48. PERDICE: Towards Discovering Software Inefficiencies Leading to Cache Misses and Branch Mispredictions
49. Dangerous rock testing system based on FPGA
50. Study on dynamic monitoring system of high slope based on the internet of things
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.