Search

Your search keyword '"Jian Weng"' showing total 134 results

Search Constraints

Start Over You searched for: Author "Jian Weng" Remove constraint Author: "Jian Weng" Topic computer Remove constraint Topic: computer
134 results on '"Jian Weng"'

Search Results

1. Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks

2. A Data Trading Scheme With Efficient Data Usage Control for Industrial IoT

3. Toward Vehicular Digital Forensics From Decentralized Trust: An Accountable, Privacy-Preserving, and Secure Realization

4. Enabling Efficient, Secure and Privacy-Preserving Mobile Cloud Storage

5. PPTM: A Privacy-Preserving Trust Management Scheme for Emergency Message Dissemination in Space–Air–Ground-Integrated Vehicular Networks

6. Verifiable Spatial Range Query Over Encrypted Cloud Data in VANET

7. Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System

8. LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications

9. Perturbation-Hidden: Enhancement of Vehicular Privacy for Location-Based Services in Internet of Vehicles

10. BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks

11. A Privacy-Preserving Image Retrieval Scheme Using Secure Local Binary Pattern in Cloud Computing

12. PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting

13. Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness

14. Feature Distillation in Deep Attention Network Against Adversarial Examples

15. PAPU: Pseudonym Swap With Provable Unlinkability Based on Differential Privacy in VANETs

16. You Can Access but You Cannot Leak: Defending Against Illegal Content Redistribution in Encrypted Cloud Media Center

17. Sample Balancing for Deep Learning-Based Visual Recognition

18. TCEMD: A Trust Cascading-Based Emergency Message Dissemination Model in VANETs

19. Key regeneration-free ciphertext-policy attribute-based encryption and its application

20. Flexible Wildcard Searchable Encryption System

21. An Adaptive Resilient Load Frequency Controller for Smart Grids With DoS Attacks

22. Blockchain Enabled Trust-Based Location Privacy Protection Scheme in VANET

23. A Provably Secure Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks

24. LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset

25. Comments on 'Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources'

26. Toward Blockchain-Based Fair and Anonymous Ad Dissemination in Vehicular Networks

27. Cryptanalysis of a public authentication protocol for outsourced databases with multi-user modification

28. DAEGEN: A Modular Compiler for Exploring Decoupled Spatial Accelerators

29. CrowdBC: A Blockchain-Based Decentralized Framework for Crowdsourcing

30. RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust

31. A Comprehensive Survey on Secure Outsourced Computation and Its Applications

32. FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism

33. UNIT: Unifying Tensorized Instruction Compilation

34. Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS

35. BLESS: A BLE Application Security Scanning Framework

36. DSAGEN: Synthesizing Programmable Spatial Accelerators

37. A Hybrid Systolic-Dataflow Architecture for Inductive Matrix Algorithms

38. Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata

39. Pine: Enabling Privacy-Preserving Deep Packet Inspection on TLS with Rule-Hiding and Fast Connection Establishment

40. Enabling verifiable multiple keywords search over encrypted cloud data

41. Notes on a provably-secure certificate-based encryption against malicious CA attacks

42. Privacy-Preserving Indexing and Query Processing for Secure Dynamic Cloud Storage

43. An Overview on Smart Contracts: Challenges, Advances and Platforms

44. Position Manipulation Attacks to Balise-Based Train Automatic Stop Control

45. Privacy-Preserving Image Processing in the Cloud

46. Efficient and Privacy-Preserving Outsourced Calculation of Rational Numbers

47. Privacy-Preserving Smart Semantic Search Based on Conceptual Graphs Over Encrypted Outsourced Data

48. Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems

49. Cloudde: A Heterogeneous Differential Evolution Algorithm and Its Distributed Cloud Version

50. Machine Learning-Based Malicious Application Detection of Android

Catalog

Books, media, physical & digital resources