Search

Your search keyword '"HAIBO HU"' showing total 138 results

Search Constraints

Start Over You searched for: Author "HAIBO HU" Remove constraint Author: "HAIBO HU" Topic computer science Remove constraint Topic: computer science
138 results on '"HAIBO HU"'

Search Results

1. PrivKVM*: Revisiting Key-Value Statistics Estimation With Local Differential Privacy

2. Post-Streaming Wastage Analysis – A Data Wastage Aware Framework in Mobile Video Streaming

3. Protecting Decision Boundary of Machine Learning Model With Differentially Private Perturbation

5. SAR Pixelwise Registration via Multiscale Coherent Point Drift With Iterative Residual Map Minimization

6. A Unified Framework for Flexible Playback Latency Control in Live Video Streaming

7. Privacy and efficiency guaranteed social subgraph matching

8. Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity

9. Preserving User Privacy for Machine Learning: Local Differential Privacy or Federated Machine Learning?

10. Owleyes: A Visual Analytics System for Functions and Connection Patterns of IPv4 Addresses in Networks

11. MISSILE: A System of Mobile Inertial Sensor-Based Sensitive Indoor Location Eavesdropping

12. Collecting High-Dimensional and Correlation-Constrained Data with Local Differential Privacy

14. Beyond Value Perturbation: Local Differential Privacy in the Temporal Setting

15. Background Subtraction Based on Integration of Alternative Cues in Freely Moving Camera

16. Success factors influencing requirements change management process in global software development

17. Improved Crowd Counting Method Based on Scale-Adaptive Convolutional Neural Network

18. High-Performance SAR Automatic Target Recognition Under Limited Data Condition Based on a Deep Feature Fusion Network

19. A Novel 2D Off-Grid DOA Estimation Method Based on Compressive Sensing and Least Square Optimization

20. A Model for Competing Information Diffusion in Social Networks

21. CIM-CSS: A Formal Modeling Approach to Context Identification and Management for Intelligent Context-Sensitive Systems

22. An extraction attack on image recognition model using VAE-kdtree model

23. The Appropriate Time—Management Based on the Relationship Between Human Beings and Nature

24. Cloud Password Shield: A Secure Cloud-based Firewall against DDoS on Authentication Servers

25. OHEA

26. SIOT-RIMM

27. Towards Locally Differentially Private Generic Graph Metric Estimation

28. Local Differential Privacy: Tools, Challenges, and Opportunities

29. Uncertainty Analysis and Resource Allocation in Construction Project Management

30. Optimization of tourism route planning algorithm for forest wetland based on GIS

31. Improving the Quality of Software Development Process by Introducing a New Methodology–AZ-Model

32. SeizeMaliciousURL: A novel learning approach to detect malicious URLs

33. Assuring Spatio-Temporal Integrity on Mobile Devices with Minimum Location Disclosure

34. Reducing Uncertainty of Probabilistic Top-$k$ Ranking via Pairwise Crowdsourcing

35. Geo-social group queries with minimum acquaintance constraints

36. Multi-objective optimized connectivity restoring of disjoint segments using mobile data collectors in wireless sensor network

37. An approach to translating OCL invariants into OWL 2 DL axioms for checking inconsistency

40. Publishing Sensitive Trajectory Data Under Enhanced l-Diversity Model

41. PrivKV: Key-Value Data Collection with Local Differential Privacy

42. vABS: Towards Verifiable Attribute-Based Search Over Shared Cloud Data

43. An Efficient and Recoverable Data Sharing Mechanism for Edge Storage

44. BDPL: A Boundary Differentially Private Layer Against Machine Learning Model Extraction Attacks

45. An Image Splicing and Copy-Move Detection Method Based on Convolutional Neural Networks with Global Average Pooling

46. Environmental investment prediction using extended belief rule-based system and evidential reasoning rule

47. ProDB: A memory-secure database using hardware enclave and practical oblivious RAM

49. Corrupted and occluded face recognition via cooperative sparse representation

50. PCMLogging: Optimizing Transaction Logging and Recovery Performance with PCM

Catalog

Books, media, physical & digital resources