Search

Your search keyword '"LIBING WU"' showing total 113 results

Search Constraints

Start Over You searched for: Author "LIBING WU" Remove constraint Author: "LIBING WU" Topic computer science Remove constraint Topic: computer science
113 results on '"LIBING WU"'

Search Results

1. Traffic Signal Control With Reinforcement Learning Based on Region-Aware Cooperative Strategy

2. Dual-Server Public-Key Authenticated Encryption with Keyword Search

3. Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data

4. An edge computing based data detection scheme for traffic light at intersections

5. Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid

6. A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks

7. SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks

8. An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things

9. Cluster-Enabled Cooperative Scheduling Based on Reinforcement Learning for High-Mobility Vehicular Networks

10. Observer‐based finite time adaptive fault tolerant control for nonaffine nonlinear systems with actuator faults and disturbances

11. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks

12. ForeXGBoost: passenger car sales prediction based on XGBoost

13. Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure

14. Adaptive Neural Tracking Control of Full-state Constrained Nonstrict-feedback Time-delay Systems with Input Saturation

15. A Parallel and Forward Private Searchable Public-Key Encryption for Cloud-Based Data Sharing

16. LVID: A Multimodal Biometrics Authentication System on Smartphones

17. An improved multi-attribute decision-making based network selection algorithm for heterogeneous vehicular network

18. DynSTGAT: Dynamic Spatial-Temporal Graph Attention Network for Traffic Signal Control

19. A Spatial-Temporal Graph Attention Network for Multi-intersection Traffic Light Control

20. Salience-CAM: Visual Explanations from Convolutional Neural Networks via Salience Score

21. DEN-DQL: Quick Convergent Deep Q-Learning with Double Exploration Networks for News Recommendation

22. RLCC: Practical Learning-based Congestion Control for the Internet

23. TSA-GAN: A Robust Generative Adversarial Networks for Time Series Augmentation

24. Everyone in SDN Contributes: Fault Localization via Well-Designed Rules

25. A Multi-objective Reinforcement Learning Perspective on Internet Congestion Control

26. A Hierarchical Architecture for the Future Internet of Vehicles

27. A V2I communication-based pipeline model for adaptive urban traffic light scheduling

28. Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks

29. Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server

30. Secure Key Agreement and Key Protection for Mobile Device User Authentication

31. A Context-Aware User-Item Representation Learning for Item Recommendation

32. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things

33. An Adaptive Spray and Wait Routing Algorithm Based on Quality of Node in Delay Tolerant Network

34. Brainstorming-Based Ant Colony Optimization for Vehicle Routing With Soft Time Windows

35. A Real-Time Video Analysis Software Based on Deep Convolutional Neural Networks (DCNN) for Useful and Effective Endoscopy Video Storage

36. Privacy-Aware Key Task Scheduling in Vehicular Networks Based on Incentive Mechanism

37. Loop2Recursion: Compiler-Assisted Wear Leveling for Non-Volatile Memory

38. Privacy-preserving auditing scheme for shared data in public clouds

39. An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage

40. Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks

41. Outlet : Outsourcing Wearable Computing to the Ambient Mobile Computing Edge

42. Be Stable and Fair: Robust Data Scheduling for Vehicular Networks

43. Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

44. Cryptanalysis of an identity-based public auditing protocol for cloud storage

45. An efficient provably-secure identity-based authentication scheme using bilinear pairings for Ad hoc network

46. Efficient and secure identity-based encryption scheme with equality test in cloud computing

47. Secure public data auditing scheme for cloud storage in smart city

48. A secure and efficient public auditing scheme using RSA algorithm for cloud storage

49. An Efficient Multi‐hop Broadcast Protocol for Emergency Messages Dissemination in VANETs

50. Security analysis of a publicly verifiable data possession scheme for remote storage

Catalog

Books, media, physical & digital resources