Search

Your search keyword '"Yanjiao Chen"' showing total 92 results

Search Constraints

Start Over You searched for: Author "Yanjiao Chen" Remove constraint Author: "Yanjiao Chen" Topic computer science Remove constraint Topic: computer science
92 results on '"Yanjiao Chen"'

Search Results

1. SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation

2. DetectDUI: An In-Car Detection System for Drink Driving and BACs

3. Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics

4. Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment

5. SmartSO: Chinese Character and Stroke Order Recognition With Smartwatch

6. A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks

7. A Compressive Integrity Auditing Protocol for Secure Cloud Storage

8. Stealing Your Android Patterns via Acoustic Signals

9. A Contract-Based Insurance Incentive Mechanism Boosted by Wearable Technology

10. Matchmaker: Stable Task Assignment With Bounded Constraints for Crowdsourcing Platforms

11. Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models

12. PP-SPEC: Securing Spectrum Allocation for Internet of Things

13. MFRep: Joint user and employer alignment across heterogeneous social networks

14. A Two-Stage Game Framework to Secure Transmission in Two-Tier UAV Networks

15. Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments

16. Deep Learning on Mobile and Embedded Devices

17. Razor: Scaling Backend Capacity for Mobile Applications

18. Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT

19. ForeXGBoost: passenger car sales prediction based on XGBoost

20. Securing Channel State Information in Multiuser MIMO With Limited Feedback

21. FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants

22. Adversarial Example Attack on Electric Power Network Security Situation Awareness

23. SmartHandwriting: Handwritten Chinese Character Recognition With Smartwatch

24. LVID: A Multimodal Biometrics Authentication System on Smartphones

25. SmartGe: Identifying Pen-Holding Gesture With Smartwatch

26. ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum

27. Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum

28. InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion

29. A Multi-objective Reinforcement Learning Perspective on Internet Congestion Control

30. ZkRep: a privacy-preserving scheme for reputation-based blockchain system

31. Cross-domain Anomaly Detection for Power Industrial Control System

32. Eagle: Refining Congestion Control by Learning from the Experts

33. Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones

34. <tex-math notation='LaTeX'>$PROST$ </tex-math> : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation

35. ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering

36. Cooperative Transmission With Priority and Fairness in Edge Computing Systems

37. Brainstorming-Based Ant Colony Optimization for Vehicle Routing With Soft Time Windows

38. Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training

39. Ensuring Minimum Spectrum Requirement in Matching-Based Spectrum Allocation

40. Financial Analysis of Network Upgrade

41. Magic-hand: Turn a smartwatch into a mouse

42. A general framework to design secure cloud storage protocol using homomorphic encryption scheme

43. A Reverse Auction Framework for Hybrid Access in Femtocell Network

44. Personalized user engagement modeling for mobile videos

45. WatchOUT: A Practical Secure Pedestrian Warning System Based on Smartphones

46. SmartWriting: Pen-Holding Gesture Recognition with Smartwatch

47. TranGAN: Generative Adversarial Network Based Transfer Learning for Social Tie Prediction

48. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones

49. An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks

50. Incentivizing cooperative relay in UTXO-based blockchain network

Catalog

Books, media, physical & digital resources