Search

Your search keyword '"Yanjiao Chen"' showing total 92 results

Search Constraints

Start Over You searched for: Author "Yanjiao Chen" Remove constraint Author: "Yanjiao Chen" Topic computer science Remove constraint Topic: computer science
92 results on '"Yanjiao Chen"'

Search Results

1. SAFE: A General Secure and Fair Auction Framework for Wireless Markets With Privacy Preservation

2. DetectDUI: An In-Car Detection System for Drink Driving and BACs

3. Silhouette: Efficient Cloud Configuration Exploration for Large-Scale Analytics

4. Defense-Resistant Backdoor Attacks Against Deep Neural Networks in Outsourced Cloud Environment

5. SmartSO: Chinese Character and Stroke Order Recognition With Smartwatch

6. A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks

7. A Compressive Integrity Auditing Protocol for Secure Cloud Storage

8. Stealing Your Android Patterns via Acoustic Signals

9. A Contract-Based Insurance Incentive Mechanism Boosted by Wearable Technology

10. Matchmaker: Stable Task Assignment With Bounded Constraints for Crowdsourcing Platforms

11. Model Extraction Attacks and Defenses on Cloud-Based Machine Learning Models

12. PP-SPEC: Securing Spectrum Allocation for Internet of Things

13. MFRep: Joint user and employer alignment across heterogeneous social networks

14. A Two-Stage Game Framework to Secure Transmission in Two-Tier UAV Networks

15. Backdoor Attacks and Defenses for Deep Neural Networks in Outsourced Cloud Environments

16. Deep Learning on Mobile and Embedded Devices

17. Razor: Scaling Backend Capacity for Mobile Applications

18. Crowdcaching: Incentivizing D2D-Enabled Caching via Coalitional Game for IoT

19. ForeXGBoost: passenger car sales prediction based on XGBoost

20. Securing Channel State Information in Multiuser MIMO With Limited Feedback

21. SmartHandwriting: Handwritten Chinese Character Recognition With Smartwatch

22. LVID: A Multimodal Biometrics Authentication System on Smartphones

23. SmartGe: Identifying Pen-Holding Gesture With Smartwatch

24. FakeWake: Understanding and Mitigating Fake Wake-up Words of Voice Assistants

25. Adversarial Example Attack on Electric Power Network Security Situation Awareness

26. InverseNet: Augmenting Model Extraction Attacks with Training Data Inversion

27. A Multi-objective Reinforcement Learning Perspective on Internet Congestion Control

28. ARMOR: A Secure Combinatorial Auction for Heterogeneous Spectrum

29. Privacy-Preserving and Truthful Double Auction for Heterogeneous Spectrum

30. Dolphin: Real-Time Hidden Acoustic Signal Capture with Smartphones

31. <tex-math notation='LaTeX'>$PROST$ </tex-math> : Privacy-Preserving and Truthful Online Double Auction for Spectrum Allocation

32. Cooperative Transmission With Priority and Fairness in Edge Computing Systems

33. Brainstorming-Based Ant Colony Optimization for Vehicle Routing With Soft Time Windows

34. Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training

35. ZkRep: a privacy-preserving scheme for reputation-based blockchain system

36. Cross-domain Anomaly Detection for Power Industrial Control System

37. Eagle: Refining Congestion Control by Learning from the Experts

38. ABInfer: A Novel Field Boundaries inference Approach for Protocol Reverse Engineering

39. Ensuring Minimum Spectrum Requirement in Matching-Based Spectrum Allocation

40. WatchOUT: A Practical Secure Pedestrian Warning System Based on Smartphones

41. Financial Analysis of Network Upgrade

42. Magic-hand: Turn a smartwatch into a mouse

43. A general framework to design secure cloud storage protocol using homomorphic encryption scheme

44. A Reverse Auction Framework for Hybrid Access in Femtocell Network

45. Personalized user engagement modeling for mobile videos

46. SmartWriting: Pen-Holding Gesture Recognition with Smartwatch

47. TranGAN: Generative Adversarial Network Based Transfer Learning for Social Tie Prediction

48. VoicePop: A Pop Noise based Anti-spoofing System for Voice Authentication on Smartphones

49. Privacy-Preserving Collaborative Deep Learning with Unreliable Participants

50. Time Context-Aware IPTV Program Recommendation Based on Tensor Learning

Catalog

Books, media, physical & digital resources