Search

Your search keyword '"Qu, Youyang"' showing total 322 results

Search Constraints

Start Over You searched for: Author "Qu, Youyang" Remove constraint Author: "Qu, Youyang"
322 results on '"Qu, Youyang"'

Search Results

1. From 5G to 6G: A Survey on Security, Privacy, and Standardization Pathways

2. A Model Inference Attack Based on Random Sampling in DLaaS

3. Federated Meta Continual Learning for Efficient and Autonomous Edge Inference

4. Mitigating Over-Unlearning in Machine Unlearning with Synthetic Data Augmentation

5. Federated Learning driven Large Language Models for Swarm Intelligence: A Survey

6. Decentralized Privacy Preservation for Critical Connections in Graphs

7. A Survey on the Real Power of ChatGPT

8. Privacy at a Price: Exploring its Dual Impact on AI Fairness

9. The Frontier of Data Erasure: Machine Unlearning for Large Language Models

10. Data and Model Poisoning Backdoor Attacks on Wireless Federated Learning, and the Defense Mechanisms: A Comprehensive Survey

11. Towards Blockchain-Assisted Privacy-Aware Data Sharing For Edge Intelligence: A Smart Healthcare Perspective

12. Learn to Unlearn: A Survey on Machine Unlearning

13. A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

14. A Survey on Edge Intelligence for Music Composition: Principles, Applications, and Privacy Implications

15. AI-Driven Sentiment Analysis for Music Composition

17. An Efficient and Reliable Asynchronous Federated Learning Scheme for Smart Public Transportation

19. Blockchain-based Digital Twin for Supply Chain Management: State-of-the-Art Review and Future Research Directions

22. Asynchronous Federated Learning on Heterogeneous Devices: A Survey

23. Future Research Directions

24. Hybrid Privacy Protection of IoT Using Reinforcement Learning

25. Current Methods of Privacy Protection in IoTs

26. Personalized Privacy Protection of IoTs Using GAN-Enhanced Differential Privacy

27. Decentralized Privacy Protection of IoTs Using Blockchain-Enabled Federated Learning

28. Introduction

34. Summary and Outlook

35. Survey on Bridge Discovery in Tor

36. Dual Scheme Privacy-Preserving Approach for Location-Aware Application in Edge Computing

38. Existing Privacy Protection Solutions

40. Future Research Directions

41. Introduction

42. An Introduction to Edge Computing

46. Privacy Issues in Edge Computing

49. Summary and Outlook

Catalog

Books, media, physical & digital resources