208 results on '"Guan, Zhenyu"'
Search Results
52. Lightweight and Manageable Digital Evidence Preservation System on Bitcoin
53. PUF-Based Lightweight Authentication Framework for Large-Scale IoT Devices in Distributed Cloud
54. Distributed Audit System of SDN Controller Based on Blockchain
55. A Wearable Ad Hoc Device for Situational Awareness and Trusted Collaboration
56. ARMOR: Differential Model Distribution for Adversarially Robust Federated Learning
57. Lightweight and Privacy-Preserving Charging Reservation Authentication Protocol for 5G-V2G
58. DeepMIH: Deep Invertible Network for Multiple Image Hiding
59. New Finding and Unified Framework for Fake Image Detection
60. Privacy-preserving Cross-silo Federated Learning atop Blockchain for IoT
61. A Flexible Sharding Blockchain Protocol Based on Cross-Shard Byzantine Fault Tolerance
62. Intelligent and Fair IoV Charging Service Based on Blockchain With Cross-Area Consensus
63. TaP2-CSS: A Trustworthy and Privacy-Preserving Cooperative Spectrum Sensing Solution Based On Blockchain
64. A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism
65. A lightweight and collapse-response-resistant PUF using obfuscation-feedback-shift-register
66. Extremely Lightweight PUF-based Batch Authentication Protocol for End-Edge-Cloud Hierarchical Smart Grid
67. Hierarchical Bayesian LSTM for Head Trajectory Prediction on Omnidirectional Images
68. A Lightweight and Machine-Learning-Resistant PUF Using Obfuscation-Feedback-Shift-Register
69. CPAKA: Mutual Authentication and Key Agreement Scheme Based on Conditional PUF in Space-Air-Ground Integrated Network
70. Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain
71. A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading Mechanism
72. AutoHoG: Automating Homomorphic Gate Design for Large-Scale Logic Circuit Evaluation
73. Diel Variation of Phytoplankton Communities in the Northern South China Sea under the Effect of Internal Solitary Waves and Its Response to Environmental Factors.
74. A DP Canopy K-Means Algorithm for Privacy Preservation of Hadoop Platform
75. NTIRE 2022 Challenge on Stereo Image Super-Resolution: Methods and Results
76. Remote Audit Scheme of Embedded Device Software Based on TPM
77. Wireless Resource Allocation based on Multiplexing and Isolation in Sliced 5G Networks
78. Presswork defect inspection using only defect-free high-resolution images
79. Revocable Attribute-Based Data Storage in Mobile Clouds
80. Decentralized IoT Resource Monitoring and Scheduling Framework Based on Blockchain
81. Achieving Fine-grained Data Sharing for Hierarchical Organizations in Clouds
82. Community Assembly and Co-Occurrence Network Complexity of Pelagic Ciliates in Response to Environmental Heterogeneity Affected by Sea-Ice Melting in Ross Sea, Antarctica
83. A Scalable Security Protocol for Intravehicular Controller Area Network
84. Research on the seam tracking of narrow gap P-GMAW based on arc sound sensing
85. A TDOA-Assisted Direct Position Determination for Efficient Geolocalization Using LEO Satellites
86. A Filter Rank Based Pruning Method for Convolutional Neural Networks
87. HiNet: Deep Image Hiding by Invertible Network
88. Secure Vehicle Platooning Protocol for 5G C-V2X
89. A PUF-based Lightweight Authenticated Metering Data Collection Scheme with Privacy Protection in Smart Grid
90. A Blockchain-based Verified Locating Scheme for IoT Devices
91. SRAM-PUF Based Lightweight Mutual Authentication Scheme for IoT
92. Unified Authentication Scheme for IoT Blockchain Based on PUF
93. Off-chain Anonymous Payment Channel Scheme based on Mimblewimble
94. A Blockchain-based Framework for Information Management in Internet of Vehicles
95. MFQE 2.0: A New Approach for Multi-Frame Quality Enhancement on Compressed Video
96. Achieving Fine-Grained Data Sharing for Hierarchical Organizations in Clouds
97. Deeply understanding graph-based Sybil detection techniques via empirical analysis on graph processing
98. Blockchain: A distributed solution to UAV‐enabled mobile edge computing
99. Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
100. TBDCT: A Framework of Trusted Big Data Collection and Trade System Based on Blockchain and TSM
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.