387 results on '"LIBING WU"'
Search Results
52. Fault-tolerant control for nonlinear switched systems with unknown control coefficients and full-state constraints.
53. Traffic Signal Control With Reinforcement Learning Based on Region-Aware Cooperative Strategy.
54. Dynamic analysis of a SIQR epidemic model considering the interaction of environmental differences.
55. A Secure and Efficient Multiserver Authentication and Key Agreement Protocol for Internet of Vehicles.
56. Privacy-Preserving Data Scheduling in Incentive-Driven Vehicular Network.
57. Data Dissemination With Trajectory Privacy Protection for 6G-Oriented Vehicular Networks.
58. A cooperative mobility model for multiple autonomous vehicles.
59. Distributed Output-Feedback Adaptive Fuzzy Leader-Following Consensus of Stochastic Nonlinear Interconnected Multiagent Systems.
60. G-VCFL: Grouped Verifiable Chained Privacy-Preserving Federated Learning.
61. Dual-Server Public-Key Authenticated Encryption with Keyword Search.
62. Task Offloading with Task Classification and Offloading Nodes Selection for MEC-Enabled IoV.
63. Output to state description-based convergent fault tolerant control for linear systems with actuator faults.
64. Everyone in SDN Contributes: Fault Localization via Well-Designed Rules.
65. DynSTGAT: Dynamic Spatial-Temporal Graph Attention Network for Traffic Signal Control.
66. BRNN-GAN: Generative Adversarial Networks with Bi-directional Recurrent Neural Networks for Multivariate Time Series Imputation.
67. A Multi-objective Reinforcement Learning Perspective on Internet Congestion Control.
68. Salience-CAM: Visual Explanations from Convolutional Neural Networks via Salience Score.
69. TSA-GAN: A Robust Generative Adversarial Networks for Time Series Augmentation.
70. DEN-DQL: Quick Convergent Deep Q-Learning with Double Exploration Networks for News Recommendation.
71. A Spatial-Temporal Graph Attention Network for Multi-intersection Traffic Light Control.
72. RLCC: Practical Learning-based Congestion Control for the Internet.
73. Privacy-Aware Key Task Scheduling in Vehicular Networks Based on Incentive Mechanism.
74. Loop2Recursion: Compiler-Assisted Wear Leveling for Non-Volatile Memory.
75. Finite-time adaptive event-triggered fault-tolerant control of nonlinear systems based on fuzzy observer.
76. Deep Reinforcement Learning for Smart City Communication Networks.
77. An Efficient and Privacy-Preserving Outsourced Support Vector Machine Training for Internet of Medical Things.
78. An edge computing based data detection scheme for traffic light at intersections.
79. Lightweight Searchable Public-Key Encryption with Forward Privacy over IIoT Outsourced Data.
80. Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid.
81. A Comprehensive Survey of the Key Technologies and Challenges Surrounding Vehicular Ad Hoc Networks.
82. SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks.
83. Adaptive fault-tolerant consensus control of multi-agent systems with event-triggered inputs.
84. Completing point cloud from few points by Wasserstein GAN and Transformers.
85. Classification Method of Encrypted Traffic Based on Deep Neural Network.
86. A New Proposed Sensor Cloud Architecture Based on Fog Computing for Internet of Things.
87. Fast Distributed Backbone Construction Despite Strong Adversarial Jamming.
88. A Capsule Network for Recommendation and Explaining What You Like and Dislike.
89. LVID: A Multimodal Biometrics Authentication System on Smartphones.
90. ForeXGBoost: passenger car sales prediction based on XGBoost.
91. Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure.
92. Cluster-Enabled Cooperative Scheduling Based on Reinforcement Learning for High-Mobility Vehicular Networks.
93. A Blockchain-Based Searchable Public-Key Encryption With Forward and Backward Privacy for Cloud-Assisted Vehicular Social Networks.
94. PARL: Let Strangers Speak Out What You Like.
95. InPrivate Digging: Enabling Tree-based Distributed Data Mining with Differential Privacy.
96. Secure Key Agreement and Key Protection for Mobile Device User Authentication.
97. Certificateless searchable public key authenticated encryption with designated tester for cloud-assisted medical Internet of Things.
98. A Context-Aware User-Item Representation Learning for Item Recommendation.
99. Anonymous and Efficient Message Authentication Scheme for Smart Grid.
100. Pairing-Free Identity-Based Encryption with Authorized Equality Test in Online Social Networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.