Search

Your search keyword '"Xuehui Du"' showing total 191 results

Search Constraints

Start Over You searched for: Author "Xuehui Du" Remove constraint Author: "Xuehui Du"
191 results on '"Xuehui Du"'

Search Results

1. An image partition security-sharing mechanism based on blockchain and chaotic encryption.

2. Adversarial robustness in deep neural networks based on variable attributes of the stochastic ensemble model

3. A Near Real-Time Big Data Provenance Generation Method Based on the Conjoint Analysis of Heterogeneous Logs

4. Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines

5. A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model

6. Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition

7. Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation

8. Building a Cloud IDS Using an Efficient Feature Selection Method and SVM

9. Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network

10. Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection

11. HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony

12. Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing

13. A quality-of-service-aware dynamic evolution model for space–ground integrated network

29. A cross-domain access control mechanism based on model migration and semantic reasoning.

40. Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure.

44. An adversarial transferability metric based on SVD of Jacobians to disentangle the correlation with robustness

48. Cloud Intrusion Detection Method Based on Stacked Contractive Auto-Encoder and Support Vector Machine

Catalog

Books, media, physical & digital resources