ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism | 0 | 0.34 | 2021 |
GADM: Manual Fake Review Detection for O2O Commercial Platforms | 1 | 0.36 | 2020 |
Ursa: Robust Performance for Nakamoto Consensus with Self-adaptive Throughput | 0 | 0.34 | 2020 |
Revealing Your Mobile Password via WiFi Signals: Attacks and Countermeasures. | 1 | 0.35 | 2020 |
WiFind: Driver Fatigue Detection with Fine-Grained Wi-Fi Signal Features. | 1 | 0.36 | 2020 |
Time-sync Video Tag Extraction Using Semantic Association Graph | 1 | 0.36 | 2019 |
Fraudjudger: Fraud Detection On Digital Payment Platforms With Fewer Labels | 0 | 0.34 | 2019 |
SpamTracer - Manual Fake Review Detection for O2O Commercial Platforms by Using Geolocation Features. | 0 | 0.34 | 2018 |
SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud. | 4 | 0.49 | 2017 |
Detect Sip Flooding Attacks In Volte By Utilizing And Compressing Counting Bloom Filter | 0 | 0.34 | 2017 |
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals. | 33 | 0.83 | 2016 |
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs. | 3 | 0.41 | 2012 |
Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. | 0 | 0.34 | 2012 |
A generic evaluation method for key management schemes in wireless sensor network | 4 | 0.43 | 2011 |