Towards Automated Assessment of Vulnerability Exposures in Security Operations | 0 | 0.34 | 2021 |
A Distributed Ledger for Non-attributable Cyber Threat Intelligence Exchange | 1 | 0.36 | 2021 |
Towards Uniform Point Density: Evaluation of an Adaptive Terrestrial Laser Scanner. | 0 | 0.34 | 2019 |
Optimal Data Collection of MP-MR-MC Wireless Sensors Network for Structural Monitoring. | 0 | 0.34 | 2018 |
Process Modeling and Monitoring With Incomplete Data Based on Robust Probabilistic Partial Least Square Method. | 0 | 0.34 | 2018 |
Privacy-Preserving Outsourcing of Large-Scale Nonlinear Programming to the Cloud. | 0 | 0.34 | 2018 |
PoliteCamera: Respecting Strangers' Privacy in Mobile Photographing. | 1 | 0.35 | 2018 |
Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric Programming | 0 | 0.34 | 2018 |
Privacy-Preserving Multiparty Learning For Logistic Regression. | 0 | 0.34 | 2018 |
Hiding Critical Targets in Smart Grid Networks | 0 | 0.34 | 2018 |
PhotoSafer: Content-Based and Context-Aware Private Photo Protection for Smartphones | 0 | 0.34 | 2018 |
Inferring Mobile Apps from Resource Usage Patterns | 0 | 0.34 | 2017 |
Secure and efficient outsourcing of large-scale nonlinear programming | 1 | 0.36 | 2017 |
Dual-channel supply chain decisions under asymmetric information with a risk-averse retailer | 8 | 0.53 | 2017 |
Access Control for Distributed Processing Systems: Use Cases and General Considerations | 0 | 0.34 | 2017 |
Deep learning-based data forgery detection in automatic generation control. | 0 | 0.34 | 2017 |
Discover Patterns and Mobility of Twitter Users - A Study of Four US College Cities. | 4 | 0.43 | 2017 |
Privacy Disclosure through Smart Meters: Reactive Power Based Attack and Defense | 1 | 0.35 | 2017 |
Note on stratified L-ordered convergence structures. | 0 | 0.34 | 2016 |
Cognitive networking for next-G wireless communications | 0 | 0.34 | 2016 |
PPM-HDA: Privacy-Preserving and Multifunctional Health Data Aggregation With Fault Tolerance. | 12 | 0.57 | 2016 |
Decomposing Lidar Waveforms With Nonparametric Classification Methods | 0 | 0.34 | 2016 |
PrivacyCamera: Cooperative Privacy-Aware Photographing with Mobile Phones | 5 | 0.39 | 2016 |
A Fuzzy Mean-Shift Approach to Lidar Waveform Decomposition. | 2 | 0.36 | 2016 |
Providing Privacy-Aware Incentives in Mobile Sensing Systems. | 12 | 0.66 | 2016 |
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation, Elimination and Exploitation | 5 | 0.41 | 2015 |
The effects of flooding attacks on time-critical communications in the smart grid | 1 | 0.35 | 2015 |
Privacy-preserving participatory sensing. | 6 | 0.44 | 2015 |
Privacy-aware and trustworthy data aggregation in mobile sensing | 2 | 0.38 | 2015 |
A novel attack to spatial cloaking schemes in location-based services | 13 | 0.60 | 2015 |
Cell Detection In High Frequency Band Small Cell Networks | 2 | 0.38 | 2015 |
Enhancing Privacy Through Caching In Location-Based Services | 31 | 0.84 | 2015 |
Achieving k-anonymity in privacy-aware location-based services | 84 | 2.35 | 2014 |
Forwarding redundancy in opportunistic mobile networks: Investigation and elimination | 11 | 0.59 | 2014 |
Fast reference governors for second-order linear systems with constraints and an input time-delay. | 1 | 0.37 | 2014 |
A Novel Sink Mobility Off-Line Algorithm For Avoiding Energy Hole In Wireless Sensor Network | 0 | 0.34 | 2014 |
A fine-grained spatial cloaking scheme for privacy-aware users in Location-Based Services | 8 | 0.50 | 2014 |
Efficient and Privacy-Aware Data Aggregation in Mobile Sensing | 35 | 1.13 | 2014 |
Providing Efficient Privacy-Aware Incentives for Mobile Sensing | 34 | 0.98 | 2014 |
Concurrent PLS-based process monitoring with incomplete input and quality measurements. | 0 | 0.34 | 2014 |
Minimum description length constrained LiDAR waveform decomposition | 0 | 0.34 | 2014 |
Online Fault Detection Of Hrg Based On An Improved Support Vector Machine | 0 | 0.34 | 2013 |
Efficient Privacy-Preserving Stream Aggregation in Mobile Sensing with Low Aggregation Error. | 13 | 0.63 | 2013 |
Autonomous integrated navigation for indoor robots utilizing on-line iterated extended rauch-tung-striebel smoothing | 2 | 0.45 | 2013 |
Wakeup Scheduling For Energy-Efficient Communication In Opportunistic Mobile Networks | 19 | 0.75 | 2013 |
Reference governor for second order constrained linear systems with small input time delays | 0 | 0.34 | 2013 |
Practical downlink transmission schemes for future LTE systems with many base-station antennas. | 3 | 0.67 | 2013 |
To Lie or to Comply: Defending against Flood Attacks in Disruption Tolerant Networks | 11 | 0.56 | 2013 |
iHEMS: An information-centric approach to secure home energy management | 16 | 1.15 | 2012 |
Efficient and privacy-preserving data aggregation in mobile sensing | 12 | 0.56 | 2012 |