DNN Real-Time Collaborative Inference Acceleration with Mobile Edge Computing | 0 | 0.34 | 2022 |
Using honeypots to model botnet attacks on the internet of medical things | 0 | 0.34 | 2022 |
You are what the permissions told me! Android malware detection based on hybrid tactics | 0 | 0.34 | 2022 |
POI Alias Discovery in Delivery Addresses using User Locations | 0 | 0.34 | 2021 |
FedSteg: A Federated Transfer Learning Framework for Secure Image Steganalysis | 4 | 0.41 | 2021 |
Node-Fusion: Topology-Aware Virtual Network Embedding Algorithm For Repeatable Virtual Network Mapping Over Substrate Nodes | 0 | 0.34 | 2021 |
Quality Of Service (Qos): Measurements Of Image Formats In Social Cloud Computing | 0 | 0.34 | 2021 |
An Evolutionary Study of IoT Malware | 1 | 0.35 | 2021 |
Joint Computation Offloading And Task Caching For Multi-User And Multi-Task Mec Systems: Reinforcement Learning-Based Algorithms | 9 | 0.49 | 2021 |
Optimal Priority Assignment For Messages On Controller Area Network With Maximum System Robustness | 0 | 0.34 | 2021 |
MHCNC: A Novel Framework for Multi-Source Heterogeneous Cross-Network Node Classification | 0 | 0.34 | 2021 |
An IoT Honeynet based on Multi-port Honeypots for Capturing IoT attacks | 1 | 0.35 | 2020 |
Multi-metric domain adaptation for unsupervised transfer learning | 0 | 0.34 | 2020 |
Trustworthy Enhancement for Cloud Proxy based on Autonomic Computing | 0 | 0.34 | 2020 |
What is the Human Mobility in a New City: Transfer Mobility Knowledge Across Cities | 0 | 0.34 | 2020 |
Interactive Bike Lane Planning using Sharing Bikes' Trajectories | 1 | 0.35 | 2020 |
DAMBA: Detecting Android Malware by ORGB Analysis | 2 | 0.36 | 2020 |
Homopal: A Secure Collaborative Machine Learning Platform Based On Homomorphic Encryption | 0 | 0.34 | 2020 |
Measurement of Objective Video Quality in Social Cloud Based on Reference Metric | 1 | 0.36 | 2020 |
Efficient and Secure Multi-User Multi-Task Computation Offloading for Mobile-Edge Computing in Mobile IoT Networks | 10 | 0.49 | 2020 |
Algorithm of web page similarity comparison based on visual block. | 0 | 0.34 | 2019 |
Linear and dynamic programming algorithms for real-time task scheduling with task duplication. | 2 | 0.38 | 2019 |
Performance modeling for MPI applications with low overhead fine-grained profiling. | 1 | 0.34 | 2019 |
Demadroid: Object Reference Graph-Based Malware Detection in Android. | 2 | 0.45 | 2018 |
Quality of Experience Assessment of Video Quality in Social Clouds. | 2 | 0.67 | 2017 |
Rate control optimization for live streaming using fixed-time playback buffer | 0 | 0.34 | 2017 |
Distributed proxy cache technology based on autonomic computing in smart cities. | 1 | 0.38 | 2017 |
Network-aware virtual machine migration in an overcommitted cloud. | 6 | 0.45 | 2017 |
Bitrate allocation among multiple video streams to maximize profit in content delivery networks. | 0 | 0.34 | 2016 |
Sentiment classification technology based on Markov logic networks. | 3 | 0.45 | 2016 |
Exploring large-scale small file storage for search engines | 6 | 0.60 | 2016 |
Xen-based virtual honeypot system for smart device | 0 | 0.34 | 2015 |
Dynamic load balancing technology for cloud-oriented CDN. | 1 | 0.40 | 2015 |
Solving Energy-Aware Real-Time Tasks Scheduling Problem with Shuffled Frog Leaping Algorithm on Heterogeneous Platforms | 8 | 0.53 | 2015 |
Phoneprotector: Protecting User Privacy On The Android-Based Mobile Platform | 11 | 0.65 | 2014 |
Identifying and evaluating the internet opinion leader community based on k-clique clustering | 7 | 0.55 | 2014 |
The Measurement and Analysis of KAD Network | 0 | 0.34 | 2012 |
A Novel Cache Replacement Policy for ISP Merged CDN | 0 | 0.34 | 2012 |
A Content Delivery Strategy Based On Resource Popularity For P4p Architecture | 0 | 0.34 | 2012 |
Formalization and Quantitative Analysis of Controllability on Internet Information Security. | 0 | 0.34 | 2010 |
Clustering of Network Link Characteristic for Detector Placement of Macroscopical Prewarning | 1 | 0.36 | 2006 |
A new method of priority assignment for real-time flows in the wirelessHART network by the TDMA protocol | 0 | 0.34 | 0 |