On Covert Communication Performance With Outdated CSI in Wireless Greedy Relay Systems | 0 | 0.34 | 2022 |
CFHider: Protecting Control Flow Confidentiality With Intel SGX | 0 | 0.34 | 2022 |
Energy-Efficient and Secure Communication Toward UAV Networks | 0 | 0.34 | 2022 |
A blockchain-driven data exchange model in multi-domain IoT with controllability and parallelity | 0 | 0.34 | 2022 |
Online machine learning-based physical layer authentication for MmWave MIMO systems | 0 | 0.34 | 2022 |
Physical layer authentication in MIMO systems: a carrier frequency offset approach | 0 | 0.34 | 2022 |
Visibility graph entropy based radiometric feature for physical layer identification | 0 | 0.34 | 2022 |
CHChain: Secure and parallel crowdsourcing driven by hybrid blockchain | 0 | 0.34 | 2022 |
Enhancing Leakage Prevention for MapReduce | 0 | 0.34 | 2022 |
Buffer Space Management in Intermittently Connected Internet of Things: Sharing or Allocation? | 0 | 0.34 | 2022 |
Jamming and Link Selection for Joint Secrecy/Delay Guarantees in Buffer-Aided Relay System | 0 | 0.34 | 2022 |
Research on the Security of Visual Reasoning CAPTCHA | 0 | 0.34 | 2021 |
Optimal Mobile Crowdsensing Incentive Under Sensing Inaccuracy | 1 | 0.35 | 2021 |
Incentive Jamming-Based Secure Routing in Decentralized Internet of Things | 2 | 0.37 | 2021 |
Mobility-Aware Privacy-Preserving Mobile Crowdsourcing | 0 | 0.34 | 2021 |
Secure <inline-formula><tex-math notation="LaTeX">$k$</tex-math><alternatives><mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mi>k</mml:mi></mml:math><inline-graphic xlink:href="wang-ieq1-2707552.gif" xmlns:xlink="http://www.w3.org/1999/xlink"/></alternatives></inline-formula>-NN Query on Encrypted Cloud Data with Multiple Keys | 4 | 0.39 | 2021 |
Secure And Energy-Efficient Precoding For Mimo Two-Way Untrusted Relay Systems | 0 | 0.34 | 2021 |
Covert Rate Maximization in Wireless Full-Duplex Relaying Systems With Power Control | 1 | 0.35 | 2021 |
Exploiting Channel Gain And Phase Noise For Phy-Layer Authentication In Massive Mimo Systems | 1 | 0.35 | 2021 |
Decentralized Online Learning With Compressed Communication for Near-Sensor Data Analytics | 0 | 0.34 | 2021 |
Mobile Semantic-Aware Trajectory for Personalized Location Privacy Preservation | 0 | 0.34 | 2021 |
Dual-Target Cross-Domain Bundle Recommendation | 0 | 0.34 | 2021 |
Towards Flexible and Truthful Incentive for Multichannel Allocation in DSA | 0 | 0.34 | 2021 |
CryptSQLite: SQLite With High Data Security | 0 | 0.34 | 2020 |
Lightweight Tag-based PHY-layer Authentication for IoT Devices in Smart Cities | 3 | 0.36 | 2020 |
Physical Layer Authentication Jointly Utilizing Channel and Phase Noise in MIMO Systems | 6 | 0.45 | 2020 |
SF-sketch: A Two-stage Sketch for Data Streams | 1 | 0.36 | 2020 |
Collaborative online ranking algorithms for multitask learning | 0 | 0.34 | 2020 |
A Lightweight Auction Framework for Spectrum Allocation with Strong Security Guarantees | 0 | 0.34 | 2020 |
Decentralized and Secure Cross-Domain Data Sharing Scheme Based on Blockchain for Application-Centric IoT. | 0 | 0.34 | 2020 |
Target Privacy Preserving For Social Networks | 0 | 0.34 | 2020 |
GPS Spoofing Detector with Adaptive Trustable Residence Area for Cellular based-UAVs. | 0 | 0.34 | 2020 |
Covert Outage Analysis for Random Wireless Networks Under Warden Collusion | 0 | 0.34 | 2020 |
On Delay Performance Study for Cooperative Multicast MANETs | 0 | 0.34 | 2020 |
Strongly Secure and Efficient Range Queries in Cloud Databases under Multiple Keys | 1 | 0.36 | 2019 |
Reversible data hiding using the dynamic block-partition strategy and pixel-value-ordering | 0 | 0.34 | 2019 |
Packet delivery ratio and energy consumption in multicast delay tolerant MANETs with power control. | 1 | 0.37 | 2019 |
Diamond Sketch: Accurate Per-flow Measurement for Big Streaming Data | 1 | 0.35 | 2019 |
Cloud Computing Task Scheduling Based on Improved Differential Evolution Algorithm | 1 | 0.38 | 2019 |
Profit optimization in service-oriented data market: A Stackelberg game approach | 1 | 0.35 | 2019 |
Minimizing Traffic Migration During Network Update in IaaS Datacenters | 1 | 0.36 | 2019 |
Preserving Geo-Indistinguishability of the Primary User in Dynamic Spectrum Sharing | 3 | 0.38 | 2019 |
Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective. | 4 | 0.43 | 2019 |
Authenticated Key Agreement Scheme with Strong Anonymity for Multi-Server Environment in TMIS. | 2 | 0.36 | 2019 |
Embedding Service Function Tree With Minimum Cost for NFV-Enabled Multicast | 4 | 0.41 | 2019 |
CFHider: Control Flow Obfuscation with Intel SGX | 2 | 0.37 | 2019 |
AClog: Attack Chain Construction Based on Log Correlation | 0 | 0.34 | 2019 |
Fast OpenFlow Table Lookup with Fast Update. | 0 | 0.34 | 2018 |
Provoking the Adversary by Dual Detection Techniques: An Extended Stochastic Game Theoretical Framework | 0 | 0.34 | 2018 |
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications. | 1 | 0.36 | 2018 |