Blockchain-Based Edge Computing Data Storage Protocol Under Simplified Group Signature | 0 | 0.34 | 2022 |
Single Image Dehazing Algorithm Based On Double Exponential Attenuation Model | 0 | 0.34 | 2021 |
MousePath: Enhancing PC Web Pages through Smartphone and Optical Mouse | 0 | 0.34 | 2021 |
Distributed Iot Monitoring Model Using Multi-Core Sensing Function Integration | 0 | 0.34 | 2021 |
Demo: Using Smartphone And Optical Mouse To Enhance Web Interaction | 0 | 0.34 | 2021 |
A Blockchain-Enabled Multi-Settlement Quasi-Ideal Peer-to-Peer Trading Framework | 4 | 0.42 | 2021 |
Identity-Based Verifiable Aggregator Oblivious Encryption and Its Applications in Smart Grids | 0 | 0.34 | 2021 |
ShuffleFL: gradient-preserving federated learning using trusted execution environment | 1 | 0.35 | 2021 |
Two-Stage WECC Composite Load Modeling: A Double Deep Q-Learning Networks Approach | 1 | 0.41 | 2020 |
Method for determining weight matrix for resolving three-dimensional surface deformation using Multi-LOS D-InSAR technology. | 0 | 0.34 | 2020 |
A Path Planning Method For Overhead Crane Based on Spatial Stratification | 0 | 0.34 | 2020 |
Haze Removal: Push Dcp At The Edge | 0 | 0.34 | 2020 |
An ID-Based Linear Homomorphic Cryptosystem and Its Applications for the Isolated Smart Grid Devices. | 0 | 0.34 | 2019 |
Incentive and Unconditionally Anonymous Identity-Based Public Provable Data Possession | 9 | 0.46 | 2019 |
Chaotic Dynamics in Asymmetric Rock-Paper-Scissors Games. | 0 | 0.34 | 2019 |
Thermostatic Load Control for System Frequency Regulation Considering Daily Demand Profile and Progressive Recovery | 2 | 0.37 | 2019 |
Reinforcement-Learning-Based Optimal Control of Hybrid Energy Storage Systems in Hybrid AC–DC Microgrids | 3 | 0.39 | 2019 |
Power Flow Analysis Using Graph Based Combination Of Iterative Methods And Vertex Contraction Approach | 0 | 0.34 | 2018 |
A Distributed Cooperative Control Framework For Synchronized Reconnection Of A Multi-Bus Microgrid | 2 | 0.38 | 2018 |
An Identity-Based Data Aggregation Protocol for the Smart Grid. | 4 | 0.42 | 2017 |
CP-ABE with outsourced decryption and directionally hidden policy. | 0 | 0.34 | 2016 |
Leakage Resilient Cca Secure Ibe With All-But-One Lossy Filter | 0 | 0.34 | 2016 |
CP-ABE with hidden policy from Waters efficient construction | 1 | 0.35 | 2016 |
Improvement on the fault-tolerant group key agreement protocol of Zhao et al. | 2 | 0.37 | 2016 |
Attribute-Based Encryption Resilient to Auxiliary Input. | 4 | 0.39 | 2015 |
Attribute-Based Online/Offline Encryption in Smart Grid | 1 | 0.35 | 2015 |
CCA Secure PKE with Auxiliary Input Security and Leakage Resiliency | 0 | 0.34 | 2015 |
Continuous section extraction and over-underbreak detection of tunnel based on 3D laser technology and image analysis | 0 | 0.34 | 2015 |
Fuzzy games with communication networks | 0 | 0.34 | 2014 |
A multi-channel allocation method for clustered wireless sensor networks. | 1 | 0.35 | 2013 |
Improved group key transfer protocols from the protocol of Harn et al. | 1 | 0.36 | 2013 |
Provably secure certificate-based signature scheme without pairings | 13 | 0.61 | 2013 |
A new authenticated group key transfer protocol for actual network environment | 1 | 0.37 | 2013 |
Short signature from factoring assumption in the standard model. | 0 | 0.34 | 2012 |
Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme. | 4 | 0.42 | 2012 |
A new construction of the server-aided verification signature scheme | 1 | 0.53 | 2012 |
Analysis of parametric vibration of cylindrical shells considering material viscous damping. | 0 | 0.34 | 2011 |
A neural network based model for VoIP speech quality prediction | 1 | 0.38 | 2009 |
A New Construction of Multivariate Public Key Encryption Scheme through Internally Perturbed Plus | 1 | 0.36 | 2008 |
A simple self-adaptive alternating direction method for linear variational inequality problems | 2 | 0.50 | 2007 |