UM

Browse/Search Results:  1-10 of 20 Help

Selected(0)Clear Items/Page:    Sort:
Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture Journal article
Wu, Haiqin, Düdder, Boris, Wang, Liangmin, Cao, Zhenfu, Zhou, Jun, Feng, Xia. Survey on Secure Keyword Search over Outsourced Data: From Cloud to Blockchain-assisted Architecture[J]. ACM Computing Surveys, 2024, 56(3), 63.
Authors:  Wu, Haiqin;  Düdder, Boris;  Wang, Liangmin;  Cao, Zhenfu;  Zhou, Jun; et al.
Favorite | TC[WOS]:1 TC[Scopus]:1  IF:23.8/21.1 | Submit date:2024/01/10
Outsourced Keyword Search  Searchable Encryption  Cloud Security  Blockchain  Verifiability  
Open set dandelion network for IoT intrusion detection Journal article
Wu, Jiashu, Dai, Hao, Kent, Kenneth B., Yen, Jerome, Xu, Chengzhong, Wang, Yang. Open set dandelion network for IoT intrusion detection[J]. ACM Transactions on Internet Technology, 2024, 24(1), 1-26.
Authors:  Wu, Jiashu;  Dai, Hao;  Kent, Kenneth B.;  Yen, Jerome;  Xu, Chengzhong; et al.
Favorite | TC[WOS]:0 TC[Scopus]:0  IF:3.9/3.6 | Submit date:2024/03/07
Domain Adaptation  Internet Of Things  Intrusion Detection  Open-set Domain Adaptation  Dandelion Network  
Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images Journal article
Liu, Xingyu, Hua, Zhongyun, Yi, Shuang, Zhang, Yushu, Zhou, Yicong. Bi-directional Block Encoding for Reversible Data Hiding over Encrypted Images[J]. ACM Transactions on Multimedia Computing Communications and Applications, 2024, 20(5), 149.
Authors:  Liu, Xingyu;  Hua, Zhongyun;  Yi, Shuang;  Zhang, Yushu;  Zhou, Yicong
Favorite | TC[WOS]:1 TC[Scopus]:2  IF:5.2/4.9 | Submit date:2024/03/07
Image Encoding  Reversible Data Hiding  Encrypted Image  
Optimization-Free Test-Time Adaptation for Cross-Person Activity Recognition Journal article
Wang, Shuoyuan, Wang, Jindong, Xi, Huajun, Zhang, Bob, Zhang, Lei, Wei, Hongxin. Optimization-Free Test-Time Adaptation for Cross-Person Activity Recognition[J]. PROCEEDINGS OF THE ACM ON INTERACTIVE MOBILE WEARABLE AND UBIQUITOUS TECHNOLOGIES-IMWUT, 2024, 7(4), 183.
Authors:  Wang, Shuoyuan;  Wang, Jindong;  Xi, Huajun;  Zhang, Bob;  Zhang, Lei; et al.
Favorite | TC[WOS]:0 TC[Scopus]:1 | Submit date:2024/02/22
Human Activity Recognition  Test-time Adaptation  Transfer Learning  Sensors  
Learning with Euler Collaborative Representation for Robust Pattern Analysis Journal article
Zhou, Jianhang, Wang, Guancheng, Zeng, Shaoning, Zhang, Bob. Learning with Euler Collaborative Representation for Robust Pattern Analysis[J]. ACM Transactions on Intelligent Systems and Technology, 2023, 14(6).
Authors:  Zhou, Jianhang;  Wang, Guancheng;  Zeng, Shaoning;  Zhang, Bob
Favorite | TC[WOS]:0 TC[Scopus]:1  IF:7.2/8.5 | Submit date:2024/01/10
Euler Space  Collaborative Representation  Pattern Analysis  Robustness  
Resisting the Edge-Type Disturbance for Link Prediction in Heterogeneous Networks Journal article
Wang, Huan, Liu, Ruigang, Shi, Chuanqi, Chen, Junyang, Fang, Lei, Liu, Shun, Gong, Zhiguo. Resisting the Edge-Type Disturbance for Link Prediction in Heterogeneous Networks[J]. ACM Transactions on Knowledge Discovery from Data, 2023, 18(2).
Authors:  Wang, Huan;  Liu, Ruigang;  Shi, Chuanqi;  Chen, Junyang;  Fang, Lei; et al.
Favorite | TC[WOS]:1 TC[Scopus]:3  IF:4.0/3.9 | Submit date:2024/01/10
Edge-type Disturbance  Heterogeneous Network  Link Prediction  
Social Network Analytic-Based Online Counterfeit Seller Detection using User Shared Images Journal article
Cheung, Ming, Sun, Weiwei, She, James, Zhou, Jiantao. Social Network Analytic-Based Online Counterfeit Seller Detection using User Shared Images[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2023, 19(1).
Authors:  Cheung, Ming;  Sun, Weiwei;  She, James;  Zhou, Jiantao
Favorite | TC[WOS]:2 TC[Scopus]:0  IF:5.2/4.9 | Submit date:2023/08/03
Counterfeit Seller Detection  Deep Learning  Social Network Analytic  
esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments Journal article
Xu, Minxian, Song, Chenghao, Wu, Huaming, Gill, Sukhpal Singh, Ye, Kejiang, Xu, Chengzhong. esDNN: Deep Neural Network Based Multivariate Workload Prediction in Cloud Computing Environments[J]. ACM Transactions on Internet Technology, 2022, 22(3), 75.
Authors:  Xu, Minxian;  Song, Chenghao;  Wu, Huaming;  Gill, Sukhpal Singh;  Ye, Kejiang; et al.
Favorite | TC[WOS]:40 TC[Scopus]:64  IF:3.9/3.6 | Submit date:2023/01/30
Auto-scaling  Cloud Computing  Gate Recurrent Unit  Supervised Learning  Workloads Prediction  
Domain-invariant Graph for Adaptive Semi-supervised Domain Adaptation Journal article
Li, Jinfeng, Liu, Weifeng, Zhou, Yicong, Yu, Jun, Tao, Dapeng, Xu, Changsheng. Domain-invariant Graph for Adaptive Semi-supervised Domain Adaptation[J]. ACM Transactions on Multimedia Computing Communications and Applications, 2022, 18(3), 1–18.
Authors:  Li, Jinfeng;  Liu, Weifeng;  Zhou, Yicong;  Yu, Jun;  Tao, Dapeng; et al.
Favorite | TC[WOS]:18 TC[Scopus]:6  IF:5.2/4.9 | Submit date:2022/05/13
Domain Adaptation  Domain-invariant Graph  Few Labeled Source Samples  The Nyström Method  
An explainable framework for diagnosis of COVID-19 pneumonia via transfer learning and discriminant correlation analysis Journal article
Lu, Siyuan, Wu, Di, Zhang, Zheng, Wang, Shui Hua. An explainable framework for diagnosis of COVID-19 pneumonia via transfer learning and discriminant correlation analysis[J]. ACM Transactions on Multimedia Computing Communications and Applications, 2021, 17(3s), 3449785.
Authors:  Lu, Siyuan;  Wu, Di;  Zhang, Zheng;  Wang, Shui Hua
Favorite | TC[WOS]:8 TC[Scopus]:8  IF:5.2/4.9 | Submit date:2022/05/13
Computed Tomography  Covid-19  Extreme Learning Machine  Random Vector Functional-link Net  Randomized Neural Network  Resnet  Schmidt Neural Network