Found: 30
Select item for more details and to access through your institution.
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks.
- Published in:
- Security & Communication Networks, 2021, p. 1, doi. 10.1155/2021/5317062
- By:
- Publication type:
- Article
Detecting VMs Co-residency in the Cloud: Using Cache-based Side Channel Attacks.
- Published in:
- Electronics & Electrical Engineering, 2013, v. 19, n. 5, p. 73, doi. 10.5755/j01.eee.19.5.2422
- By:
- Publication type:
- Article
Dynamic Recommendation Trust Model Based on Information Entropy and Heuristic Rules in E-Commerce Environment.
- Published in:
- Electronics & Electrical Engineering, 2013, v. 19, n. 4, p. 71, doi. 10.5755/j01.eee.19.4.4057
- By:
- Publication type:
- Article
Social Relation Predictive Model of Mobile Nodes in Internet of Things.
- Published in:
- Electronics & Electrical Engineering, 2013, v. 19, n. 4, p. 81, doi. 10.5755/j01.eee.19.4.1591
- By:
- Publication type:
- Article
Geographic Community-based Mobility Model.
- Published in:
- Electronics & Electrical Engineering, 2012, v. 18, n. 9, p. 87, doi. 10.5755/j01.eee.18.9.2815
- By:
- Publication type:
- Article
A Hybrid Natural Language Information Hiding System.
- Published in:
- Electronics & Electrical Engineering, 2012, v. 18, n. 9, p. 95, doi. 10.5755/j01.eee.18.9.2817
- By:
- Publication type:
- Article
Adaptive-Weighted Multiview Deep Basis Matrix Factorization for Multimedia Data Analysis.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/5526479
- By:
- Publication type:
- Article
A DCT-based privacy-preserving approach for efficient data mining.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 18, p. 3641, doi. 10.1002/sec.1287
- By:
- Publication type:
- Article
Study of Privacy-preserving Framework for Cloud Storage.
- Published in:
- Computer Science & Information Systems, 2011, v. 8, n. 3, p. 801, doi. 10.2298/CSIS100327029R
- By:
- Publication type:
- Article
A Bi-Target Based Mobile Relay Selection Algorithm for MCNs.
- Published in:
- KSII Transactions on Internet & Information Systems, 2017, v. 11, n. 11, p. 5282, doi. 10.3837/tiis.2017.11.006
- By:
- Publication type:
- Article
A Framework for measuring query privacy in Location-based Service.
- Published in:
- KSII Transactions on Internet & Information Systems, 2015, v. 9, n. 5, p. 1717, doi. 10.3837/tiis.2015.05.009
- By:
- Publication type:
- Article
TDSRC: A Task-Distributing System of Crowdsourcing Based on Social Relation Cognition.
- Published in:
- Mobile Information Systems, 2019, p. 1, doi. 10.1155/2019/7413460
- By:
- Publication type:
- Article
Adaptive secure multicast in wireless networks.
- Published in:
- International Journal of Communication Systems, 2009, v. 22, n. 9, p. 1213, doi. 10.1002/dac.1023
- By:
- Publication type:
- Article
Improving WSN Base Station Survivability with Rejuvenation Technology.
- Published in:
- International Journal of Distributed Sensor Networks, 2009, v. 5, n. 1, p. 77, doi. 10.1080/15501320802561708
- By:
- Publication type:
- Article
A Node Selection Paradigm for Crowdsourcing Service Based on Region Feature in Crowd Sensing.
- Published in:
- Mathematical Problems in Engineering, 2018, p. 1, doi. 10.1155/2018/6434083
- By:
- Publication type:
- Article
Protecting location privacy for outsourced spatial data in cloud storage.
- Published in:
- 2014
- By:
- Publication type:
- journal article
A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.
- Published in:
- 2014
- By:
- Publication type:
- journal article
A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/805923
- By:
- Publication type:
- Article
Protecting Location Privacy for Outsourced Spatial Data in Cloud Storage.
- Published in:
- Scientific World Journal, 2014, p. 1, doi. 10.1155/2014/108072
- By:
- Publication type:
- Article
De-centralized job scheduling on computational Grids using distributed backfilling.
- Published in:
- Concurrency & Computation: Practice & Experience, 2006, v. 18, n. 14, p. 1829, doi. 10.1002/cpe.1032
- By:
- Publication type:
- Article
Trajectory Privacy Protection Based on Sensitive Stay Area Replacement in Publishing.
- Published in:
- Mathematical Problems in Engineering, 2022, p. 1, doi. 10.1155/2022/5114584
- By:
- Publication type:
- Article
LSH Models in Federated Recommendation.
- Published in:
- Applied Sciences (2076-3417), 2024, v. 14, n. 11, p. 4423, doi. 10.3390/app14114423
- By:
- Publication type:
- Article
Survey on recent smart gateways for smart home: Systems, technologies, and challenges.
- Published in:
- Transactions on Emerging Telecommunications Technologies, 2022, v. 33, n. 6, p. 1, doi. 10.1002/ett.4067
- By:
- Publication type:
- Article
Privacy-Preserving Outsourcing Scheme for SVM on Vertically Partitioned Data.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/9983463
- By:
- Publication type:
- Article
SEMI-SUPERVISED LEARNING OF K-NEAREST NEIGHBORS USING A NEAREST-NEIGHBOR SELF-CONTAINED CRITERION IN FOR MOBILE-AWARE SERVICE.
- Published in:
- International Journal of Pattern Recognition & Artificial Intelligence, 2013, v. 27, n. 5, p. -1, doi. 10.1142/S0218001413510014
- By:
- Publication type:
- Article
Death receptor and mitochondria-mediated hepatocyte apoptosis underlies liver dysfunction in rats exposed to organic pollutants from drinking water.
- Published in:
- Drug Design, Development & Therapy, 2015, v. 9, p. 4719, doi. 10.2147/DDDT.S86843
- By:
- Publication type:
- Article
A Survey of techniques for fine-grained web traffic identification and classification.
- Published in:
- Mathematical Biosciences & Engineering, 2022, v. 19, n. 3, p. 2996, doi. 10.3934/mbe.2022138
- By:
- Publication type:
- Article
A Hierarchical Spatial–Temporal Cross-Attention Scheme for Video Summarization Using Contrastive Learning.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 21, p. 8275, doi. 10.3390/s22218275
- By:
- Publication type:
- Article
An Order-Preserving Encryption Scheme Based on Weighted Random Interval Division for Ciphertext Comparison in Wearable Systems.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 20, p. N.PAG, doi. 10.3390/s22207950
- By:
- Publication type:
- Article
Semi-Supervised Ridge Regression with Adaptive Graph-Based Label Propagation.
- Published in:
- Applied Sciences (2076-3417), 2018, v. 8, n. 12, p. 2636, doi. 10.3390/app8122636
- By:
- Publication type:
- Article