Zobrazeno 1 - 10
of 21
pro vyhledávání: '"Tianxi Ji"'
Publikováno v:
IEEE Access, Vol 8, Pp 60598-60612 (2020)
Intelligent Connected Vehicles (ICVs) can provide smart, safe, and efficient transportation services and have attracted intensive attention recently. Obtaining timely and accurate traffic information is one of the most important problems in transport
Externí odkaz:
https://doaj.org/article/ac1a80034e1d4b9b807a613d50f6eb86
Publikováno v:
IEEE Transactions on Wireless Communications. 21:5717-5729
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. :1-15
Publikováno v:
NDDS Symp
When sharing relational databases with other parties, in addition to providing high quality (utility) database to the recipients, a database owner also aims to have (i) privacy guarantees for the data entries and (ii) liability guarantees (via finger
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fdcf40e8ef8c772451c83b172516aac1
https://europepmc.org/articles/PMC10238085/
https://europepmc.org/articles/PMC10238085/
Publikováno v:
IEEE Transactions on Network Science and Engineering. 8:2885-2896
Most UAVs depend on realtime 3D point clouds to navigate through unknown environments. However, both point clouds processing and trajectory planning are computationally expensive and will deplete UAV's battery quickly. There are also inevitable uncer
Publikováno v:
Proceedings of the VLDB Endowment
Differential privacy has been widely adopted to release continuous- and scalar-valued information on a database without compromising the privacy of individual data records in it. The problem of querying binary- and matrix-valued information on a data
Publikováno v:
IEEE Internet of Things Journal. 7:9600-9610
Edge computing, an emerging computing paradigm pushing data computing and storing to network edges, enables many applications that require high computing complexity, scalability, and security. In the big data era, one of the most critical application
Publikováno v:
IEEE Transactions on Computational Social Systems. 7:151-163
Community detection is an effective approach to unveil relationships among individuals in online social networks. In the literature, quite a few algorithms have been proposed to conduct community detection by exploiting the topology of social network
Publikováno v:
2021 IEEE International Conference on Big Data (Big Data).
Publikováno v:
RAID
Database fingerprinting have been widely adopted to prevent unauthorized sharing of data and identify the source of data leakages. Although existing schemes are robust against common attacks, like random bit flipping and subset attack, their robustne