UM

Browse/Search Results:  1-10 of 54 Help

Selected(0)Clear Items/Page:    Sort:
MedChain: Efficient Healthcare Data Sharing via Blockchain Journal article
APPLIED SCIENCES-BASEL, 2019,Volume: 9,Issue: 6
Authors:  Shen, Bingqing;  Guo, Jingzhi;  Yang, Yilong
Favorite  |  View/Download:18/0  |  Submit date:2019/05/16
Blockchain  Data Sharing  Peer-to-peer  Decentralization  Digest Chain  Healthcare Data  Electronic Health Record  Data Stream  Healthcare Information Exchange  
Chronological Age Estimation under the Guidance of Age-related Facial Attributes Journal article
IEEE Transactions on Information Forensics and Security, 2019,Page: 1-12
Authors:  Jiu-Cheng Xie;  Chi-Man Pun
Favorite  |  View/Download:18/0  |  Submit date:2019/05/06
Chronological Age Estimation  Facial Attributes Estimation  Convolutional Neural Network  Controlled And Wild Environments  
Design of highly nonlinear substitution boxes based on I-Ching operators Journal article
IEEE Transactions on Cybernetics, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang T.;  Chen C.L.P.;  Chen L.;  Xu X.;  Hu B.
Favorite  |  View/Download:5/0  |  Submit date:2019/02/13
Boolean function  I-Ching  I-Ching operators (ICOs)  periodic iterated function (PIF)  substitution box (S-Box)  
Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators Journal article
IEEE TRANSACTIONS ON CYBERNETICS, 2018,Volume: 48,Issue: 12,Page: 3349-3358
Authors:  Zhang, Tong;  Chen, C. L. Philip;  Chen, Long;  Xu, Xiangmin;  Hu, Bin
Favorite  |  View/Download:6/0  |  Submit date:2019/01/17
Boolean function  I-Ching  I-Ching operators 23 (ICOs)  periodic iterated function (PIF)  substitution box (S-Box)  
Toward Secure Image Denoising: A Machine Learning Based Realization Conference paper
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, Calgary, CANADA, APR 15-20, 2018
Authors:  Zheng Y.;  Wang C.;  Zhou J.
Favorite  |  View/Download:11/0  |  Submit date:2018/12/22
Cloud Computing  Image Denoising  Machine Learning  Neural Network  Privacy  
Pseudonym inference in cooperative vehicular traffic scenarios Conference paper
2018 IEEE Conference on Communications and Network Security, CNS 2018
Authors:  Chu X.;  Ruan N.;  Li M.;  Jia W.
Favorite  |  View/Download:3/0  |  Submit date:2019/04/04
Location privacy  mix-zone  vehicle platoon  vehicular ad-hoc networks (VANETs)  
Optimized and frequent subgraphs: How are they related? Journal article
IEEE Access, 2018,Volume: 6,Page: 37237-37249
Authors:  Rehman S.U.;  Asghar S.;  Fong S.J.
Favorite  |  View/Download:3/0  |  Submit date:2019/02/13
Data mining  frequent subgraph patterns  graph pattern mining  optimized graph patterns  social network analysis  
Uncertain Data Clustering in Distributed Peer-to-Peer Networks Journal article
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2018,Volume: 29,Issue: 6,Page: 2392-2406
Authors:  Zhou, Jin;  Chen, Long;  Chen, C. L. Philip;  Wang, Yingxu;  Li, Han-Xiong
Favorite  |  View/Download:26/0  |  Submit date:2018/10/30
Attribute Weight Entropy  Distributed Clustering  Peer-to-peer (P2p) Networks  Uncertain Data  
On the strategy and behavior of bitcoin mining with N-attackers Conference paper
ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security
Authors:  Liu H.;  Du R.;  Ruan N.;  Jia W.
Favorite  |  View/Download:4/0  |  Submit date:2019/04/04
Bitcoin  Mining  N-attackers  Selfish mining  
Medical cyber-physical systems: A survey Journal article
JOURNAL OF MEDICAL SYSTEMS, 2018,Volume: 42,Issue: 4
Authors:  Dey, Nilanjan;  Ashour, Amira S.;  Shi, Fuqian;  Fong, Simon James;  Tavares, Joao Manuel R. S.
Favorite  |  View/Download:16/0  |  Submit date:2018/10/30
Networked medical device systems  Wireless sensor networks  Medical internet of things  Body area networks  Security assurance  Patient monitoring