scroll to top
0
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Cheng, Xiuzhen"

1 - 10 of 670 results for
 "Cheng, Xiuzhen"
Results per page:

SPDL: A Blockchain-Enabled Secure and Privacy-Preserving Decentralized Learning System

Publication Type: Periodical

Source(s): IEEE Transactions on Computers; February 2023, Vol. 72 Issue: 2 p548-558, 11p

Abstract: Decentralized learning involves training machine learning models over remote mobile devices, edge servers, or cloud servers while keeping data localized. Even though many studies have shown the feasibility of preserving privacy, enhancing training perf...

Malware-on-the-Brain: Illuminating Malware Byte Codes With Images for Malware Classification

Publication Type: Periodical

Source(s): IEEE Transactions on Computers; February 2023, Vol. 72 Issue: 2 p438-451, 14p

Abstract: Malware is a piece of software that was written with the intent of doing harm to data, devices, or people. Since a number of new malware variants can be generated by reusing codes, malware attacks can be easily launched and thus become common in recent...

I Know Your Social Network Accounts: A Novel Attack Architecture for Device-Identity Association

Publication Type: Periodical

Source(s): IEEE Transactions on Dependable and Secure Computing; 2023, Vol. 20 Issue: 2 p1017-1030, 14p

Abstract: Online social networks revolutionize the way people interact with each other. When various social network information aggregates over time, a rich online profile of the user is formed. Owing to the various features provided by mobile devices, a user's ...

Exploring Truss Maintenance in Fully Dynamic Graphs: A Mixed Structure-Based Approach

Publication Type: Periodical

Source(s): IEEE Transactions on Computers; 2023, Vol. 72 Issue: 3 p707-718, 12p

Abstract: Graphs are widely employed in complex system modeling, VLSI design, and social analysis. Mining cohesive subgraphs is a fundamental problem in graph analysis, while implementing cohesive subgraphs requires analysts to not only ensure cohesiveness but a...

Jamming-Resilient Message Dissemination in Wireless Networks

Publication Type: Periodical

Source(s): IEEE Transactions on Mobile Computing; 2023, Vol. 22 Issue: 3 p1536-1550, 15p

Abstract: This paper initiates the study for the basic primitive of distributed message dissemination in multi-hop wireless networks under a strong adversarial jamming model. Specifically, the message dissemination problem is to deliver a message initiating at a...

Applications of Differential Privacy in Social Network Analysis: A Survey

Publication Type: Periodical

Source(s): IEEE Transactions on Knowledge and Data Engineering; January 2023, Vol. 35 Issue: 1 p108-127, 20p

Abstract: Differential privacy provides strong privacy preservation guarantee in information sharing. As social network analysis has been enjoying many applications, it opens a new arena for applications of differential privacy. This article presents a comprehen...

CloudChain: A Cloud Blockchain Using Shared Memory Consensus and RDMA.

Publication Type: Academic Journal

Source(s): IEEE Transactions on Computers; Dec2022, Vol. 71 Issue 12, p3242-3253, 12p

Abstract: Copyright of IEEE Transactions on Computers is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or...

Extending On-Chain Trust to Off-Chain – Trustworthy Blockchain Data Collection Using Trusted Execution Environment (TEE).

Publication Type: Academic Journal

Source(s): IEEE Transactions on Computers; Dec2022, Vol. 71 Issue 12, p3268-3280, 13p

Abstract: Copyright of IEEE Transactions on Computers is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or...

Harnessing Context for Budget-Limited Crowdsensing With Massive Uncertain Workers.

Publication Type: Academic Journal

Source(s): IEEE/ACM Transactions on Networking; Oct2022, Vol. 30 Issue 5, p2231-2245, 15p

Abstract: Copyright of IEEE/ACM Transactions on Networking is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, downloa...

A Misreport- and Collusion-Proof Crowdsourcing Mechanism Without Quality Verification.

Publication Type: Academic Journal

Source(s): IEEE Transactions on Mobile Computing; Sep2022, Vol. 21 Issue 9, p3084-3095, 12p

Abstract: Copyright of IEEE Transactions on Mobile Computing is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, downl...

sponsored