Showing 1 - 20 results of 34 for search 'Jianfeng MA', query time: 0.02s
Refine Results
-
1
A spatiotemporal graph wavelet neural network for traffic flow prediction by Linjie Zhang, Jianfeng Ma
Published 2025-03-01Get full text
Article -
2
UCAP:a PCL secure user authentication protocol in cloud computing by Xuefeng LI, Junwei ZHANG, Jianfeng MA
Published 2018-08-01Get full text
Article -
3
Attribute-based proxy signature scheme for unmanned aerial vehicle networks by Lei HE, Jianfeng MA, Dawei WEI
Published 2021-11-01Get full text
Article -
4
Efficient privacy-preserving image retrieval scheme over outsourced data with multi-user by Xiangyu WANG, Jianfeng MA, Yinbin MIAO
Published 2019-02-01Get full text
Article -
5
Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO
Published 2020-04-01Get full text
Article -
6
Encrypted image retrieval in multi-key settings based on edge computing by Yingying LI, Jianfeng MA, Yinbin MIAO
Published 2020-04-01Get full text
Article -
7
Authentication and Integrity in the Smart Grid: An Empirical Study in Substation Automation Systems by Xiang Lu, Wenye Wang, Jianfeng Ma
Published 2012-06-01Get full text
Article -
8
Incentive-Based Optimal Nodes Selection Mechanism for Threshold Key Management in MANETs with Selfish Nodes by Yuanbo Guo, Jianfeng Ma, Chao Wang, Kuiwu Yang
Published 2013-05-01Get full text
Article -
9
Time-based and privacy protection revocable and traceable data sharing scheme in cloud computing by Jiawei ZHANG, Jianfeng MA, Zhuo MA, Teng LI
Published 2021-10-01Get full text
Article -
10
Continuous location privacy protection mechanism based on differential privacy by Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA
Published 2021-08-01Get full text
Article -
11
Proof of storage with corruption identification and recovery for dynamic group users by Tao JIANG, Hang XU, Liangmin WANG, Jianfeng MA
Published 2022-10-01Get full text
Article -
12
A Construction Method of (2, 3) Visual Cryptography Scheme by Peng Li, Jianfeng Ma, Liping Yin, Quan Ma
Published 2020-01-01Get full text
Article -
13
Dummy location selection algorithm based on location semantics and query probability by Jie WANG, Chunru WANG, Jianfeng MA, Hongtao LI
Published 2020-03-01Get full text
Article -
14
Pri-EMO: A universal perturbation method for privacy preserving facial emotion recognition by Yong Zeng, Zhenyu Zhang, Jiale Liu, Jianfeng Ma, Zhihong Liu
Published 2023-11-01Get full text
Article -
15
Data comparable encryption scheme based on cloud computing in Internet of things by Qian MENG, Jianfeng MA, Kefei CHEN, Yinbin MIAO, Tengfei YANG
Published 2018-04-01Get full text
Article -
16
Security analysis of weighted network anonymity based on singular value decomposition by Yong ZENG, Lingjie ZHOU, Zhongyuan JIANG, Zhihong LIU, Jianfeng MA
Published 2018-05-01Get full text
Article -
17
Two-Layer Storage Scheme and Repair Method of Failure Data in Wireless Sensor Networks by Yulong Shen, Xiaowei Dang, Min Shu, Ning Xi, Jianfeng Ma
Published 2012-10-01Get full text
Article -
18
Key storage management scheme based on keyed hash tree with state by Xiangyu WANG, Jianfeng MA, Yinbin MIAO, Kai ZHANG, Qiying WU
Published 2018-05-01Get full text
Article -
19
Secrecy Transfer by Zhihong Liu, Jianfeng Ma, Yong Zeng, Li Yang, YoungHo Park
Published 2012-07-01Get full text
Article -
20
Mapping prediction with recurrent neural networks for future LISP enabled networks by Yue Li, Shuai Guo, Qipeng Song, Yao Wang, Xiaomin Wei, Jianfeng Ma
Published 2023-07-01Get full text
Article