Showing 1 - 14 results of 14 for search 'Jinbo Xiong', query time: 0.02s
Refine Results
-
1
Design method of secure computing protocol for deep neural network by Renwan BI, Qianxin CHEN, Jinbo XIONG, Ximeng LIU
Published 2020-08-01Get full text
Article -
2
A literature review on V2X communications security: Foundation, solutions, status, and future by Zuobin Ying, Kaichao Wang, Jinbo Xiong, Maode Ma
Published 2024-12-01Get full text
Article -
3
Dynamic privacy measurement model and evaluation system for mobile edge crowdsensing by Mingfeng ZHAO, Chen LEI, Yang ZHONG, Jinbo XIONG
Published 2021-02-01Get full text
Article -
4
Multi-authority attribute-based access control system in mHealth with traceability by Qi LI, Hongbo ZHU, Jinbo XIONG, Ruo MO
Published 2018-06-01Get full text
Article -
5
Towards edge-collaborative,lightweight and secure region proposal network by Jinbo XIONG, Renwan BI, Qianxin CHEN, Ximeng LIU
Published 2020-10-01Get full text
Article -
6
Postlarval Shrimp-Associated Microbiota and Underlying Ecological Processes over AHPND Progression by Zhongjiang Zhou, Jiaqi Lu, Pingping Zhan, Jinbo Xiong
Published 2025-03-01Get full text
Article -
7
Approximation method of multiple consistency constraint under differential privacy by Jianping CAI, Ximeng LIU, Jinbo XIONG, Zuobin YING, Yingjie WU
Published 2021-06-01Get full text
Article -
8
Cooperation-based location authentication scheme for crowdsensing applications by Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG
Published 2022-09-01Get full text
Article -
9
Towards edge-collaborative, lightweight and privacy-preserving classification framework by Jinbo XIONG, Yongjie ZHOU, Renwan BI, Liang WAN, Youliang TIAN
Published 2022-01-01Get full text
Article -
10
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing by Zhou Zhou, Youliang Tian, Jinbo Xiong, Changgen Peng, Jing Li, Nan Yang
Published 2025-04-01Get full text
Article -
11
Cloud data secure deduplication scheme via role-based symmetric encryption by Jinbo XIONG, Yuanyuan ZHANG, Youliang TIAN, Zuobin YING, Qi LI, Rong MA
Published 2018-05-01Get full text
Article -
12
Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT by Qi Li, Gaozhan Liu, Qianqian Zhang, Lidong Han, Wei Chen, Rui Li, Jinbo Xiong
Published 2025-04-01Get full text
Article -
13
Privacy-preserving precise profile matching in mobile social network by Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao
Published 2022-11-01Get full text
Article -
14