Deep learning-based key transmission (DLKT) protocol for secured group communication in cloud
暂无分享,去创建一个
[1] Liang Sun,et al. Multi-View Transformation via Mutual-Encoding InfoGenerative Adversarial Networks , 2018, IEEE Access.
[2] Zheng Yan,et al. Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications , 2018, IEEE Transactions on Industrial Informatics.
[3] Yong Xiang,et al. Anonymous Authentication Scheme for Smart Cloud Based Healthcare Applications , 2018, IEEE Access.
[4] Jian Shen,et al. Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing , 2019, IEEE Transactions on Dependable and Secure Computing.
[5] Xia Li,et al. Road Detection From Remote Sensing Images by Generative Adversarial Networks , 2018, IEEE Access.
[6] Yuhui Zheng,et al. Recent Progress on Generative Adversarial Networks (GANs): A Survey , 2019, IEEE Access.
[7] Shunming Li,et al. Generalization of Deep Neural Networks for Imbalanced Fault Classification of Machinery Using Generative Adversarial Networks , 2019, IEEE Access.
[8] Rosdiadee Nordin,et al. Adaptive Neural Fuzzy Inference System for Accurate Localization of Wireless Sensor Network in Outdoor and Indoor Cycling Applications , 2018, IEEE Access.
[9] Basav Roychoudhury,et al. Hierarchical Group Based Mutual Authentication and Key Agreement for Machine Type Communication in LTE and Future 5G Networks , 2017, Secur. Commun. Networks.
[10] Sang-Wook Kim,et al. Collaborative Adversarial Autoencoders: An Effective Collaborative Filtering Model Under the GAN Framework , 2019, IEEE Access.
[11] Yong Gan,et al. Group Key Agreement Protocol Based on Privacy Protection and Attribute Authentication , 2019, IEEE Access.
[12] Wenfen Liu,et al. Cost-Effective and Scalable Data Sharing in Cloud Storage Using Hierarchical Attribute-Based Encryption with Forward Security , 2017, Int. J. Found. Comput. Sci..
[13] Victor I. Chang,et al. Key management and key distribution for secure group communication in mobile and cloud network , 2018, Future Gener. Comput. Syst..
[14] Zahra Ahmadian,et al. Linear Subspace Cryptanalysis of Harn’s Secret Sharing-Based Group Authentication Scheme , 2018, IEEE Transactions on Information Forensics and Security.
[15] Muhammad Bilal,et al. A secure key agreement protocol for dynamic group , 2017, Cluster Computing.
[16] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[17] Jian Shen,et al. Anonymous and Traceable Group Data Sharing in Cloud Computing , 2018, IEEE Transactions on Information Forensics and Security.
[18] Linghao Zhang,et al. Emotion Interaction Recognition Based on Deep Adversarial Network in Interactive Design for Intelligent Robot , 2019, IEEE Access.