default search action
Shanshan Tu
Person information
- affiliation: Beijing University of Post and Telecommunication, Computer Science Department, China
- affiliation: Beijing University of Technology, Faculty of Information Technology, China
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j59]Madiha Tahir, Zahid Halim, Muhammad Waqas, Komal Nain Sukhia, Shanshan Tu:
Emotion detection using convolutional neural network and long short-term memory: a deep multimodal framework. Multim. Tools Appl. 83(18): 53497-53530 (2024) - [j58]Muhammad Dawood, Chunagbai Xiao, Shanshan Tu, Faiz Abdullah Alotaibi, Mrim M. Alnfiai, Muhammad Farhan:
Intelligent model for the detection and classification of encrypted network traffic in cloud infrastructure. PeerJ Comput. Sci. 10: e2027 (2024) - [j57]Jiangjiang Zhang, Zhenhu Ning, Muhammad Waqas, Hisham Alasmary, Shanshan Tu, Sheng Chen:
Hybrid Edge-Cloud Collaborator Resource Scheduling Approach Based on Deep Reinforcement Learning and Multiobjective Optimization. IEEE Trans. Computers 73(1): 192-205 (2024) - [j56]Jiangjiang Zhang, Zhenhu Ning, Raja Hashim Ali, Muhammad Waqas, Shanshan Tu, Iftekhar Ahmad:
A Many-Objective Ensemble Optimization Algorithm for the Edge Cloud Resource Scheduling Problem. IEEE Trans. Mob. Comput. 23(2): 1330-1346 (2024) - [j55]Shanshan Tu, Akhtar Badshah, Hisham Alasmary, Muhammad Waqas:
EAKE-WC: Efficient and Anonymous Authenticated Key Exchange Scheme for Wearable Computing. IEEE Trans. Mob. Comput. 23(5): 4752-4763 (2024) - [j54]Akhtar Badshah, Ghulam Abbas, Muhammad Waqas, Shanshan Tu, Ziaul Haq Abbas, Fazal Muhammad, Sheng Chen:
USAF-IoD: Ultralightweight and Secure Authenticated Key Agreement Framework for Internet of Drones Environment. IEEE Trans. Veh. Technol. 73(8): 10963-10977 (2024) - 2023
- [j53]Muhammad Waqas, Shanshan Tu, Jialin Wan, Talha Mir, Hisham Alasmary, Ghulam Abbas:
Defense scheme against advanced persistent threats in mobile fog computing security. Comput. Networks 221: 109519 (2023) - [j52]Haining Tan, Tao Ye, Sadaqat ur Rehman, Obaid Ur Rehman, Shanshan Tu, Jawad Ahmad:
A novel routing optimization strategy based on reinforcement learning in perception layer networks. Comput. Networks 237: 110105 (2023) - [j51]Madiha Tahir, Zahid Halim, Muhammad Waqas, Shanshan Tu:
On the Effect of Emotion Identification from Limited Translated Text Samples Using Computational Intelligence. Int. J. Comput. Intell. Syst. 16(1): 107 (2023) - [j50]Bei Gong, Guiping Zheng, Muhammad Waqas, Shanshan Tu, Sheng Chen:
LCDMA: Lightweight Cross-Domain Mutual Identity Authentication Scheme for Internet of Things. IEEE Internet Things J. 10(14): 12590-12602 (2023) - [j49]Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat ur Rehman:
Cyberattacks and Security of Cloud Computing: A Complete Guideline. Symmetry 15(11): 1981 (2023) - [j48]Jiangjiang Zhang, Bei Gong, Muhammad Waqas, Shanshan Tu, Sheng Chen:
Many-Objective Optimization Based Intrusion Detection for in-Vehicle Network Security. IEEE Trans. Intell. Transp. Syst. 24(12): 15051-15065 (2023) - [j47]Jiangjiang Zhang, Bei Gong, Muhammad Waqas, Shanshan Tu, Zhu Han:
A Hybrid Many-Objective Optimization Algorithm for Task Offloading and Resource Allocation in Multi-Server Mobile Edge Computing Networks. IEEE Trans. Serv. Comput. 16(5): 3101-3114 (2023) - [j46]Shanshan Tu, Muhammad Waqas, Akhtar Badshah, Mingxi Yin, Ghulam Abbas:
Network Intrusion Detection System (NIDS) Based on Pseudo-Siamese Stacked Autoencoders in Fog Computing. IEEE Trans. Serv. Comput. 16(6): 4317-4327 (2023) - [j45]Suleman Munawar, Zaiwar Ali, Muhammad Waqas, Shanshan Tu, Syed Ali Hassan, Ghulam Abbas:
Cooperative Computational Offloading in Mobile Edge Computing for Vehicles: A Model-Based DNN Approach. IEEE Trans. Veh. Technol. 72(3): 3376-3391 (2023) - [j44]Shanshan Tu, Haoyu Yu, Akhtar Badshah, Muhammad Waqas, Zahid Halim, Iftekhar Ahmad:
Secure Internet of Vehicles (IoV) With Decentralized Consensus Blockchain Mechanism. IEEE Trans. Veh. Technol. 72(9): 11227-11236 (2023) - [j43]Chao Fang, Zhaoming Hu, Xiangheng Meng, Shanshan Tu, Zhuwei Wang, Deze Zeng, Wei Ni, Song Guo, Zhu Han:
DRL-Driven Joint Task Offloading and Resource Allocation for Energy-Efficient Content Delivery in Cloud-Edge Cooperation Networks. IEEE Trans. Veh. Technol. 72(12): 16195-16207 (2023) - [c36]Mao Wang, Shanshan Tu, Haoyu Yu, Peihe Yan:
Anonymous Authentication Scheme with Zero-Knowledge Proof Based on Private Blockchain. ICCNS 2023: 52-61 - [c35]Wei Zou, Shanshan Tu, Zhenhu Ning, Jiawei Xu, Shuaikun Xing, Xue Liao:
An improved particle swarm optimization algorithm for P300 Neural network recognizer. ICCNS 2023: 127-135 - [c34]Peihe Yan, Shanshan Tu, Mao Wang:
Multi-User Identity Authentication in Wireless Communication Based on Deep Learning and Data Augmentation. ICCNS 2023: 189-195 - [c33]Xin Ai, Qingqing Yue, Hongchen Li, Wenlong Li, Shanshan Tu, Sadaqat ur Rehman:
Physical Layer Authentication Based on Transformer. ICCNS 2023: 203-208 - [c32]Shanshan Tu, Wenlong Li, Xin Ai, Hongchen Li, Qingqing Yue, Sadaqat ur Rehman:
A Hybrid Deep Learning Model for Breast Cancer Detection and Classification. ICCNS 2023: 350-353 - [c31]Mingxiu Li, Shanshan Tu, Sadaqat ur Rehman:
Facial Expression Recognition from Occluded Images Using Deep Convolution Neural Network with Vision Transformer. ICIG (2) 2023: 289-299 - [c30]Quswar Abid, Ghulam Abbas, Zaiwar Ali, Ziaul Haq Abbas, Shanshan Tu, Youssef Harrath, Muhammad Waqas:
Distance Vector and Prominent Reliable Path Selection based Stochastic Routing in Distributed Internet of Things. IWCMC 2023: 935-940 - [c29]Shanshan Tu, Muhammad Ayaz, Abdullah Arshad, Usman Iftikhar, Youseuf Harrath, Muhammad Waqas:
Cloud-based Smart Parking System using Internet of Things. IWCMC 2023: 1377-1382 - 2022
- [j42]Muhammad Waqas, Shanshan Tu, Zahid Halim, Sadaqat ur Rehman, Ghulam Abbas, Ziaul Haq Abbas:
The role of artificial intelligence and machine learning in wireless networks security: principle, practice and challenges. Artif. Intell. Rev. 55(7): 5215-5261 (2022) - [j41]Zeeshan Shaukat, Qurat ul Ain Farooq, Shanshan Tu, Chuangbai Xiao, Saqib Ali:
A state-of-the-art technique to perform cloud-based semantic segmentation using deep learning 3D U-Net architecture. BMC Bioinform. 23(1): 251 (2022) - [j40]Chao Fang, Hang Xu, Yihui Yang, Zhaoming Hu, Shanshan Tu, Kaoru Ota, Zheng Yang, Mianxiong Dong, Zhu Han, F. Richard Yu, Yunjie Liu:
Deep-Reinforcement-Learning-Based Resource Allocation for Content Distribution in Fog Radio Access Networks. IEEE Internet Things J. 9(18): 16874-16883 (2022) - [j39]Xiaoping Wang, Shanshan Tu, Wei Zhao, Chengjie Shi:
A novel energy-based online sequential extreme learning machine to detect anomalies over real-time data streams. Neural Comput. Appl. 34(2): 823-831 (2022) - [j38]Pengge Chen, Fenhua Bai, Tao Shen, Bei Gong, Lei Zhang, Lin Huang, Zhengyuan An, Talha Mir, Shanshan Tu, Muhammad Waqas:
SCCA: A slicing-and coding-based consensus algorithm for optimizing storage in blockchain-based IoT data sharing. Peer-to-Peer Netw. Appl. 15(4): 1964-1978 (2022) - [j37]Shanshan Tu, Muhammad Waqas, Sadaqat ur Rehman, Talha Mir, Zahid Halim, Iftekhar Ahmad:
Social Phenomena and Fog Computing Networks: A Novel Perspective for Future Networks. IEEE Trans. Comput. Soc. Syst. 9(1): 32-44 (2022) - [j36]Haiyang Yu, Zhen Yang, Shanshan Tu, Muhammad Waqas, Huan Liu:
Blockchain-Based Offline Auditing for the Cloud in Vehicular Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2944-2956 (2022) - [j35]Madiha Tahir, Zahid Halim, Atta Ur Rahman, Muhammad Waqas, Shanshan Tu, Sheng Chen, Zhu Han:
Non-Acted Text and Keystrokes Database and Learning Methods to Recognize Emotions. ACM Trans. Multim. Comput. Commun. Appl. 18(2): 61:1-61:24 (2022) - [j34]Talha Mir, Muhammad Waqas, Shanshan Tu, Chao Fang, Wei Ni, Richard MacKenzie, Xuan Xue, Zhu Han:
Relay Hybrid Precoding in UAV-Assisted Wideband Millimeter-Wave Massive MIMO System. IEEE Trans. Wirel. Commun. 21(9): 7040-7054 (2022) - [c28]Said Bakhshad, Vasaki Ponnusamy, Robithoh Annur, Muhammad Waqas, Hisham Alasmary, Shanshan Tu:
Deep Reinforcement Learning based Intrusion Detection System with Feature Selections Method and Optimal Hyper-parameter in IoT Environment. CITS 2022: 1-7 - [c27]Shanshan Tu, Fengming Huang, Shengju Zhang, Akhtar Badshah, Hisham Alasmary, Muhammad Waqas:
Ciphertext-Policy Attribute-based Encryption for Securing IoT Devices in Fog Computing. CITS 2022: 1-7 - [c26]Gaoxu Xu, Yin Liang, Shanshan Tu, Sadaqat ur Rehman:
A Spatial-Temporal Integration Analysis to Classify Dynamic Functional Connectivity for Brain Disease Diagnosis. ICAIS (1) 2022: 549-558 - [c25]Xuetao Bai, Shanshan Tu, Muhammad Waqas, Aiming Wu, Yihe Zhang, Yongjie Yang:
Blockchain Enable IoT Using Deep Reinforcement Learning: A Novel Architecture to Ensure Security of Data Sharing and Storage. ICAIS (3) 2022: 586-597 - [c24]Aiming Wu, Shanshan Tu, Junwei Liu, Yihe Zhang, Yongjie Yang, Xuetao Bai:
Detection Scheme of Impersonation Attack Based on Sarsa(Lambda) Algorithm in Fog Computing. ICCNS 2022: 16-22 - [c23]Yongjie Yang, Shanshan Tu, Haishuang Yan, Yihe Zhang, Aiming Wu, Xuetao Bai:
Deep Reinforcement Learning-Based Computation Offloading for Anti-jamming in Fog Computing Networks. ICCNS 2022: 36-42 - [c22]Shisong Yang, Yuwen Chen, Shanshan Tu, Zhen Yang:
A Post-quantum Secure Aggregation for Federated Learning. ICCNS 2022: 117-124 - [c21]Mansoor Khan, Shanshan Tu, Ghulam Abbas, Ziaul Haq Abbas, Hisham Alasmary, Muhammad Waqas:
A Reliable and Stable V2V Routing Scheme for Warning Message Dissemination in VANETs using Bi-Directional Clustering. ICCNS 2022: 159-167 - [c20]Haoyu Yu, Shanshan Tu, Yihe Zhang:
Decentralized Consensus Blockchain-Based Authentication Algorithm Using in Secure Internet of Vehicles. ICCNS 2022: 199-204 - [c19]Xuetao Bai, Shanshan Tu, Haishuang Yan, Yongjie Yang, Aiming Wu, Yihe Zhang:
SPoW: A solution to the problem of centralization of computing power. ICCNS 2022: 205-210 - [c18]Yihe Zhang, Shanshan Tu, Muhammad Waqas, Yongjie Yang, Aiming Wu, Xuetao Bai:
Resource Allocation for Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. ICCNS 2022: 211-218 - [c17]Yihe Zhang, Shanshan Tu, Shengju Zhang, Yongjie Yang, Aiming Wu, Xuetao Bai:
Performance Optimization Blockchain-Enabled Fog Computing with Deep Reinforcement Learning. ICCNS 2022: 227-233 - [c16]Mingxiu Li, Shan-Shan Tu, Sadaqat ur Rehman, Yong Jie Yang:
An Improved dynamic functional connectivity and deep neural network model for Autism Spectrum Disorder Classification. ICDLT 2022: 37-41 - [c15]Bei Gong, Zhenhu Ning, Junmiao Liang, Shanshan Tu:
Fast identification method of malicious code based on extreme learning machine. ICSCA 2022: 55-60 - [c14]Bei Gong, Zhenhu Ning, Wenjing Li, Shanshan Tu:
Consensus Algorithm Based on Subject Credit. ICSCA 2022: 108-115 - [c13]Jin Peng, Zhenhu Ning, Shanshan Tu:
Trusted connection architecture of electric IoT. ICSCA 2022: 129-135 - [c12]Bei Gong, Zhenhu Ning, Yi Zhu, Shanshan Tu:
Character-level domain name generation algorithm based on ED-GAN. ICSCA 2022: 198-205 - [c11]Akhtar Badshah, Muhammad Waqas, Shanshan Tu, Ghulam Abbas:
Enhancing Security in The Internet of Things Ecosystem using Reinforcement Learning and Blockchain. IWCMC 2022: 243-247 - [c10]Osama Saleem, Suleman Munawar, Shanshan Tu, Zaiwar Ali, Muhammad Waqas, Ghulam Abbas:
Intelligent Task Offloading for Smart Devices in Mobile Edge Computing. IWCMC 2022: 312-317 - 2021
- [j33]Muhammad Asad, Zahid Halim, Muhammad Waqas, Shanshan Tu:
An In-ad contents-based viewability prediction framework using Artificial Intelligence for Web Ads. Artif. Intell. Rev. 54(7): 5095-5125 (2021) - [j32]Shanshan Tu, Muhammad Waqas, Fengming Huang, Ghulam Abbas, Ziaul Haq Abbas:
A revocable and outsourced multi-authority attribute-based encryption scheme in fog computing. Comput. Networks 195: 108196 (2021) - [j31]Zahid Halim, Raja Usman Ahmed Khan, Muhammad Waqas, Shanshan Tu:
Utilizing 3D joints data extracted through depth camera to train classifiers for identifying suicide bomber. Expert Syst. Appl. 179: 115081 (2021) - [j30]Haiyang Yu, Zhen Yang, Muhammad Waqas, Shanshan Tu, Zhu Han, Zahid Halim, Richard O. Sinnott, Udaya Parampalli:
Efficient dynamic multi-replica auditing for the cloud with geographic location. Future Gener. Comput. Syst. 125: 285-298 (2021) - [j29]Muhammad Sulaiman, Zahid Halim, Mustapha Lebbah, Muhammad Waqas, Shanshan Tu:
An Evolutionary Computing-Based Efficient Hybrid Task Scheduling Approach for Heterogeneous Computing Environment. J. Grid Comput. 19(1): 11 (2021) - [j28]Ting Zhang, Muhammad Waqas, Zhaoying Liu, Shanshan Tu, Zahid Halim, Sadaqat ur Rehman, Yujian Li, Zhu Han:
A fusing framework of shortcut convolutional neural networks. Inf. Sci. 579: 685-699 (2021) - [j27]Amin Ullah, Sadaqat ur Rehman, Shanshan Tu, Raja Majid Mehmood, Fawad, Muhammad Ehatisham-ul-Haq:
A Hybrid Deep CNN Model for Abnormal Arrhythmia Detection Based on Cardiac ECG Signal. Sensors 21(3): 951 (2021) - [j26]Sami Ullah, Ghulam Abbas, Muhammad Waqas, Ziaul Haq Abbas, Shanshan Tu, Ibrahim A. Hameed:
EEMDS: An Effective Emergency Message Dissemination Scheme for Urban VANETs. Sensors 21(5): 1588 (2021) - [j25]Shanshan Tu, Sadaqat ur Rehman, Muhammad Waqas, Obaid Ur Rehman, Zubair Shah, Zhongliang Yang, Anis Koubaa:
ModPSO-CNN: an evolutionary convolution neural network with application to visual recognition. Soft Comput. 25(3): 2165-2176 (2021) - [j24]Shanshan Tu, Muhammad Waqas, Sadaqat ur Rehman, Talha Mir, Ghulam Abbas, Ziaul Haq Abbas, Zahid Halim, Iftekhar Ahmad:
Reinforcement Learning Assisted Impersonation Attack Detection in Device-to-Device Communications. IEEE Trans. Veh. Technol. 70(2): 1474-1479 (2021) - [c9]Sadaqat ur Rehman, Shanshan Tu, Zubair Shah, Jawad Ahmad, Muhammad Waqas, Obaid Ur Rehman, Anis Koubaa, Qammer H. Abbasi:
Deep Learning Models for Intelligent Healthcare: Implementation and Challenges. ICAIS (1) 2021: 214-225 - [c8]Morteza Talezari, Shanshan Tu, Sadaqat ur Rehman, Chuangbai Xiao, Basharat Ahmad, Muhammad Waqas, Obaid Ur Rehman:
Recent Development, Trends and Challenges in IoT Security. ICAIS (2) 2021: 633-646 - 2020
- [j23]Shanshan Tu, Obaid Ur Rehman, Sadaqat ur Rehman, Shafi Ullah Khan, Muhammad Waqas, Ran Zhu:
A Novel Quantum Inspired Particle Swarm Optimization Algorithm for Electromagnetic Applications. IEEE Access 8: 21909-21916 (2020) - [j22]Jahanzaib Latif, Chuangbai Xiao, Shanshan Tu, Sadaqat ur Rehman, Azhar Imran, Anas Bilal:
Implementation and Use of Disease Diagnosis Systems for Electronic Medical Records Based on Machine Learning: A Complete Review. IEEE Access 8: 150489-150513 (2020) - [j21]Waqas Farooq, Shanshan Tu, Khawar Iqbal, Haseeb Ahmad Khan, Sadaqat ur Rehman, Adnan Daud Khan, Obaid Ur Rehman:
An Efficient Non-Toxic and Non-Corrosive Perovskite Solar Cell. IEEE Access 8: 210617-210625 (2020) - [j20]Talha Mir, Muhammad Waqas, Usama Mir, Syed Mudassir Hussain, Ahmet M. Elbir, Shanshan Tu:
Hybrid Precoding Design for Two-Way Relay-Assisted Terahertz Massive MIMO Systems. IEEE Access 8: 222660-222671 (2020) - [j19]Shanshan Tu, Muhammad Waqas, Qiangqiang Lin, Sadaqat ur Rehman, Muhammad Hanif, Chuangbai Xiao, M. Majid Butt, Chin-Chen Chang:
Tracking area list allocation scheme based on overlapping community algorithm. Comput. Networks 173: 107182 (2020) - [j18]Shanshan Tu, Muhammad Waqas, Yuan Meng, Sadaqat ur Rehman, Iftekhar Ahmad, Anis Koubaa, Zahid Halim, Muhammad Hanif, Chin-Chen Chang, Chengjie Shi:
Mobile fog computing security: A user-oriented smart attack defense strategy based on DQL. Comput. Commun. 160: 790-798 (2020) - [j17]Xiaoping Wang, Muhammad Waqas, Shanshan Tu, Sadaqat ur Rehman, Ridha Soua, Obaid Ur Rehman, Sajid Anwar, Wei Zhao:
Power maximisation technique for generating secret keys by exploiting physical layer security in wireless communication. IET Commun. 14(5): 872-879 (2020) - [j16]Shanshan Tu, Sadaqat ur Rehman, Muhammad Waqas, Obaid Ur Rehman, Zhongliang Yang, Basharat Ahmad, Zahid Halim, Wei Zhao:
Optimisation-based training of evolutionary convolution neural network for visual classification applications. IET Comput. Vis. 14(5): 259-267 (2020) - [j15]Yan Shi, Zijun Zhang, Kaining Huang, Wudi Ma, Shanshan Tu:
Human-computer interaction based on face feature localization. J. Vis. Commun. Image Represent. 70: 102740 (2020) - [j14]Meng Liu, Shanshan Tu, Chuangbai Xiao, Muhammad Waqas, Sadaqat ur Rehman, Muhammad Aamir, Chin-Chen Chang:
The Allocation and Reuse Scheme of Physical Cell Identifications Based on Maximum Degree First Coloring Algorithm. IEEE Syst. J. 14(1): 582-591 (2020) - [j13]Kaining Huang, Yan Shi, Fuqi Zhao, Zijun Zhang, Shanshan Tu:
Multiple instance deep learning for weakly-supervised visual object tracking. Signal Process. Image Commun. 84: 115807 (2020) - [c7]Abd Ullah Khan, Ghulam Abbas, Ziaul Haq Abbas, Muhammad Waqas, Shanshan Tu, Alamgir Naushad:
Service Completion Probability Enhancement and Fairness for SUs using Hybrid Mode CRNs. ICC 2020: 1-6 - [c6]Mingxi Yin, Jinliang Yu, Shanshan Tu, Muhammad Waqas, Sadaqat ur Rehman, Ghulam Abbas, Ziaul Haq Abbas:
An Efficient Approach for Selecting a Secure Relay Node in Fog Computing Social Ties Network. ICAIS (1) 2020: 173-183 - [i2]Sadaqat ur Rehman, Muhammad Waqas, Shanshan Tu, Anis Koubaa, Obaid Ur Rehman, Jawad Ahmad, Muhammad Hanif, Zhu Han:
Deep Learning Techniques for Future Intelligent Cross-Media Retrieval. CoRR abs/2008.01191 (2020)
2010 – 2019
- 2019
- [j12]Qiangqiang Lin, Shanshan Tu, Muhammad Waqas, Sadaqat ur Rehman, Chinchen Chang:
Tracking areas planning based on spectral clustering in small cell networks. IET Commun. 13(13): 1921-1927 (2019) - [j11]Sadaqat ur Rehman, Shanshan Tu, Muhammad Waqas, Yongfeng Huang, Obaid Ur Rehman, Basharat Ahmad, Salman Ahmad:
Unsupervised pre-trained filter learning approach for efficient convolution neural network. Neurocomputing 365: 171-190 (2019) - [j10]Yuan Meng, Shanshan Tu, Jinliang Yu, Fengming Huang:
Intelligent attack defense scheme based on DQL algorithm in mobile fog computing. J. Vis. Commun. Image Represent. 65 (2019) - [c5]Sadaqat ur Rehman, Yongfeng Huang, Shanshan Tu, Basharat Ahmad:
Learning a Semantic Space for Modeling Images, Tags and Feelings in Cross-Media Search. PAKDD (Workshops) 2019: 65-76 - [c4]Imran Ali Khoso, Talha Bin Javed, Shanshan Tu, Yuanyuan Dong, Hua Li, Xiyuan Wang, Xiaoming Dai:
A Fast-Convergent Detector Based on Joint Jacobi and Richardson Method for Uplink Massive MIMO Systems. WOCC 2019: 1-5 - [i1]Sadaqat ur Rehman, Zhongliang Yang, Muhammad Shahid, Nan Wei, Yongfeng Huang, Muhammad Waqas, Shan-Shan Tu, Obaid Ur Rehman:
Water Preservation in Soan River Basin using Deep Learning Techniques. CoRR abs/1906.10852 (2019) - 2018
- [j9]Li Lin, Tingting Liu, Shuang Li, Chathura M. Sarathchandra Magurawalage, Shan-Shan Tu:
PriGuarder: A Privacy-Aware Access Control Approach Based on Attribute Fuzzy Grouping in Cloud Environments. IEEE Access 6: 1882-1893 (2018) - [j8]Shan-Shan Tu, Meng Liu, Muhammad Waqas, Sadaqat ur Rehman, Ran Zhu, Lei Liu:
FHC-PCIA: A Physical Cell Identification Allocation Method Based on Fuzzy Hierarchical Clustering for Heterogeneous Cellular Network. IEEE Access 6: 46976-46987 (2018) - [j7]Obaid Ur Rehman, Sadaqat ur Rehman, Shan-Shan Tu, Shafiullah Khan, Muhammad Waqas, Shiyou Yang:
A Quantum Particle Swarm Optimization Method With Fitness Selection Methodology for Electromagnetic Inverse Problems. IEEE Access 6: 63155-63163 (2018) - [j6]Shan-Shan Tu, Xinyi Huang, Yao Huang, Muhammad Waqas, Sadaqat ur Rehman:
SSLSS: Semi-Supervised Learning-Based Steganalysis Scheme for Instant Voice Communication Network. IEEE Access 6: 66153-66164 (2018) - [j5]Sadaqat ur Rehman, Shan-Shan Tu, Yongfeng Huang, Obaid Ur Rehman:
A Benchmark Dataset and Learning High-Level Semantic Embeddings of Multimedia for Cross-Media Retrieval. IEEE Access 6: 67176-67188 (2018) - [j4]Shan-Shan Tu, Muhammad Waqas, Sadaqat ur Rehman, Muhammad Aamir, Obaid Ur Rehman, Jianbiao Zhang, Chinchen Chang:
Security in Fog Computing: A Novel Technique to Tackle an Impersonation Attack. IEEE Access 6: 74993-75001 (2018) - [j3]Sadaqat ur Rehman, Shan-Shan Tu, Obaid Ur Rehman, Yongfeng Huang, Chathura M. Sarathchandra Magurawalage, Chinchen Chang:
Optimization of CNN through Novel Training Strategy for Visual Classification Problems. Entropy 20(4): 290 (2018) - [c3]Jianbiao Zhang, Fan Yang, Shanshan Tu, Ai Zhang:
An Abnormal Behavior Clustering Algorithm Based on K-means. BICS 2018: 535-544 - [c2]Sadaqat ur Rehman, Yongfeng Huang, Shan-Shan Tu, Obaid Ur Rehman:
Facebook5k: A Novel Evaluation Resource Dataset for Cross-Media Search. ICCCS (1) 2018: 512-524 - 2017
- [j2]Sadaqat ur Rehman, Shan-Shan Tu, Yongfeng Huang, Guojie Liu:
CSFL: A novel unsupervised convolution neural network approach for visual pattern classification. AI Commun. 30(5): 311-324 (2017) - 2016
- [j1]Shan-Shan Tu, Shao-Zhang Niu, Hui Li:
A fine-grained access control and revocation scheme on clouds. Concurr. Comput. Pract. Exp. 28(6): 1697-1714 (2016) - 2012
- [c1]Shan-Shan Tu, Shao-Zhang Niu, Hui Li, Xiao-Ming Yun, Meng-Jiao Li:
Fine-grained Access Control and Revocation for Sharing Data on Clouds. IPDPS Workshops 2012: 2146-2155
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint