Showing
1 - 15
results of
15
for search '
Xuehui Du
'
Skip to content
Home
High Impact Articles
Search Options
UiTM Open Access
Search by UiTM Scopus
Advanced Search
Search by Category
Discovery Service
Sources
Jawi Collection
UiTM Journals
List UiTM Journal in IR
Statistic
About
Open Access
Creative Commons Licenses
COKI | Malaysia Open Access
Report Technical
User Guide
Contact Us
Search Tips
FAQs
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Xuehui Du
Showing
1 - 15
results of
15
for search '
Xuehui Du
'
, query time: 0.12s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
Efficient Access Control Permission Decision Engine Based on Machine Learning
by
Aodi Liu
,
Xuehui
Du
,
Na Wang
Published 2021-01-01
Get full text
Article
2
Access Control Role Evolution Mechanism for Open Computing Environment
by
Aodi Liu
,
Xuehui
Du
,
Na Wang
Published 2020-03-01
Get full text
Article
3
Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow
by
Chencheng Ma
,
Xuehui
Du
,
Lifeng Cao
Published 2020-02-01
Get full text
Article
4
Dynamic Control Method for Tenants’ Sensitive Information Flow Based on Virtual Boundary Recognition
by
Xin Lu
,
Lifeng Cao
,
Xuehui
Du
Published 2020-01-01
Get full text
Article
5
A Big Data Provenance Model for Data Security Supervision Based on PROV-DM Model
by
Yuanzhao Gao
,
Xingyuan Chen
,
Xuehui
Du
Published 2020-01-01
Get full text
Article
6
Analysis of Multi-Types of Flow Features Based on Hybrid Neural Network for Improving Network Anomaly Detection
by
Chencheng Ma
,
Xuehui
Du
,
Lifeng Cao
Published 2019-01-01
Get full text
Article
7
Unstructured Text Resource Access Control Attribute Mining Technology Based on Convolutional Neural Network
by
Aodi Liu
,
Xuehui
Du
,
Na Wang
Published 2019-01-01
Get full text
Article
8
Building a Cloud IDS Using an Efficient Feature Selection Method and SVM
by
Wenjuan Wang
,
Xuehui
Du
,
Na Wang
Published 2019-01-01
Get full text
Article
9
A quality-of-service-aware dynamic evolution model for space–ground integrated network
by
Zhuo Yi
,
Xuehui
Du
,
Ying Liao
,
Lifeng Cao
Published 2017-08-01
Get full text
Article
10
Android Malware Detection Based on Structural Features of the Function Call Graph
by
Yang Yang
,
Xuehui
Du
,
Zhi Yang
,
Xing Liu
Published 2021-01-01
Get full text
Article
11
Improving Privacy and Security in Decentralizing Multi-Authority Attribute-Based Encryption in Cloud Computing
by
Yan Yang
,
Xingyuan Chen
,
Hao Chen
,
Xuehui
Du
Published 2018-01-01
Get full text
Article
12
HiCoACR: A reconfiguration decision-making model for reconfigurable security protocol based on hierarchically collaborative ant colony
by
Zhuo Yi
,
Ying Liao
,
Xuehui
Du
,
Xin Lu
,
Lifeng Cao
Published 2020-03-01
Get full text
Article
13
Multilevel Security Network Communication Model Based on Multidimensional Control
by
Lifeng Cao
,
Xin Lu
,
Zhensheng Gao
,
Mengda Han
,
Xuehui
Du
Published 2020-01-01
Get full text
Article
14
A Noninterference Model for Mobile OS Information Flow Control and Its Policy Verification
by
Zhanhui Yuan
,
Wenfa Li
,
Zhi Yang
,
Lei Sun
,
Xuehui
Du
,
Hongqi Zhang
Published 2021-01-01
Get full text
Article
15
Tenant-Led Ciphertext Information Flow Control for Cloud Virtual Machines
by
Zhao Zhang
,
Zhi Yang
,
Xuehui
Du
,
Wenfa Li
,
Xingyuan Chen
,
Lei Sun
Published 2021-01-01
Get full text
Article
Search Tools:
Get RSS Feed
—
Email this Search
Loading...