-
1
-
2
-
3“... improves the security of the image in the transmission process. Next, we process the image in the cloud...”
Get full text
Article -
4“... proposed a security and efficient multi-authority ABE scheme from lattices in this paper. The scheme...”
Get full text
Article -
5
-
6“... on the number of encoding nodes, which can characterize the coding complexity of the network coding, both...”
Get full text
Article -
7“... and dynamically evolving networks, we demonstrate that the proposed strategy can effectively send security patches...”
Get full text
Article -
8“...Abstract Understanding the spreading mechanisms of social contagions in complex network systems has...”
Get full text
Article -
9“...This paper presents an improved model of echo state networks (ESNs) and gives the definitions...”
Get full text
Article -
10by Weiping Wang, Lixiang Li, Haipeng Peng, Jialiang Yuan, Jinghua Xiao, Yixian Yang“...This paper studies the synchronization of complex dynamical networks with multilinks and similar...”
Published 2013-01-01
Get full text
Article -
11
-
12“...In network security, how to use efficient response methods against cascading failures of complex...”
Get full text
Article -
13“...Searching and retrieving the demanded correct information is one important problem in networks...”
Get full text
Article -
14“...Nowadays, the topology of complex networks is essential in various fields as engineering, biology...”
Get full text
Article -
15“... neural networks (MBAMNNs) with probabilistic and mixed time-varying delays. By applying random variables...”
Get full text
Article -
16“... networks. The considered dynamical networks with multilinks contain only one transmittal time-varying delay...”
Get full text
Article -
17
-
18
-
19Identifying Vulnerable Nodes of Complex Networks in Cascading Failures Induced by Node-Based Attacks“...In the research on network security, distinguishing the vulnerable components of networks is very...”
Get full text
Article -
20