Search

Your search keyword '"Yang, Yixian"' showing total 121 results

Search Constraints

Start Over You searched for: Author "Yang, Yixian" Remove constraint Author: "Yang, Yixian" Database Academic Search Index Remove constraint Database: Academic Search Index
121 results on '"Yang, Yixian"'

Search Results

1. SP1-stimulated miR-208a-5p aggravates sepsis-induced myocardial injury via targeting XIAP.

2. A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.

3. SmartVeh: Secure and Efficient Message Access Control and Authentication for Vehicular Cloud Computing.

4. Games Based Study of Nonblind Confrontation.

5. A novel dicyanisophorone-based colorimetric and ratiometric fluorescent probe for the detection of hypochlorite in the environment and living cells.

6. Cellular Neural Network-Based Methods for Distributed Network Intrusion Detection.

7. Postfix automata.

8. Property dependence on particle size and sintering temperature of waste porcelain high‐temperature resistant material.

9. Fuzzy system identification via chaotic ant swarm

10. Computation of multiple global optima through chaotic ant swarm

11. Parameters identification of chaotic systems via chaotic ant swarm

12. Certificateless short signature scheme from pairing in the standard model.

13. Attributed community mining using joint general non-negative matrix factorization with graph Laplacian.

14. DECENT: Secure and fine-grained data access control with policy updating for constrained IoT devices.

15. A novel lipid droplets/lysosomes-targeting colorimetric and ratiometric fluorescent probe for Cu2+ and its application.

16. Multi-party quantum private information comparison based on nonlocal orthogonal product states.

17. A novel lipid droplets‐targeting fluorescent probe based on dicyanisophorone and carbazole for Cu2+ and its application.

18. A Novel Identity-Based Multi-Signcryption Scheme.

19. Topology Identification of Coupling Map Lattice under Sparsity Condition.

20. Robust and Efficient Authentication Scheme for Session Initiation Protocol.

21. Constructions and Weight Distributions of Optimal Locally Repairable Codes.

22. All exceptional groups of lie type have minimal logarithmic signatures.

23. Asymptotic stability of cellular neural networks with multiple proportional delays.

24. A Quantum Watermarking Protocol Based on Bell Dual Basis.

25. Hat problem: a new strategy based on quantum stabilizer codes.

26. Cyclic preparation of two-qubit state in two noisy environments.

27. Chameleon Hash Functions and One-Time Signature Schemes from Inner Automorphism Groups.

28. A local-world heterogeneous model of wireless sensor networks with node and link diversity

29. A new impossible differential attack on SAFER ciphers

30. Bounds on the number of hidden neurons in three-layer binary neural networks

31. Exchanging registered users' submitting reviews towards trajectory privacy preservation for review services in Location-Based Social Networks.

32. Deterministic Constructions of Compressed Sensing Matrices From Unitary Geometry.

33. Global asymptotic synchronization of fractional order multi‐linked memristive neural networks with time‐varying delays via discontinuous control.

34. A fast and efficient phenotyping method to estimate sugarcane stalk bending properties using near-infrared spectroscopy.

35. On the chaotic synchronization of Lorenz systems with time-varying lags

36. How does rumor spreading affect people inside and outside an institution.

37. Bounds and Constructions of Locally Repairable Codes: Parity-Check Matrix Approach.

38. A new fixed-time stability theorem and its application to the fixed-time synchronization of neural networks.

39. Analysis and Design of a 1-MHz Bidirectional Multi-CLLC Resonant DC–DC Converter With GaN Devices.

40. A Miniature CCA Public Key Encryption Scheme Based on Non-abelian Factorization Problem in Finite Groups of Lie Type.

41. A voice spoofing detection framework for IoT systems with feature pyramid and online knowledge distillation.

42. Asymptotic and finite-time synchronization of memristor-based switching networks with multi-links and impulsive perturbation.

43. A new fixed-time stability theorem and its application to the synchronization control of memristive neural networks.

44. Weighted pooling for image recognition of deep convolutional neural networks.

45. Secure two-party computation of solid triangle area and tetrahedral volume based on cloud platform.

46. Anonymous three-factor authenticated key agreement for wireless sensor networks.

47. Fixed-time synchronization of inertial memristor-based neural networks with discrete delay.

48. Finite‐time synchronization for memristor‐based BAM neural networks with stochastic perturbations and time‐varying delays.

49. Securing Named Data Networking: Attribute-Based Encryption and Beyond.

50. Incremental general non-negative matrix factorization without dimension matching constraints.

Catalog

Books, media, physical & digital resources