59 results on '"Bian, Genqing"'
Search Results
2. Different secure semi-quantum summation models without measurement
3. Semi-supervised lung nodule detection with adversarial learning
4. Different Secure Semi-quantum Summation Models without Measurement
5. A Lightweight Identity-Based Network Coding Scheme for Internet of Medical Things
6. Application of forecasting strategies and techniques to natural gas consumption: A comprehensive review and comparative study
7. Redact4Trace: A solution for auditing the data and tracing the users in the redactable blockchain
8. Design and implementation of user task offloading algorithm
9. Research on Performance Optimization of Spark Distributed Computing Platform
10. Redact-Chain for Health: A Scheme Based on Redactable Blockchain for Managing Shared Healthcare Data
11. Real-time portrait image retouching extended from DualBLN
12. A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things
13. Identification of Grape Diseases Based on Improved YOLOXS
14. Natural Gas Load forecasting based on the fusion of VMD-SE and CNN-BiLSTM-Attention
15. Blockchain-Based Trusted Federated Learning with Pre-Trained Models for COVID-19 Detection
16. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity
17. A Novel Process Recommendation Method That Integrates Disjoint Paths and Sequential Patterns
18. Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
19. Dynamic decision-making strategy of replica number based on data hot
20. File block multi-replica management technology in cloud storage
21. Redact4trace: A Solution for Auditing the Data and Tracing the Users in the Redactable Blockchain
22. Certificateless Data Integrity Auditing in Cloud Storage with a Designated Verifier and User Privacy Preservation
23. Certificateless Remote Data Integrity Auditing with Access Control of Sensitive Information in Cloud Storage
24. Real-time network virtualization based on SDN and Docker container
25. A Hybrid Approach by CEEMDAN-Improved PSO-LSTM Model for Network Traffic Prediction
26. Comment on “A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage”
27. Certificateless network coding scheme from certificateless public auditing protocol
28. RTFTL: design and implementation of real-time FTL algorithm for flash memory
29. Dimensionality reduction method of dynamic networks for evolutionary mechanism of neuronal systems
30. A hybrid deep learning approach by integrating extreme gradient boosting‐long short‐term memory with generalized autoregressive conditional heteroscedasticity family models for natural gas load volatility prediction
31. Analysis of Influencing Factors and Trend Forecast of CO2 Emission in Chengdu-Chongqing Urban Agglomeration
32. Data Integrity Audit based on Data Blinding for Cloud and Fog Environment
33. Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier
34. The Research of Spark Memory Optimization Based on Non-Volatile Memory
35. Research on Data Routing Strategy of Deduplication in Cloud Environment
36. Research on key technologies of NBD storage service system based on load classification
37. Certificateless Network Coding Scheme from Certificateless Public Auditing Protocol
38. Construction of Software and Hardware Resource Pool in Data Center Using Virtualization
39. Wind Speed Forecast Based on the LSTM Neural Network Optimized by the Firework Algorithm
40. Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
41. A survey of research hotspots and frontier trends of recommendation systems from the perspective of knowledge graph
42. TCFTL: Improved Real-Time Flash Memory Two Cache Flash Translation Layer Algorithm
43. Research on Routing Strategy in Cluster Deduplication System
44. Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited
45. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
46. Comment on “A Tag Encoding Scheme Against Pollution Attack to Linear Network Coding”
47. Research on Multifeature Data Routing Strategy in Deduplication
48. Network-Aware Data Placement Strategy in Storage Cluster System
49. Certificateless Provable Data Possession Protocol for the Multiple Copies and Clouds Case
50. A Survey of Research Progress and Hot Front of Natural Gas Load Forecasting From Technical Perspective
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.