77 results on '"Zhihong Liu"'
Search Results
2. A Hybrid Feature Fusion Network for Predicting HER2 Status on H &E-Stained Histopathology Images.
3. 71 GHz-fmax β-Ga2O3-on-SiC RF Power MOSFETs with Record Pout=3.1 W/mm and PAE=50.8% at 2 GHz, Pout= 2.3 W/mm at 4 GHz, and Low Microwave Noise Figure.
4. DLPriv: Deep Learning Based Dynamic Location Privacy Mechanism for LBS in Internet-of-Vehicles.
5. Topological Loss on Graph Auto-Encoders.
6. Software Vulnerability Detection with GPT and In-Context Learning.
7. Contrastive Learning-Based Time Series Classification in Healthcare.
8. MT-CNN: A Classification Method of Encrypted Traffic Based on Semi-Supervised Learning.
9. Social Networks Based Robust Federated Learning for Encrypted Traffic Classification.
10. Encrypted Voice Traffic Fingerprinting: An Adaptive Network Traffic Feature Encoding Model.
11. 2D-Shapley: A Framework for Fragmented Data Valuation.
12. HLT: A Hierarchical Vulnerability Detection Model Based on Transformer.
13. Representing the Topology of Complex Networks Based on Graph Embedding.
14. Event-Based Obstacle Sensing and Avoidance for an UAV Through Deep Reinforcement Learning.
15. Trajectory Obfuscation and Detection in Internet-of-vehicles.
16. Ga2O3 Heterojunction PN Diodes with Suppressed Background Carrier Concentration for Improved Breakdown Voltage.
17. Autonomous Landing of a Rotor Unmanned Aerial Vehicle on a Boat Using Image-Based Visual Servoing.
18. Cold-start Recommendation Method Based on Homomorphic Encryption.
19. Pseudo 3D Auto-Correlation Network for Real Image Denoising.
20. Multi-Scale Selective Feedback Network with Dual Loss for Real Image Denoising.
21. Graph Embedding Based on Euclidean Distance Matrix and its Applications.
22. Pri-PGD: Forging privacy-preserving graph towards spectral-based graph neural network.
23. Covert Wireless Communications in the Presence of an Active Adversary.
24. Margin Loss Based On Adaptive Metric For Image Recognition.
25. Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy Approach.
26. Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization.
27. Accelerating Method of Evolutionary Ensemble Learning Based on Gaussian Random Field.
28. Feel Vibration: Challenge-Response Mobile Authentication with Covert Channel.
29. Intelligent station area recognition technology based on NB-IoT and SVM.
30. A Topology Based Differential Privacy Scheme for Average Path Length Query.
31. Comparison of Neural Networks' Performance in Early Screening of Autism Spectrum Disorders Under Two MRI Principles.
32. Research on Resolution Limit of Community Detection in Location-Based Social Networks.
33. Collective Influence Based Privacy Preservation for Social Networks.
34. Edge Weight Differential Privacy Based Spectral Query Algorithm.
35. Adaptive N-Gram Model Based Differentially Private Trajectory Synthesis Method.
36. Security Mechanisms to Provide Convoy Member Co-presence Authentication in Vehicle Platooning.
37. P3SGD: Patient Privacy Preserving SGD for Regularizing Deep CNNs in Pathological Image Classification.
38. Leader-Follower Formation Control of Unmanned Aerial Vehicles Based on Active Disturbances Rejection Control.
39. UAV Autonomous Landing using Visual Servo Control based on Aerostack.
40. Listen!: Audio-based Smart IoT Device Pairing Protocol.
41. G2C: A Generator-to-Classifier Framework Integrating Multi-Stained Visual Cues for Pathological Glomerulus Classification.
42. An Interpretable Machine Learning Survival Model for Predicting Long-term Kidney Outcomes in IgA Nephropathy.
43. Dispatching and management methods for communication of UAV swarm.
44. Preserving Privacy for Hubs and Links in Social Networks.
45. Exploiting Social Tie and SIR Characteristic for Cooperative Jamming: A Game Model in a Two-layer Network.
46. True Random Number Generation Using Process Scheduling of Android Systems.
47. Cooperative Jamming for Secrecy of Wireless Communications.
48. On Covert Communication with Interference Uncertainty.
49. A Secure Authentication Method of Intelligent Terminals Based on Jensen-Shannon Divergence.
50. Study of the Algorithm for the Classification of Brain Waves.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.