118 results on '"Li, Duan"'
Search Results
2. A Secure and Lightweight Aggregation Method for Blockchain-based Distributed Federated Learning.
3. Privacy-Preserving Approximate Calculation of Subgraphs in Social Networking Services.
4. TLSCG: Transfer Learning-Based Efficient Anomalous Smart Contract Generation to Empower Unknown Vulnerability Detection.
5. Exploiting Internal Randomness for Privacy in Vertical Federated Learning.
6. Liquid Democracy in DPoS Blockchains.
7. Force: Highly Efficient Four-Party Privacy-Preserving Machine Learning on GPU.
8. Cross-Consensus Measurement of Individual-level Decentralization in Blockchains.
9. Characterizing Coin-Based Voting Governance in DPoS Blockchains.
10. On the Privacy-Preserving Infrastructure for Authenticated Key Exchange.
11. Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography.
12. How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
13. Secure Cross-domain Medical Data Sharing based on Distributed Cloud and Blockchain Services.
14. A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking.
15. High-Speed Anonymous Device Authentication Without Asymmetric Cryptography in the Internet-of-Things.
16. A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology.
17. Continuous Perception for Classifying Shapes and Weights of Garments for Robotic Vision Applications.
18. Research on the Construction of Maritime Legal Knowledge Graph.
19. Perfect Anonymous Authentication and Secure Communication in Internet-of-Things.
20. Flexible Group Non-interactive Key Exchange in the Standard Model.
21. Keywords Extraction in Vertical Domain Based on Global Knowledge and Local Semantic Relations.
22. Lightweight key management system for inter-node communication in IoT.
23. Deep Unsupervised Workload Sequence Anomaly Detection with Fusion of Spatial and Temporal Features in the Cloud.
24. Non-interactive Certificate Update Protocol for Efficient Authentication in IoT.
25. A Reconfigurable Microservice-Based Migration Technique for IoT Systems.
26. Flexible certificate revocation list for efficient authentication in IoT.
27. Secure Deduplication of Encrypted Data: Refined Model and New Constructions.
28. Simulation of spaceborne 1064nm single-photon LiDAR for space target detection
29. A Cross-Layer Security Solution for Publish/Subscribe-Based IoT Services Communication Infrastructure.
30. Proactive Personalized Services in Large-Scale IoT-Based Healthcare Application.
31. Node Importance of Complex Networks Based on Cascading Failure Dynamic.
32. Model-Based Minimum Privacy Disclosure Recommendation for Authorization Policies.
33. Automated Policy Combination for Data Sharing across Multiple Organizations.
34. Optimizing Workload Category for Adaptive Workload Prediction in Service Clouds.
35. Space-division multiplexed multicore fiber Mach-Zehnder interferometer for joint temperature and strain sensing.
36. Event-Driven SOA for IoT Services.
37. Application on web mining for web usability analysis.
38. Research of Decentralized Collaborative Target Tracking Architecture in the Sea Battlefield for the Complex Sensor Networks.
39. Pattern Synthesis of Antennas Based on Particle Swarm Optimization Algorithm.
40. The Research of the Command and Control Model for the Naval Battle Groups with Multi-agent Theory.
41. Target tracking with interactive multiple model in geodetic coordinate system for naval ships cooperative engagement.
42. A Decentralized Fusion Algorithm Established in Geodetic Coordinate System for Naval Ships Cooperative Engagement.
43. GPI 2.0: pyramid wavefront sensor status
44. GPI 2.0: End-to-end simulations of the AO-coronagraph system
45. GPI 2.0: upgrade status of the Gemini Planet Imager
46. GPI 2.0: performance evaluation of the wavefront sensor’s EMCCD
47. Research on the Construction of Maritime Legal Knowledge Graph
48. Research of an online-offline blending teaching model for the post COVID-19 era—Using a C programming language course as an example
49. Application of wearable devices in sports: behavior change and result effect
50. Automated reflective optical system alignment: analysis and experiments
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.