140 results on '"Qiang Zeng"'
Search Results
2. Seeing Is Believing: Extracting Semantic Information from Video for Verifying IoT Events.
3. From One Thousand Pages of Specification to Unveiling Hidden Bugs: Large Language Model Assisted Fuzzing of Matter IoT Devices.
4. Do You See How I Pose? Using Poses as an Implicit Authentication Factor for QR Code Payment.
5. Detecting Community Structure in Complex Networks with Backbone Guided Search Algorithm.
6. Can a Deep Learning Model for One Architecture Be Used for Others? Retargeted-Architecture Binary Code Analysis.
7. Detecting and Handling IoT Interaction Threats in Multi-Platform Multi-Control-Channel Smart Homes.
8. UMMAFormer: A Universal Multimodal-adaptive Transformer Framework for Temporal Forgery Localization.
9. A Discriminative Multi-Channel Noise Feature Representation Model for Image Manipulation Localization.
10. A Parallel Attention Mechanism for Image Manipulation Detection and Localization.
11. Research on the Innovative Development Countermeasures of Higher Continuing Education Under the Background of 'Double First-Class' Construction.
12. No More Companion Apps Hacking but One Dongle: Hub-Based Blackbox Fuzzing of IoT Firmware.
13. FPGA Implementation of Low-Latency Recursive Median Filter.
14. IoT Phantom-Delay Attacks: Demystifying and Exploiting IoT Timeout Behaviors.
15. Neighborhood Combination Strategies for Solving the Bi-objective Max-Bisection Problem.
16. Authentication for drone delivery through a novel way of using face biometrics.
17. Delay Wreaks Havoc on Your Smart Home: Delay-based Automation Interference Attacks.
18. An Energy-Constrained Optimization-Based Structured Pruning Method for Deep Neural Network Compression.
19. G2Auth: secure mutual authentication for drone delivery without special user-side hardware.
20. Accurate 3d Kidney Segmentation Using Unsupervised Domain Translation And Adversarial Networks.
21. HAWatcher: Semantics-Aware Anomaly Detection for Appified Smart Homes.
22. Westworld: Fuzzing-Assisted Remote Dynamic Symbolic Execution of Smart Apps on IoT Cloud Platforms.
23. SniffMislead: Non-Intrusive Privacy Protection against Wireless Packet Sniffers in Smart Homes.
24. Exploiting the Sensitivity of L2 Adversarial Examples to Erase-and-Restore.
25. Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling.
26. A11 Your PLCs Belong to Me: ICS Ransomware Is Realistic.
27. Attacking Graph-Based Classification without Changing Existing Connections.
28. T2Pair: Secure and Usable Pairing for Heterogeneous IoT Devices.
29. HeapTherapy+: Efficient Handling of (Almost) All Heap Vulnerabilities Using Targeted Calling-Context Encoding.
30. A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples.
31. A Percolation Algorithm to Discover Emerging Research Topics.
32. Touch Well Before Use: Intuitive and Secure Authentication for IoT Devices.
33. Exploiting the Inherent Limitation of L0 Adversarial Examples.
34. POKs Based Secure and Energy-Efficient Access Control for Implantable Medical Devices.
35. Discovering Emerging Research Topics Based on SPO Predications.
36. PFirewall: Semantics-Aware Customizable Data Flow Control for Smart Home Privacy Protection.
37. Solving Bi-criteria Maximum Diversity Problem with Multi-objective Multi-level Algorithm.
38. e-SAFE: Secure, Efficient and Forensics-Enabled Access to Implantable Medical Devices.
39. Condition Monitoring and Fault Diagnosis Based on Multipoint Optimal Minimum Entropy Deconvolution Adjusted Technique.
40. Fault Diagnosis of Planetary Gearboxes via Processing the On-Rotor MEMS Accelerometer Signals.
41. Resilient decentralized Android application repackaging detection using logic bombs.
42. Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study.
43. A Method of Biomedical Knowledge Discovery by Literature Mining Based on SPO Predications: A Case Study of Induced Pluripotent Stem Cells.
44. Solving the Bi-criteria Max-Cut Problem with Different Neighborhood Combination Strategies.
45. Hypervolume-Based Multi-level Algorithm for the Bi-criteria Max-Cut Problem.
46. Experiments on Neighborhood Combination Strategies for Bi-objective Unconstrained Binary Quadratic Programming Problem.
47. Planetary gearbox fault diagnosis using an on-rotor MEMS accelerometer.
48. Planetary gear fault diagnosis based on instantaneous angular speed analysis.
49. Mining Hot Research Topics based on Complex Network Analysis - A Case Study on Regenerative Medicine.
50. Partial Least Squares Regression Based Facial Age Estimation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.