Search

Your search keyword '"Li, ZhenYu"' showing total 42 results

Search Constraints

Start Over You searched for: Author "Li, ZhenYu" Remove constraint Author: "Li, ZhenYu" Publication Type eBooks Remove constraint Publication Type: eBooks
42 results on '"Li, ZhenYu"'

Search Results

1. GMM-CoRegNet: A Multimodal Groupwise Registration Framework Based on Gaussian Mixture Model

2. Patronum: In-network Volumetric DDoS Detection and Mitigation with Programmable Switches

3. ECHO: Adaptive Correction for Subgraph-Wise Sampling with Lightweight Hyperparameter Search

4. Dom-BERT: Detecting Malicious Domains with Pre-training Model

5. Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks

10. Efficient Single-Image Depth Estimation on Mobile Devices, Mobile AI & AIM 2022 Challenge: Report

11. LiteDepth: Digging into Fast and Accurate Depth Estimation on Mobile Devices

12. Developing Relationships: A Heterogeneous Graph Network with Learnable Edge Representation for Emotion Identification in Conversations

13. Deformable Feature Aggregation for Dynamic Multi-modal 3D Object Detection

14. Unsupervised Domain Adaptation for Monocular 3D Object Detection via Self-training

15. MicroCBR: Case-Based Reasoning on Spatio-temporal Fault Knowledge Graph for Microservices Troubleshooting

16. Group Sparsity Regularized High Order Tensor for HSIs Super-Resolution

17. Low-Rank Tensor Tucker Decomposition for Hyperspectral Images Super-Resolution

18. The Evaluation of Electric Power Emergency Plan Exercise Based on EMD Method

19. Research on Fast Location Method of Fault Line Based on Intelligent Power Emergency Plan Mode

20. Research on the Voltage Balance Ability of Platinum Electrode in Valve Water Cooling System Based on Leakage Current Ripple Factor

21. An Anti-forensic Method Based on RS Coding and Distributed Storage

22. Incremental Forensics Snapshot of Digital Evidence Method Using Differencing Algorithm and Blockchain

23. 'Blockchain + Rule of Law' and Modernization of Social Governance

24. Evil Chaincode: APT Attacks Based on Smart Contract

25. Exploring the Eastern Frontier: A First Look at Mobile App Tracking in China

27. Mobile Content Hosting Infrastructure in China: A View from a Cellular ISP

28. 3D Steganalysis Using Laplacian Smoothing at Various Levels

29. Algorithm of Multi-camera Object Handoff Based on Object Mapping

30. A Median Filtering Forensics Approach Based on Machine Learning

40. Efficient Multi-source Data Dissemination in Peer-to-Peer Networks

Catalog

Books, media, physical & digital resources