Search

Your search keyword '"Hai J"' showing total 34 results

Search Constraints

Start Over You searched for: Author "Hai J" Remove constraint Author: "Hai J" Publisher ieee Remove constraint Publisher: ieee
34 results on '"Hai J"'

Search Results

4. A Model Combining Multi Branch Spectral-Temporal CNN, Efficient Channel Attention, and LightGBM for MI-BCI Classification

6. A Malware Detection Approach Using Autoencoder in Deep Learning

7. MH UNet: A Multi-Scale Hierarchical Based Architecture for Medical Image Segmentation

8. ATCS: Auto-Tuning Configurations of Big Data Frameworks Based on Generative Adversarial Nets

9. Numerical Studies of Electrokinetically Controlled Concentration of Diluted DNA Molecules in a T-Shaped Microchannel

10. ReGra: Accelerating Graph Traversal Applications Using ReRAM With Lower Communication Cost

11. Secure Data Sharing and Search for Cloud-Edge-Collaborative Storage

12. TLB Coalescing for Multi-Grained Page Migration in Hybrid Memory Systems

14. Echo: An Edge-Centric Code Offloading System With Quality of Service Guarantee

15. Mpchecker: Use-After-Free Vulnerabilities Protection Based on Multi-Level Pointers

16. Optimal Slot Length Configuration in Cognitive Radio Networks

17. ComQA: Question Answering Over Knowledge Base via Semantic Matching

18. Coverage, Capacity, and Error Rate Analysis of Multi-Hop Millimeter-Wave Decode and Forward Relaying

19. A Comparative Study of Deep Learning-Based Vulnerability Detection System

20. NGraph: Parallel Graph Processing in Hybrid Memory Systems

21. Multi-Objective Optimum Design of High-Speed Backplane Connector Using Particle Swarm Optimization

22. Entity-Based Language Model Smoothing Approach for Smart Search

23. A Fine-Grained Multi-Tenant Permission Management Framework for SDN and NFV

24. Coverage Analysis of Millimeter Wave Decode-and-Forward Networks With Best Relay Selection

25. BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation

26. Performance Analysis of Wireless Powered Incremental Relaying Networks With an Adaptive Harvest-Store-Use Strategy

27. A Large-Scale Study of I/O Workload’s Impact on Disk Failure

28. PrivGuard: Protecting Sensitive Kernel Data From Privilege Escalation Attacks

29. SBLWT: A Secure Blockchain Lightweight Wallet Based on Trustzone

30. Solving Anomalies in NFV-SDN Based Service Function Chaining Composition for IoT Network

31. Optimal Offloading in Fog Computing Systems With Non-Orthogonal Multiple Access

32. CloudVMI: A Cloud-Oriented Writable Virtual Machine Introspection

33. Fast and Parallel Keyword Search Over Public-Key Ciphertexts for Cloud-Assisted IoT

34. Patch-Related Vulnerability Detection Based on Symbolic Execution

Catalog

Books, media, physical & digital resources