32 results on '"Liu, Jiqiang"'
Search Results
2. Lactate modulates zygotic genome activation through H3K18 lactylation rather than H3K27 acetylation
3. Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections
4. Predicting Congestion Attack of Variable Spoofing Frequency for Reliable Traffic Signal System
5. Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning
6. Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning
7. Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack
8. Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control
9. A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection
10. Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning
11. IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN
12. The association between cumulative C-reactive protein and brachial–ankle pulse wave velocity
13. A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System
14. Efficient and Secure Outsourcing of Differentially Private Data Publication
15. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN
16. A Cross-Modal CCA-Based Astroturfing Detection Approach
17. Post-Quantum Secure Remote Password Protocol from RLWE Problem
18. Interest Relevance-Based Caching Design in Content-Centric Networking
19. Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning
20. Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack
21. Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem
22. Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
23. A Hidden Astroturfing Detection Approach Base on Emotion Analysis
24. IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN
25. A Privacy-Aware Access Model on Anonymized Data
26. Interest Relevance-Based Caching Design in Content-Centric Networking
27. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN
28. Post-Quantum Secure Remote Password Protocol from RLWE Problem
29. A Cross-Modal CCA-Based Astroturfing Detection Approach
30. A Hidden Astroturfing Detection Approach Base on Emotion Analysis
31. Fast Discretized Gaussian Sampling and Post-quantum TLS Ciphersuite
32. A Privacy-Aware Access Model on Anonymized Data
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.