Search

Your search keyword '"Pan, Lei"' showing total 2,033 results

Search Constraints

Start Over You searched for: Author "Pan, Lei" Remove constraint Author: "Pan, Lei" Search Limiters Full Text Remove constraint Search Limiters: Full Text
2,033 results on '"Pan, Lei"'

Search Results

1. Generic non-Hermitian mobility edges in a class of duality-breaking quasicrystals

2. Smart energy management: process structure-based hybrid neural networks for optimal scheduling and economic predictive control in integrated systems

3. Dissipation induced transition between extension and localization in the three-dimensional Anderson model

4. RL-GSBridge: 3D Gaussian Splatting Based Real2Sim2Real Method for Robotic Manipulation Learning

5. Exact anomalous mobility edges in one-dimensional non-Hermitian quasicrystals

7. Highly stable and active catalyst in fuel cells through surface atomic ordering.

8. Probing the Robustness of Vision-Language Pretrained Models: A Multimodal Adversarial Attack Approach

9. Localization and mobility edges in non-Hermitian continuous quasiperiodic systems

10. Dissipation induced ergodic-nonergodic transitions in finite-height mosaic Wannier-Stark lattices

11. NeRF in Robotics: A Survey

12. Quantum Federated Learning Experiments in the Cloud with Data Encoding

14. Unsupervised Text Style Transfer via LLMs and Attention Masking with Multi-way Interactions

15. Liouvillian skin effect in a one-dimensional open many-body quantum system with generalized boundary conditions

17. Missing /y/: Vowel perception in bilinguals whose languages differ in whether the high front rounded vowel is phonemic

18. Terrain Diffusion Network: Climatic-Aware Terrain Generation with Geological Sketch Guidance

19. UIPC-MF: User-Item Prototype Connection Matrix Factorization for Explainable Collaborative Filtering

20. VulMatch: Binary-level Vulnerability Detection Through Signature

21. PSGformer: Enhancing 3D Point Cloud Instance Segmentation via Precise Semantic Guidance

28. Global fungal-host interactome mapping identifies host targets of candidalysin

32. Trustworthy Sensor Fusion against Inaudible Command Attacks in Advanced Driver-Assistance System

33. Distributed economic predictive control of integrated energy systems for enhanced synergy and grid response: A decomposition and cooperation strategy

34. Security and Privacy Problems in Voice Assistant Applications: A Survey

35. 3D Slicer and 3D printing localization combined with neuroendoscopic surgery for the treatment of deep cerebral cavernous hemangioma

36. Design of Equivalent Consumption Minimization Strategy for Hydrogen UAV

37. Neuroendoscopic Parafascicular Evacuation of Spontaneous Intracerebral Hemorrhage (NESICH Technique): A Multicenter Technical Experience with Preliminary Findings

38. Clinical application of transcranial neuroendoscopy combined with supraorbital keyhole approach in minimally invasive surgery of the anterior skull base

39. Strain-adjustable reflectivity of polyurethane nanofiber membrane for thermal management applications

40. Low-damage electron beam lithography for nanostructures on Bi$_2$Te$_3$-class topological insulator thin films

41. 3D Slicer combined with neuroendoscopic surgery for the treatment of basal ganglia hemorrhage after cranioplasty: A case report and literature review

42. Non-Hermitian skin effect in one-dimensional interacting Bose gas

43. Hiding Your Signals: A Security Analysis of PPG-based Biometric Authentication

44. Long-lag identity priming in the absence of long-lag morphological priming: evidence from Mandarin tone alternation

45. 3D Slicer reconstruction combined with neuroendoscopic keyhole approach for the treatment of cerebrospinal fluid rhinorrhea:2 cases report and literature review

46. The analysis of the threshold value of the complex short-circuit ratio index and its significance in the context of static voltage stability

47. Economic model predictive control of integrated energy systems: A multi-time-scale framework

48. Exchange-biased quantum anomalous Hall effect

49. Weak-Key Analysis for BIKE Post-Quantum Key Encapsulation Mechanism

50. Towards Privacy-Preserving Neural Architecture Search

Catalog

Books, media, physical & digital resources