97 results on '"Li, Ninghui"'
Search Results
2. An off-grid direction-of-arrival estimator based on sparse Bayesian learning with three-stage hierarchical Laplace priors
3. The impact of farmland use transition on rural livelihood transformation in China
4. Municipal solid waste classification and real-time detection using deep learning methods
5. A Bayesian Deep Unfolded Network for the Off-Grid Direction-of-Arrival Estimation via a Minimum Hole Array.
6. Surviving in the Digital Environment: Does Survival Processing Provide an Additional Memory Benefit to Password Generation Strategies?
7. Numerical simulation and experimental study on laser micromachining of 304L stainless steel in ambient air
8. The description-experience gap in the effect of warning reliability on user trust and performance in a phishing-detection context
9. Contributions From Cloud Morphological Changes to the Interannual Shortwave Cloud Feedback Based on MODIS and ISCCP Satellite Observations.
10. Direction-of-Arrival Estimation via Sparse Bayesian Learning Exploiting Hierarchical Priors with Low Complexity.
11. The bHLH transcription factor GmPIB1 facilitates resistance to Phytophthora sojae in Glycine max
12. Influence of privacy priming and security framing on mobile app selection
13. Enhancing security behaviour by supporting the user
14. Fabrication of Regular Hierarchical Structures with Superhydrophobic and High Adhesion Performances on a 304 Stainless Steel Surface via Picosecond Laser
15. Trade Reform, Household Effects, and Poverty in Rural China
16. PrivPfC: differentially private data publication for classification
17. Impact of drying method of figs with small-scale flat-plate solar collector
18. Current Status of Research on Electrodeposited Ni-W Alloy Coating
19. Identification of factors impacting on the transmission and mortality of COVID-19.
20. Wideband DOA Estimation Utilizing a Hierarchical Prior Based on Variational Bayesian Inference.
21. The use of remote Femto Second technology in the preparation of black silicon material and optical devices.
22. Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments.
23. Physiological and Transcriptome Analysis Reveals the Differences in Genes of Antioxidative Defense Components and Cold-Related Proteins in Winter and Spring Wheat during Cold Acclimation.
24. The impact of the Doha trade proposals on farmers’ incomes in China
25. Fine-grained integration of access control policies
26. GmWAK1, Novel Wall-Associated Protein Kinase, Positively Regulates Response of Soybean to Phytophthora sojae Infection.
27. Sun Glint Correction Based on BRDF Model for Improving the HY-1C/COCTS Clear-Sky Coverage.
28. What I Say Means What I Do: Risk Concerns and Mobile Application-Selection Behaviors.
29. Towards optimal k-anonymization
30. EXAM: a comprehensive environment for the analysis of access control policies
31. Improvement of pristinamycin production by genome shuffling and medium optimization for Streptomyces pristinaespiralis
32. Denial of service attacks and defenses in decentralized trust management
33. Purpose based access control for privacy protection in relational database systems
34. On the feasibility of crawling-based attacks against recommender systems1.
35. Automatic generation of sources lemmas in Tamarin : Towards automatic proofs of security protocols1.
36. Towards post-quantum security for cyber-physical systems: Integrating PQC into industrial M2M communication1.
37. Understanding SPKI/SDSI using first-order logic
38. Agricultural trade liberalization and poverty in China
39. Oblivious signature-based envelope
40. Embedding Training Within Warnings Improves Skills of Identifying Phishing Webpages.
41. Federation in genomics pipelines: techniques and challenges.
42. Effects of Different Drying Methods on Some Physical and Chemical Properties of Loquat (Eriobotrya japonica) Fruits.
43. Evolution of surface topography of 304L stainless steel irradiated by long pulse laser.
44. Is Domain Highlighting Actually Helpful in Identifying Phishing Web Pages?
45. A Study of Probabilistic Password Models.
46. Differentially private grids for geospatial data.
47. Anonymizing Network Traces with Temporal Pseudonym Consistency.
48. A New Construction of Zero-Knowledge Sets Secure in Random Oracle Model.
49. Denial of Service Attacks and Defenses in Decentralized Trust Management.
50. The Foundational Work of Harrison-Ruzzo-Ullman Revisited.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.