Search

Your search keyword '"XIMENG LIU"' showing total 86 results

Search Constraints

Start Over You searched for: Author "XIMENG LIU" Remove constraint Author: "XIMENG LIU" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
86 results on '"XIMENG LIU"'

Search Results

1. Challenges and Opportunities in Preserving Key Structural Features of 3D-Printed Metal/Covalent Organic Framework

2. Traditional and non-traditional lipid parameters as risk factors for sudden sensorineural hearing loss

3. Functions, accumulation, and biosynthesis of important secondary metabolites in the fig tree (Ficus carica)

4. Rational-security and fair two-party comparison protocol

5. Analysis of Ginkgo biloba Root Exudates and Inhibition of Soil Fungi by Flavonoids and Terpene Lactones

6. Real-world treatment patterns in patients with nontuberculous mycobacterial lung disease in the Netherlands based on medication dispensing data

7. Frameworked electrolytes: Ionic transport behavior and high mobility for solid state batteries

8. A fine-grained detection method for gate-level hardware Trojan base on bidirectional Graph Neural Networks

9. DAGUARD: distributed backdoor attack defense scheme under federated learning

10. Electrochromic-Induced Rechargeable Aqueous Batteries: An Integrated Multifunctional System for Cross-Domain Applications

11. Two-Phase Fermentation Systems for Microbial Production of Plant-Derived Terpenes

12. Quasi‐Copper‐Mers Enable High‐Performance Catalysis for CO2 Reduction

13. Privacy-preserving association rule mining via multi-key fully homomorphic encryption

14. A Reliable and Secure Mobile Cyber-Physical Digital Microfluidic Biochip for Intelligent Healthcare

15. Network security of the National Natural Science Foundation of China: today and prospects

16. Adversarial training driven malicious code detection enhancement method

17. FedECG: A federated semi-supervised learning framework for electrocardiogram abnormalities prediction

18. Further results on permutation polynomials and complete permutation polynomials over finite fields

19. 3D printed pure carbon-based electrodes for zinc-ion hybrid supercapacitor

20. A Cost-Driven Method for Deep-Learning-Based Hardware Trojan Detection

21. Lightweight privacy protection data auditing scheme for regenerating-coding-based distributed storage

22. Approximation method of multiple consistency constraint under differential privacy

23. Blockchain-based distributed EHR fine-grained traceability scheme

24. Design strategies for MOF-derived porous functional materials: Preserving surfaces and nurturing pores

25. Reliability evaluation of hierarchical hypercube network

26. Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption

27. Privacy and Security Issues in Deep Learning: A Survey

28. Seamless alloying stabilizes solid-electrolyte interphase for highly reversible lithium metal anode

29. Towards edge-collaborative,lightweight and secure region proposal network

30. Adversarial attacks and defenses in deep learning

31. Lightning-fast and privacy-preserving outsourced computation in the cloud

32. Design method of secure computing protocol for deep neural network

33. Privacy-preserving real-time road conditions monitoring scheme based on intelligent traffic

34. Lightweight Revocable Hierarchical Attribute-Based Encryption for Internet of Things

35. An Unsupervised Detection Approach for Hardware Trojans

36. A Secure Enhanced Key-Policy Attribute-Based Temporary Keyword Search Scheme in the Cloud

37. DVIT—A Decentralized Virtual Items Trading Forum with Reputation System

38. Quasi‐Paired Pt Atomic Sites on Mo2C Promoting Selective Four‐Electron Oxygen Reduction

39. The Sensitivity Design of Piezoresistive Acceleration Sensor in Industrial IoT

40. A Multi-Layer Hardware Trojan Protection Framework for IoT Chips

41. Dual-Search Artificial Bee Colony Algorithm for Engineering Optimization

42. Privacy-Preserving Collaborative Model Learning Scheme for E-Healthcare

43. Secure Encrypted Data With Authorized Deduplication in Cloud

44. Blockchain-Based Verifiable Multi-Keyword Ranked Search on Encrypted Cloud With Fair Payment

45. A Comprehensive Survey on Secure Outsourced Computation and Its Applications

46. A Locating Method for Multi-Purposes HTs Based on the Boundary Network

47. Direct Pyrolysis of a Manganese‐Triazolate Metal–Organic Framework into Air‐Stable Manganese Nitride Nanoparticles

48. A Class of New Permutation Polynomials over F2n

49. Metastatic Tumor Cell-Specific FABP7 Promotes NSCLC Metastasis via Inhibiting β-Catenin Degradation

50. An Efficient and Privacy-Preserving Biometric Identification Scheme in Cloud Computing

Catalog

Books, media, physical & digital resources