2,729 results on '"Weng, Jian"'
Search Results
452. Peripheral-Free Device Pairing by Randomly Switching Power
453. VFIRM: Verifiable Fine-Grained Encrypted Image Retrieval in Multi-Owner Multi-User Settings
454. ZeroCross: A sidechain-based privacy-preserving Cross-chain solution for Monero
455. Endothelial dysfunction in COVID-19: an overview of evidence, biomarkers, mechanisms and potential therapies
456. Concurrent and efficient IoT data trading based on probabilistic micropayments
457. Thin Nano Cages with Limited Hollow Space for Ultrahigh Sulfur Loading Lithium–Sulfur Batteries
458. OverGen: Improving FPGA Usability through Domain-specific Overlay Generation
459. Improvements on Non-Interactive Zero-Knowledge Proof Systems Related to Quadratic Residuosity Languages
460. Analysis of ID Sequences Similarity Using DTW in Intrusion Detection for CAN Bus
461. Optionally Identifiable Private Handshakes
462. Generic Constructions of Parallel Key-Insulated Encryption
463. Zero-Knowledge Argument for Simultaneous Discrete Logarithms
464. Efficient Unidirectional Proxy Re-Encryption
465. Corrigendum to ‘Teriparatide ameliorates articular cartilage degradation and aberrant subchondral bone remodeling in DMM mice’ [J. Orthop. Transl.] 38 (2023) 241–255]
466. Towards semantically secure outsourcing of association rule mining on categorical data
467. Effectiveness of Different Waist Circumference Cut-off Values in Predicting Metabolic Syndrome Prevalence and Risk Factors in Adults in China
468. Self-enforcing Private Inference Control
469. Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
470. Conditional Proxy Broadcast Re-Encryption
471. JEŚMANOWICZ’ CONJECTURE WITH FERMAT NUMBERS
472. Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
473. Identity-Based Threshold Key-Insulated Encryption without Random Oracles
474. Steganalysis with CNN Using Multi-channels Filtered Residuals
475. Multiple Watermarking Using Multilevel Quantization Index Modulation
476. New Proof for BKP IBE Scheme and Improvement in the MIMC Setting
477. IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper)
478. Improved Algorithms for Robust Histogram Shape-Based Image Watermarking
479. Identity-Based Key-Insulated Signature Without Random Oracles
480. Multi-axis ball-end milling force prediction model considering the influence of cutting edge.
481. Update to the Quaternary Stratigraphic Division in Xiaoshao Plain, Zhejiang, China.
482. Single-server blind quantum computation with quantum circuit model
483. Fully distributed certificateless threshold signature without random oracles
484. Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction
485. Identity-Based Key-Insulated Signature with Secure Key-Updates
486. Dynamic Moore–Penrose Inversion With Unknown Derivatives: Gradient Neural Network Approach
487. TAGKA: Threshold Authenticated Group Key Agreement Protocol Against Member Disconnect for UANET
488. Cloud-based electronic health record system supporting fuzzy keyword search
489. Design and thermal analysis of a water-cooled DSC module
490. Identification of loci contributing to maize drought tolerance in a genome-wide association study
491. Mutant C/EBPα p30 alleviates immunosuppression of CD8+T cells by inhibiting autophagy‐associated secretion of IL‐1β in AML
492. Thymic epithelial tumors: examining the GTF2I mutation and developing a novel prognostic signature with LncRNA pairs to predict tumor recurrence
493. Leveraging Domain Adaptation as a Defense Against Membership Inference Attacks
494. Enhanced Informed Dynamic BP Decoding Scheduling Strategies for 5G NR LDPC Codes
495. ARPLR: An All-Round and Highly Privacy-Preserving Location-Based Routing Scheme for VANETs
496. Unifying Spatial Accelerator Compilation With Idiomatic and Modular Transformations
497. Golden Grain: Building a Secure and Decentralized Model Marketplace for MLaaS
498. Simplex cerebral cavernous malformations with MAP3K3 mutation have distinct clinical characteristics
499. Seq2Path: a sequence-to-path-based flow feature fusion approach for encrypted traffic classification
500. Adult-Onset Still Disease After ChadOx1 nCOV-19 Vaccination
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.