644 results on '"Liu, Jiqiang"'
Search Results
52. A high-speed railway network dataset from train operation records and weather data
53. PrivMin: Differentially Private MinHash for Jaccard Similarity Computation
54. Blockchain-Based Access Control Mechanism in Electronic Evidence
55. Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning
56. Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack
57. Regulatory Functional Landscape of the HMX1 Gene for Normal Ear Development
58. Ligand Regulation Strategy to Modulate ROS Nature in a Rhodamine-Iridium(III) Hybrid System for Phototherapy
59. Malware Analysis Method Based Random Access Memory in Android
60. DNS Rebinding Detection for Local Internet of Things Devices
61. Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions
62. A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning
63. An Efficient Lattice-Based IBE Scheme Using Combined Public Key
64. Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control
65. A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection
66. Hafnium isotopic constraints on crustal assimilation in response to the tectono–magmatic evolution of the Okinawa Trough
67. Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning
68. Sensitive and responsive pentiptycene-based molecular fluorescence chemosensor for detection of polyamines
69. The Daxi Vent Field: An active mafic-hosted hydrothermal system at a non-transform offset on the slow-spreading Carlsberg Ridge, 6°48′N
70. Toward Learning Model-Agnostic Explanations for Deep Learning-Based Signal Modulation Classifiers
71. Identification of novel risk loci with shared effects on alcoholism, heroin, and methamphetamine dependence
72. SEC: A core hub during cell fate alteration.
73. Towards Building a Strong Transformer Neural Machine Translation System
74. IoT-Based DDoS Attack Detection and Mitigation Using the Edge of SDN
75. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
76. Toward conditionally anonymous Bitcoin transactions: A lightweight-script approach
77. Iridium(iii) complexes decorated with silicane-modified rhodamine: near-infrared light-initiated photosensitizers for efficient deep-tissue penetration photodynamic therapy
78. Secure and Scalable Blockchain for IIoT with Dual Compression Scheme
79. Camouflage Backdoor Attack against Pedestrian Detection
80. Backdoor Attack Influence Assessment and Analysis on Multi-Agent Training
81. How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance
82. Quantitative threat situational assessment method for higher secure attribute value device
83. The association between cumulative C-reactive protein and brachial–ankle pulse wave velocity
84. Fractional crystallization processes of magma beneath the Carlsberg Ridge (57°–65°E)
85. A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System
86. Efficient and Secure Outsourcing of Differentially Private Data Publication
87. A Method to Effectively Detect Vulnerabilities on Path Planning of VIN
88. A Cross-Modal CCA-Based Astroturfing Detection Approach
89. Post-Quantum Secure Remote Password Protocol from RLWE Problem
90. Interest Relevance-Based Caching Design in Content-Centric Networking
91. Magmatic sulfide formation and oxidative dissolution in the SW Okinawa Trough: A precursor to metal-bearing magmatic fluid
92. Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning
93. Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack
94. H2O in basaltic glasses from the slow-spreading Carlsberg Ridge: Implications for mantle source and magmatic processes
95. Automated Identification of Sensitive Financial Data Based on the Topic Analysis.
96. Toward Automatically Connecting IoT Devices with Vulnerabilities in the Wild
97. Financial Data Quality Evaluation Method Based on Multiple Linear Regression
98. Experience: Large-scale Cellular Localization for Pickup Position Recommendation at Black-hole
99. A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning
100. Sigma-1 receptor regulates the endoplasmic reticulum stress pathway in the protective mechanism of dexmedetomidine against hyperoxia-induced lung injury
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.