513 results on '"Yuancheng Li"'
Search Results
102. Identity authentication for edge devices based on zero-trust architecture.
103. An Energy-Aware Virtual Machine Scheduling Method for Cloudlets in Wireless Metropolitan Area Networks.
104. Construction of User Electricity Behavior Portrait based on QFPAKmeans Clustering
105. An Improved Informer Network for Short-Term Electric Load Forecasting
106. An energy-aware computation offloading method for smart edge computing in wireless metropolitan area networks.
107. Privacy-preserving lightweight face recognition.
108. Denial of service attack and defense method on load frequency control system.
109. Transformer Fault Diagnosis Method based on PSO-GMNN Model
110. Success Secret of Apple: How Does It 'Manipulate' Consumers’ Behaviors
111. Exploring thread-level parallelism based on cost-driven model for irregular programs.
112. Web spam classification method based on deep belief networks.
113. Energy-Efficient Cloudlet Management for Privacy Preservation in Wireless Metropolitan Area Networks.
114. A Multi-Keywords Ranking Searchable Encryption Based on Similarity in Cloud Computing.
115. A Charging and Discharging Model for Electric Vehicles based on Consortium Blockchain Using Multi-Objective Gray Wolf Algorithm
116. Virtual network function deployment algorithm based on graph convolution deep reinforcement learning
117. Multi-constraints in deep graph convolutional networks with initial residual
118. Tumor integrin targeted theranostic iron oxide nanoparticles for delivery of caffeic acid phenethyl ester: preparation, characterization, and anti-myeloma activities.
119. DDoS attack detection in smart grid network using reconstructive machine learning models.
120. Using Deep Neural Network for Android Malware Detection.
121. Android Malware Detection Using Autoencoder.
122. Deep Adversarial Imitation Reinforcement Learning for QoS-Aware Cloud Job Scheduling
123. Quantum-based anonymity and secure veto.
124. Quantum Bell states-based anonymous voting with anonymity trace.
125. A coloring and timing brain-computer interface for the nursing bed robot.
126. Maximum weight multi-modal information fusion algorithm of electroencephalographs and face images for emotion recognition.
127. Non-maximum suppression for object detection based on the chaotic whale optimization algorithm.
128. An APT Attack Detection Method of a New-type Power System Based on STSA-transformer
129. Astragaloside IV suppresses the migration and EMT progression of cervical cancer cells by inhibiting macrophage M2 polarization through TGFβ/Smad2/3 signaling
130. Functional characterization and clinical significance of super‐enhancers in lung adenocarcinoma
131. Improved Wasserstein Generative Adversarial Networks Defense Method Against Data Integrity Attack on Smart Grid
132. CRbS: A Code Reordering Based Speeding-up Method of Irregular Loops on CMP.
133. Quantum anonymous ranking and selection with verifiability.
134. Developing graphical detection techniques for maintaining state estimation integrity against false data injection attack in integrated electric cyber-physical system.
135. Semantically find similar binary codes with mixed key instruction sequence.
136. A Review on The Use of Deep Learning in Android Malware Detection.
137. Permissioned Blockchain-based Trustworthy Edge Storage Scheme for Smart Grid
138. A Fine-grained Dynamic Access Control Method for Power IoT Based on Kformer
139. Edge Computing with Complementary Capsule Networks for Mental State Detection in Underground Mining Industry
140. Supplemental Tables 2-6 from Selective Detection of the D-enantiomer of 2-Hydroxyglutarate in the CSF of Glioma Patients with Mutated Isocitrate Dehydrogenase
141. Suppl. Table 1 from Selective Detection of the D-enantiomer of 2-Hydroxyglutarate in the CSF of Glioma Patients with Mutated Isocitrate Dehydrogenase
142. Data from Selective Detection of the D-enantiomer of 2-Hydroxyglutarate in the CSF of Glioma Patients with Mutated Isocitrate Dehydrogenase
143. A Novel Glucose-6-Phosphate Isomerase Exists in Chicken Breast Meat: A Selenium-Containing Enzyme that Should Be Re-recognized Through New Eyes
144. A two-step lighting DNA tetrahedral nanoprobe for precise imaging-guided photodynamic therapy of tumors
145. Iron oxide nanoparticles: Magnetic and biological properties
146. Efficacy of lymph node dissection on stage IIICr of cervical cancer before CCRT: study protocol for a phase III, randomized controlled clinical trial (CQGOG0103)
147. Iron oxide nanoparticles for magnetic resonance imaging
148. A Data Structure Centric Method and Execution Model for Partitioning Sequential Programs into Multiple Speculative Threads.
149. Controllable preparation of microtips array on (100) crystal plane of single‐crystal lanthanum hexaboride ceramic
150. Hierarchical-Attention-Based Defense Method for Load Frequency Control System Against DoS Attack
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.