638 results on '"Zhang, Xuhong"'
Search Results
102. The effects of colour and temporal frequency of flickering light on variability of the accommodation response in emmetropes and myopes
103. Comparative transcriptome analysis of the garden asparagus (Asparagus officinalis L.) reveals the molecular mechanism for growth with arbuscular mycorrhizal fungi under salinity stress
104. Cloning and expression analysis of LoCCD8 during IAA-induced bulbils outgrowth in lily (Oriental Hybrid ‘Sorbonne’)
105. Towards Practical Backdoor Attacks on Federated Learning Systems
106. EdgePro: Edge Deep Learning Model Protection via Neuron Authorization
107. Diff-ID: An Explainable Identity Difference Quantification Framework for DeepFake Detection
108. Causal association between immune cell traits and Ankylosing Spondylitis: A bidirectional Mendelian randomization study
109. Hijack Vertical Federated Learning Models As One Party
110. Hippocampal mitophagy contributes to spatial memory via maintaining neurogenesis during the development of mice.
111. List of contributors
112. DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax Transformation
113. Artificial intelligence for pathology
114. Retinal VIP-amacrine cells: their development, structure, and function
115. Facile synthesis of ternary CdIn2S4/In(OH)3/Zn2GeO4 nanocomposite with enhanced visible-light photocatalytic H2 evolution
116. Dual-channel sensing of CO2: Reversible solution-gel transition and gelation-induced fluorescence enhancement
117. DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models
118. Efficient Query-Based Attack against ML-Based Android Malware Detection under Zero Knowledge Setting
119. Community-Based Hierarchical Positive-Unlabeled (PU) Model Fusion for Chronic Disease Prediction
120. In situ preparation of (BiO)2CO3/BiOBr sheet-on-sheet heterojunctions with enhanced visible light photocatalytic activity
121. Relapsing viral keratoconjunctivitis in COVID-19: a case report
122. Understanding the Security Risks of Docker Hub
123. Risk factors, microbiology and management of infected lymphocyst after lymphadenectomy for gynecologic malignancies
124. A bamboo-inspired hierarchical nanoarchitecture of Ag/CuO/TiO2 nanotube array for highly photocatalytic degradation of 2,4-dinitrophenol
125. UNIO: A Unified I/O System Framework for Hybrid Scientific Workflow
126. Sequence comparison, molecular modeling, and network analysis predict structural diversity in cysteine proteases from the Cape sundew, Drosera capensis
127. Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
128. How ChatGPT is Solving Vulnerability Management Problem
129. DEEPFAKER: A Unified Evaluation Platform for Facial Deepfake and Detection Models.
130. How IoT Re-using Threatens Your Sensitive Data: Exploring the User-Data Disposal in Used IoT Devices
131. Effect of Altitude Training on Erythropoietin
132. Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study
133. Facile preparation of ferric giniite hollow microspheres and their enhanced Fenton-like catalytic performance under visible-light irradiation
134. Activity correlation spectroscopy: a novel method for inferring social relationships from activity data
135. Visual chiral recognition of 1,1′-binaphthol through enantioselective collapse of gel based on an amphiphilic Schiff-base gelator
136. Bioinformatics Analysis of Immune Cell Infiltration and Diagnostic Biomarkers between Ankylosing Spondylitis and Inflammatory Bowel Disease
137. One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware
138. G-Fuzz: A Directed Fuzzing Framework for gVisor
139. TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting
140. A-BEBLID: A Hybrid Image Registration Method for Lithium-Ion Battery Cover Screen Printing
141. CP-BCS: Binary Code Summarization Guided by Control Flow Graph and Pseudo Code
142. All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning
143. Dynamic and Diverse Transformations for Defending Against Adversarial Examples
144. Ascorbic acid reverses the prolonged anesthetic action of pentobarbital in Akr1a-knockout mice
145. Changes in pulmonary function in lung cancer patients after segmentectomy or lobectomy: a retrospective, non-intervention, observation study.
146. OsPIN1b is Involved in Rice Seminal Root Elongation by Regulating Root Apical Meristem Activity in Response to Low Nitrogen and Phosphate
147. TextCheater: A Query-Efficient Textual Adversarial Attack in the Hard-Label Setting
148. One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware
149. The on–off-on Fluorescence Sensor of Hollow Carbon Dots for Detecting Hg2+ and Ascorbic Acid
150. "Is your explanation stable?"
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.