1,576 results on '"XUEJUN LI"'
Search Results
202. A Video Face Recognition Leveraging Temporal Information Based on Vision Transformer.
203. TBAF: A Two-Stage Biometric-Assisted Authentication Framework in Edge-Integrated UAV Delivery System.
204. Multi-Featured Anomaly Detection for Mobile Edge Computing Based UAV Delivery Systems.
205. Malicious Random-index PIR and its Application.
206. Self-paced Adaptive Bipartite Graph Learning for Consensus Clustering.
207. A novel chaotic system with hidden attractor and its application in color image encryption.
208. Privacy-Preserving Biometric Authentication: Cryptanalysis and Countermeasures.
209. Fast and General Incomplete Multi-view Adaptive Clustering.
210. Contrastive Learning for Prediction of Alzheimer's Disease Using Brain 18F-FDG PET.
211. Adaptive active learning through k-nearest neighbor optimized local density clustering.
212. Balanced Spectral Feature Selection.
213. A Novel Graph-Based Computation Offloading Strategy for Workflow Applications in Mobile Edge Computing.
214. Learning the degradation distribution for medical image superresolution via sparse swin transformer.
215. Multiscale progressive text prompt network for medical image segmentation.
216. A Multi-Objective Clustering Evolutionary Algorithm for Multi-Workflow Computation Offloading in Mobile Edge Computing.
217. Adaptive Consensus Clustering for Multiple K-Means Via Base Results Refining.
218. KeepEdge: A Knowledge Distillation Empowered Edge Intelligence Framework for Visual Assisted Positioning in UAV Delivery.
219. Framework for propagation modeling of IRS-assisted communication based on ray tracing.
220. A privacy-preserving location data collection framework for intelligent systems in edge computing.
221. Repairing Security Vulnerabilities Using Pre-trained Programming Language Models.
222. A Novel Adaptive Computation Offloading Strategy for Collaborative DNN Inference over Edge Devices.
223. Efficient Face Recognition via Multi-UAV-Edge Collaboration in UAV Delivery Service.
224. Edge4FR: A Novel Device-Edge Collaborative Framework for Facial Recognition in Smart UAV Delivery Systems.
225. Three-way decisions based service migration strategy in mobile edge computing.
226. Ref-ZSSR: Zero-Shot Single Image Superresolution with Reference Image.
227. An Optical Image Encryption Algorithm Based on a Fractional-Order Laser Hyperchaotic System.
228. Energy-Aware Computation Management Strategy for Smart Logistic System With MEC.
229. Pyramid Attention 'Zero-Shot' Network for Single-Image Superresolution.
230. Motion cues guided feature aggregation and enhancement for video object segmentation.
231. Clustering ensemble via structured hypergraph learning.
232. An Efficient Lightweight Network Based on Magnetic Resonance Images for Predicting Alzheimer's Disease.
233. A Survey on Automated Program Repair Techniques.
234. Sensitive Instruction Detection Based on the Context of IoT Sensors.
235. A Novel Security Framework for Edge Computing based UAV Delivery System.
236. A Holistic Service Provision Strategy for Drone-as-a-Service in MEC-based UAV Delivery.
237. An Edge based Federated Learning Framework for Person Re-identification in UAV Delivery Service.
238. Detecting Inconsistent Vulnerable Software Version in Security Vulnerability Reports.
239. Tri-level Robust Clustering Ensemble with Multiple Graph Learning.
240. Self-paced Consensus Clustering with Bipartite Graph.
241. Express: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems**This research is in part supported by the National Natural Science Foundation of China Project No. 61972001.
242. Graph4Edge: A Graph-based Computation Offloading Strategy for Mobile-Edge Workflow Applications.
243. Fault Diagnosis of Spiral Bevel Gears Based on CEEMDAN Permutation Entropy
244. UCSCXenaShiny: an R/CRAN package for interactive analysis of UCSC Xena data.
245. A Blockchain-aided Self-Sovereign Identity Framework for Edge-based UAV Delivery System.
246. Clustering Ensemble Based on Sample's Certainty.
247. How Pervasive Is Earnings Management? Evidence from a Structural Model.
248. A novel cloud workflow scheduling algorithm based on stable matching game theory.
249. Small data assisting face image illumination normalization.
250. KeyD: Secure Key-Deduplication with Identity-Based Broadcast Encryption.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.