135 results on '"Bian, Genqing"'
Search Results
2. Design and implementation of social based edge node selection algorithm
3. Different Secure Semi-quantum Summation Models without Measurement
4. A Lightweight Identity-Based Network Coding Scheme for Internet of Medical Things
5. Redact4Trace: A solution for auditing the data and tracing the users in the redactable blockchain
6. Application of forecasting strategies and techniques to natural gas consumption: A comprehensive review and comparative study
7. Design and realization of hybrid resource management system for heterogeneous cluster
8. File block multi-replica management technology in cloud storage
9. Design and implementation of user task offloading algorithm
10. A secure and lightweight cloud-centric intelligent medical system based on Internet of Medical Things
11. Healthcare entity recognition based on deep learning
12. Redact-Chain for Health: A Scheme Based on Redactable Blockchain for Managing Shared Healthcare Data
13. Real-time portrait image retouching extended from DualBLN
14. Dynamic decision-making strategy of replica number based on data hot
15. Real-time network virtualization based on SDN and Docker container
16. Identification of Grape Diseases Based on Improved YOLOXS
17. Natural Gas Load forecasting based on the fusion of VMD-SE and CNN-BiLSTM-Attention
18. Blockchain-Based Trusted Federated Learning with Pre-Trained Models for COVID-19 Detection
19. A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity
20. A Novel Process Recommendation Method That Integrates Disjoint Paths and Sequential Patterns
21. Incentive Public Auditing Scheme with Identity-Based Designated Verifier in Cloud
22. Certificateless network coding scheme from certificateless public auditing protocol
23. File block multi-replica management technology in cloud storage
24. Redact4trace: A Solution for Auditing the Data and Tracing the Users in the Redactable Blockchain
25. RTFTL: design and implementation of real-time FTL algorithm for flash memory
26. Certificateless Data Integrity Auditing in Cloud Storage with a Designated Verifier and User Privacy Preservation
27. Certificateless Remote Data Integrity Auditing with Access Control of Sensitive Information in Cloud Storage
28. Real-time network virtualization based on SDN and Docker container
29. A Hybrid Approach by CEEMDAN-Improved PSO-LSTM Model for Network Traffic Prediction
30. Comment on “A Lightweight Auditing Service for Shared Data With Secure User Revocation in Cloud Storage”
31. Certificateless network coding scheme from certificateless public auditing protocol
32. Dimensionality reduction method of dynamic networks for evolutionary mechanism of neuronal systems
33. A hybrid deep learning approach by integrating extreme gradient boosting‐long short‐term memory with generalized autoregressive conditional heteroscedasticity family models for natural gas load volatility prediction
34. Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
35. Analysis of Influencing Factors and Trend Forecast of CO2 Emission in Chengdu-Chongqing Urban Agglomeration
36. The Research of Spark Memory Optimization Based on Non-Volatile Memory
37. Research on Data Routing Strategy of Deduplication in Cloud Environment
38. Data Integrity Audit based on Data Blinding for Cloud and Fog Environment
39. Identity-Based Privacy Preserving Remote Data Integrity Checking With a Designated Verifier
40. Research on key technologies of NBD storage service system based on load classification
41. Certificateless Network Coding Scheme from Certificateless Public Auditing Protocol
42. Wind Speed Forecast Based on the LSTM Neural Network Optimized by the Firework Algorithm
43. Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
44. Research on Replica Layout Algorithm Based on Multi-objective Decomposition Strategy
45. Construction of Software and Hardware Resource Pool in Data Center Using Virtualization
46. A survey of research hotspots and frontier trends of recommendation systems from the perspective of knowledge graph
47. TCFTL: Improved Real-Time Flash Memory Two Cache Flash Translation Layer Algorithm
48. Research on Routing Strategy in Cluster Deduplication System
49. Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage, Revisited
50. Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.