Search

Your search keyword '"Dejun Mu"' showing total 257 results

Search Constraints

Start Over You searched for: Author "Dejun Mu" Remove constraint Author: "Dejun Mu"
257 results on '"Dejun Mu"'

Search Results

1. Remote Sensing Images Secure Distribution Scheme Based on Deep Information Hiding

2. Attribute-based keyword search encryption for power data protection

3. Anchor Behavior of One-Side Bolt with Flip-Top Collapsible Washer

4. Intelligent traffic analysis: A heuristic high-dimensional image search algorithm based on spatiotemporal probability for constrained environments

5. Information hiding algorithm based on mapping and structure data of 3D model

6. Personalized QoS Prediction for Service Recommendation With a Service-Oriented Tensor Model

7. Consensus-Based Multi-Person Decision Making Using Consistency Fuzzy Preference Graphs

8. Query-Focused Personalized Citation Recommendation With Mutually Reinforced Ranking

9. Towards Quantified Data Analysis of Information Flow Tracking for Secure System Design

10. CoDetect: Financial Fraud Detection With Anomaly Feature Detection

11. Expede Herculem: Learning Multi Labels From Single Label

12. A LSTM Based Model for Personalized Context-Aware Citation Recommendation

13. Next-App Prediction by Fusing Semantic Information With Sequential Behavior

14. Exploiting Fine-Grained Co-Authorship for Personalized Citation Recommendation

15. Type synthesis and kinematics analysis of a family of three translational and one rotational pick-and-place parallel mechanisms with high rotational capability

16. Dynamic modeling and adaptive fuzzy terminal sliding mode controller with nonlinear observer of a 2-(PUU)R hybrid mechanism

17. Random Time Delay Effect on Out-of-Sequence Measurements

18. Constrained Unscented Particle Filter for SINS/GNSS/ADS Integrated Airship Navigation in the Presence of Wind Field Disturbance

19. A Strap-Down Inertial Navigation/Spectrum Red-Shift/Star Sensor (SINS/SRS/SS) Autonomous Integrated System for Spacecraft Navigation

20. Unix Domain Sockets Applied in Android Malware Should Not Be Ignored

27. An information asset priority evaluation method with analytic network process

32. Anchor Behavior of One-Side Bolt with Flip-Top Collapsible Washer

37. Formulation of unified kinematics for overconstrained Schönflies parallel mechanism using vectorial algebra

38. Data-Driven Zero Trust Key Algorithm

Catalog

Books, media, physical & digital resources