172 results on '"Liu, Wanping"'
Search Results
2. CFOA: Exploring transferable adversarial examples by content feature optimization with attention guidance
3. DCDSum: An interpretable extractive summarization framework based on contrastive learning method
4. The effect of Te solution volume on the growth of CdZnTe crystals by Traveling Heater Method
5. Case Study on Advanced Hoisting, Positioning, and Control Techniques for Non-Standard Pier Construction in the Quanli-Dongfeng Viaduct Project
6. Corrigendum to “Deep and shallow groundwater borne lithium and boron loadings to a mega brine lake in Qinghai Tibet Plateau based on multi-tracer models” [J. Hydrol. 598 (2021) 126313]
7. Enhancing Adversarial Examples with Flip-Invariance and Brightness-Invariance
8. Deep hydrothermal and shallow groundwater borne lithium and boron loadings to a mega brine lake in Qinghai Tibet Plateau based on multi-tracer models
9. Data tampering attacks diagnosis in dynamic wireless sensor networks
10. Privacy-preserving weighted average consensus and optimal attacking strategy for multi-agent networks
11. Study on Solute Transport and Crystal Growth of Cdznte by Traveling Heater Method Under Axial High-Intensity Static Magnetic Field
12. Simulation study on the mining conditions of dissolution of low grade solid potash ore in Qarhan Salt Lake
13. On Security Analysis of Generic Dynamic Authenticated Group Key Exchange
14. RA-UNet: an improved network model for image denoising
15. Modeling and analyzing the dynamic spreading of epidemic malware by a network eigenvalue method
16. A novel dynamic model for web malware spreading over scale-free networks
17. High-Order Collaborative Filtering for Third-Party Library Recommendation
18. Randomized authentication primitive problem in key exchange with strong security
19. The present situation, existing problems, and countermeasures for exploitation and utilization of low-grade potash minerals in Qarhan Salt Lake, Qinghai Province, China
20. A Discrete Dynamic Model for Computer Worm Propagation
21. Stability of switched neural networks with time-varying delays
22. A new strong security model for stateful authenticated group key exchange
23. Modeling the propagation of mobile malware on complex networks
24. Modeling the spread of malware with the influence of heterogeneous immunization
25. On Security Analysis of Generic Dynamic Authenticated Group Key Exchange
26. Periodicity of a second-order switched difference system over integers
27. On the Reachability of Discrete-Time Switched Linear Systems
28. Stability of Variable-Time Switched Systems
29. Propagation of computer virus both across the Internet and external computers: A complex-network approach
30. Part-metric and its applications in discrete systems
31. A propagation model of computer virus with nonlinear vaccination probability
32. Secure Similarity Search Over Encrypted Non-Uniform Datasets
33. DisEHPPC: Enabling Heterogeneous Privacy-Preserving Consensus-Based Scheme for Economic Dispatch in Smart Grids
34. An epidemic model of computer viruses with vaccination and generalized nonlinear incidence rate
35. Dynamics of a family of two-dimensional difference systems
36. Stability of switched neural networks with time delay
37. Global attractivity of a family of nonautonomous max-type difference equations
38. The specific glycerolipid composition is responsible for maintaining the membrane stability of Physcomitrella patens under dehydration stress
39. A Novel Microblog Sentiment Classification Method Based on Top-k Pooling
40. One Draw Attack: Fool Deep Learning Models With Modifying Fewer Pixels
41. CLETer: A Character-level Evasion Technique Against Deep Learning DGA Classifiers
42. Mitigating the impact of coronavirus disease 2019 on emergency stroke care: an original study and meta-analysis
43. Distributed Incremental Cost Consensus-Based Optimization Algorithms for Economic Dispatch in a Microgrid
44. A Cost-Effective Algorithm for Selecting Optimal Bandwidth to Clear Malicious Codes
45. Multi-Layer 3D MIMO Precoding Algorithm Based on Partitioned Regions
46. Multi-Layer 3D MIMO Precoding Algorithm Based on Partitioned Regions.
47. Modeling cyber rumor spreading over mobile social networks: A compartment approach
48. Modeling Ransomware Spreading by a Dynamic Node-Level Method
49. Weak Ordering Space Search in Turn-based War Chess Gaming
50. On the security of a provably secure, efficient, and flexible authentication scheme for ad hoc wireless sensor networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.