299 results on '"Mu, Dejun"'
Search Results
2. Spatial Double-Layer Deployable Mechanism Based on Bennett Linkage
3. Stochastic Stability of the Improved Maximum Correntropy Kalman Filter Against Non-Gaussian Noises
4. Rational-quadratic kernel-based maximum correntropy Kalman filter for the non-Gaussian noises
5. Hardware security and reliability verification based on fault propagation model
6. A logic obfuscation attack method based on gate-level information flow tracing techniques
7. Design and Analysis of Lower Limb Rehabilitation Robot Based on Virtual Reality
8. Memory-Based High-Level Synthesis Optimizations Security Exploration on the Power Side-Channel
9. Attribute-based keyword search encryption for power data protection
10. Design and Analysis of Lower Limb Rehabilitation Robot Based on Virtual Reality
11. Intelligent Analysis and Prediction of Computer Network Security Logs Based on Deep Learning.
12. 4T4R Performance Analysis in Live FDD LTE Network
13. Symbolic execution based test-patterns generation algorithm for hardware Trojan detection
14. Quantitative Analysis of Timing Channel Security in Cryptographic Hardware Design
15. Remote Sensing Images Secure Distribution Scheme Based on Deep Information Hiding
16. DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU
17. Improving high-impact bug report prediction with combination of interactive machine learning and active learning
18. Accelerating hardware security verification and vulnerability detection through state space reduction
19. RE-Specter: Examining the Architectural Features of Configurable CNN With Power Side-Channel
20. A Network Security Situation Awareness Model Based on Risk Assessment
21. Intelligent traffic analysis: A heuristic high-dimensional image search algorithm based on spatiotemporal probability for constrained environments
22. A formal model for proving hardware timing properties and identifying timing channels
23. Online multi-person tracking assist by high-performance detection
24. Invalid bug reports complicate the software aging situation
25. A Simplifying Logic Approach for Gate Level Information Flow Tracking
26. Theorem proof based gate level information flow tracking for hardware security verification
27. 4T4R Performance Analysis in Live FDD LTE Network
28. Separated interactive behaviors promote cooperation in the spatial prisoner’s dilemma game
29. Gate-Level Information Flow Tracking for Security Lattices
30. Learning Multi Labels from Single Label —— An Extreme Weak Label Learning Algorithm
31. Research on Data Multi-Scene Searchable Encryption System Based on Computer Smart Grid Security Data Fusion Technology
32. A Scalable Cloud-Based Android App Repackaging Detection Framework
33. Adaptive unscented Kalman filter based on maximum posterior and random weighting
34. Word-sentence co-ranking for automatic extractive text summarization
35. Visual tracking based on stacked Denoising Autoencoder network with genetic algorithm optimization
36. Robust adaptive filter allowing systematic model errors for transfer alignment
37. Electrical Fault Diagnosis From Text Data: A Supervised Sentence Embedding Combined With Imbalanced Classification
38. A Network Security Situation Awareness Model Based on Risk Assessment
39. A Simplifying Logic Approach for Gate Level Information Flow Tracking
40. Pareto Frequency-Aware Power Side-Channel Countermeasure Exploration on CNN Systolic Array
41. Electrical Fault Diagnosis From Text Data: A Supervised Sentence Embedding Combined With Imbalanced Classification
42. The Study on Wireless Sensor Networks Security Access Scheme
43. Load Trend Prediction Analysis based on LSTM and Sliding Time Window
44. Load Forecasting based on CNN-LSTM for 96 Time Points
45. A Points-to-Sensitive Model Checker for C Programs in IoT Firmware
46. Geocast Routing in Urban Vehicular Ad Hoc Networks
47. Feedback Control-Based Database Connection Management for Proportional Delay Differentiation-Enabled Web Application Servers
48. Bandwidth-Aware Multipath Routing Protocol for Mobile Ad Hoc Networks
49. An information asset priority evaluation method with analytic network process
50. FDD LTE Performance Simulation Based on Massive Antenna Array
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.