2,483 results on '"NING, Xi"'
Search Results
2. Magnetocaloric effect of topological excitations in Kitaev magnets
3. Equation of state for tungsten predicted by ensemble theory
4. LFL-COBC: Lightweight Federated Learning On Blockchain-based Device Contribution Allocation.
5. Action-Driven UAV Fingerprint Verification with Perception Data.
6. Securely and Efficiently Outsourcing Neural Network Inference via Parallel MSB Extraction.
7. Field-controlled multicritical behavior and emergent universality in fully frustrated quantum magnets
8. Pressure-induced structural phase transition of vanadium: A revisit from the perspective of ensemble theory
9. BiTDB: Constructing A Built-in TEE Secure Database for Embedded Systems.
10. Provably and Physically Secure UAV-Assisted Authentication Protocol for IoT Devices in Unattended Settings.
11. Multi-Sensor Fusion-Based Mirror Adaptive Assist-as-Needed Control Strategy of a Soft Exoskeleton for Upper Limb Rehabilitation.
12. A Dynamic Task Offloading Scheme Based on Location Forecasting for Mobile Intelligent Vehicles.
13. Engineered acetogenic bacteria as microbial cell factory for diversified biochemicals
14. Therapeutic potential of Erxian decoction and its special chemical markers in depression: a review of clinical and preclinical studies
15. Shear stiffening gel-enabled twisted string for bio-inspired robot actuators
16. Spatiotemporal Prediction of Landslide Displacement Using Graph Convolutional Network-Based Models: A Case Study of the Tangjiao 1# Landslide in Chongqing, China
17. Effect of Functional Multi-strain Starter Culture on Inhibiting Protein Oxidation and Improving Flavor in Fermented Sausage
18. Photovoltaic Self-Powered Gas Sensing: A Review
19. TEE-Assisted Time-Scale Database Management System on IoT devices.
20. SEBD: Sensor Emulation Based Backdoor for Autopilot.
21. ACDroid: Detecting Collusion Applications on Smart Devices.
22. Physical-Sensing Inconsistency Vulnerability Mitigation for Multi-UAV Crowdsensing.
23. A Real-Time Attack Detection Scheme Based on Multi-Source Information with False Flag Data.
24. Rock-Climbing Fish Inspired Skeleton-Embedded Rigid-Flexible Coupling Suction Disc Design for Adhesion Enhancement.
25. Dual-Arm Nanorobotic System for Measuring Embryo with Minimum Disturbances.
26. Real-time Stereoscopic Display of Atomic Force Microscopy Images for Nano Robotic Manipulation.
27. Scalable second-order consensus of hierarchical groups.
28. ABCD: Trust enhanced Attention based Convolutional Autoencoder for Risk Assessment.
29. S2DEVFMAP: Self-Supervised Learning Framework with Dual Ensemble Voting Fusion for Maximizing Anomaly Prediction in Timeseries.
30. Liquid Superspreading on Surface with Microhexagonal Structure Inspired by Rock-Climbing Fish.
31. CToMP: a cycle-task-oriented memory protection scheme for unmanned systems.
32. Corporate employee performance mechanism based on incomplete information contest theory
33. Privacy-Aware Multiagent Deep Reinforcement Learning for Task Offloading in VANET.
34. A Deep Learning Approach for Long-Term Traffic Flow Prediction With Multifactor Fusion Using Spatiotemporal Graph Convolutional Network.
35. Manto: A Practical and Secure Inference Service of Convolutional Neural Networks for IoT.
36. Anonymous Lightweight Authenticated Key Agreement Protocol for Fog-Assisted Healthcare IoT System.
37. BejaGNN: behavior-based Java malware detection via graph neural network.
38. Private Inference for Deep Neural Networks: A Secure, Adaptive, and Efficient Realization.
39. Prefrontal activation in response to a plantar contact task under open and closed eye conditions in patients with cerebral infarction
40. What retards the response of graphene based gaseous sensor
41. Comparison of two efficient methods for calculating partition functions
42. Searching for the optimum conditions for silicene growth by calculations of the free energy
43. Solution to the key problem of statistical physics -- calculations of partition function of many-body systems
44. Long-Horizon Route-Constrained Policy for Learning Continuous Control Without Exploration.
45. 3D Stereoscopic Display in the Event-Based Real-Time Internet-Based Robotic Teleoperation System.
46. Self-Anomaly-Detection Model Training via Initialized Meta Model.
47. Real-time Tracking of Living Cell Proliferation with Nano Mechanical Biomarkers.
48. Decentralized Access Control for Secure Microservices Cooperation with Blockchain.
49. Equation of state for tungsten obtained by direct solving the partition function.
50. DawnGNN: Documentation augmented windows malware detection using graph neural network.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.