107 results on '"Songyang, Wu"'
Search Results
2. Neoadjuvant anthracycline followed by toripalimab combined with nab-paclitaxel in patients with early triple-negative breast cancer (NeoTENNIS): a single-arm, phase II studyResearch in context
3. TC$^{2}$LI-SLAM: A Tightly-Coupled Camera-LiDAR-Inertial SLAM System.
4. BA-LIOM: tightly coupled laser-inertial odometry and mapping with bundle adjustment.
5. Inversion of electron densities in plasma wakes of hypersonic targets
6. Personalized Privacy Protection and Security Aggregation Technology for Smart Grid.
7. Introducing Unsupervised Big Data and Multimodal Large Models for Small Tasks on Plate Recognition.
8. Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC.
9. Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment.
10. Incoherent Scattering of a Bessel Vortex Electromagnetic Beam From a Nonmagnetized Plasma.
11. Face Forgery Detection of Deepfake Based on Multiple Convolutional Neural Networks.
12. Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice.
13. System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
14. A Secure Quantum Protocol for Anonymous One-Vote Veto Voting.
15. Measurement of the Usage of Web Clips in Underground Economy.
16. Scalable one-stage multi-view subspace clustering with dictionary learning.
17. Reversible Embedding to Covers Full of Boundaries.
18. Investigation on the influence of compact tensile specimen thickness on the dynamic fracture properties
19. Cloud Evidence Tracing System: An integrated forensics investigation system for large-scale public cloud platform.
20. Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
21. Efficient verification of data possession in cloud computing.
22. Forensic analysis of WeChat on Android smartphones.
23. Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
24. Network security assessment using a semantic reasoning and graph based approach.
25. Social network node influence maximization method combined with degree discount and local node optimization.
26. Abstract P2-14-04: Updated data from FUTURE-C-PLUS: Combination of famitinib with camrelizumab plus nab-paclitaxel as first-line treatment for advanced, immunomodulatory triple-negative breast cancer, an open-label, single-arm, phase 2 trial
27. 一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks).
28. Secure Provenance for Data Forensics with Efficient Revocation of Anonymous Credentials in Cloud Computing.
29. Effective detection of android malware based on the usage of data flow APIs and machine learning.
30. C-C motif chemokine 22 predicts postoperative prognosis and adjuvant chemotherapeutic benefits in patients with stage II/III gastric cancer
31. Research on the Method of Handling Missing ETC Transaction Data
32. Element Analysis of Penetration Resistance of Pue/Honeycomb Aluminum Composite Structure
33. Secure cloud storage using anonymous and blackbox traceable data access control.
34. Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
35. Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
36. A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
37. A High Security Framework for SMS.
38. Study on the penetration resistance of a honeycomb composite structure coated with polyurethane elastomer
39. Penetration resistance of ceramic/PUE/GFRP multi-layered composite structure
40. Edge Computing Oriented Virtual Optical Network Mapping Strategy Based on Comprehensive Fragmentation Awareness
41. An Efficient Distributed Forensic System Based on Hadoop:Principle and Method
42. A Secure Quantum Protocol for Anonymous One-Vote Veto Voting
43. NSEDS: One Implementation of Lambda Architecture in Large-scale Seismic Exploration Scenes
44. Excitation and power spectrum analysis of electromagnetic radiation for the plasma wake of reentry vehicles
45. Security Situation Awareness Assessment of Heterogeneous Cyber-Physical Systems in Multiple Load Mode
46. Scattering by a low-velocity charge with applied magnetic fields in a Laguerre–Gaussian beam
47. A Multi-Level Semantic Fusion Algorithm Based on Historical Data in Question Answering
48. A Question Answering System Based on Multi-Granularity Semantic Interaction Neural Network
49. Question Answering System Model Based on Multi Granularity Semantic Representation
50. Research on Fast Forensic Analysis Method of Fraud cases Based on Social Software
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.