338 results on '"Wen, Mi"'
Search Results
2. MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning
3. An improved multi-scale and knowledge distillation method for efficient pedestrian detection in dense scenes
4. Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation
5. Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation
6. Effect of zinc(II) and caustic content on the decomposition of sodium aluminate solutions and relevance to the Bayer process
7. A multi-channel convolutional neural network based on attention mechanism fusion for facial expression recognition
8. Hydrogen alleviated cognitive impairment and blood‒brain barrier damage in sepsis-associated encephalopathy by regulating ABC efflux transporters in a PPARα-dependent manner
9. Enhancing the transferability of adversarial samples with random noise techniques
10. Intrusion Detection Method Based on Stacked Sparse Autoencoder and Sliced GRU for Connected Healthcare Systems
11. Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving
12. Identification of Discrete Wiener Systems by Using Adaptive Generalized Rational Orthogonal Basis Functions.
13. Frequency Domain Identification of Continuous-Time Hammerstein Systems With Adaptive Continuous-Time Rational Orthonormal Basis Functions.
14. Fixed-Time Consensus Tracking for Multi-Agent Systems With a Nonholomonic Dynamics.
15. A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids
16. Traffic sign detection algorithm based on feature expression enhancement
17. Unexpected object detection based on class correlation in semantic segmentation for automatic driving scenes
18. AMNeuzz: A Strongly Directed Fuzz Testing Method Based on Attention Mechanism
19. An efficient fuzzy certificateless signature-based authentication scheme using anonymous biometric identities for VANETs
20. Cross-Device Radio Frequency Fingerprinting Identification Based On Domain Adaptation
21. Adaptive Rational Orthogonal Basis Functions for Identification of Continuous-Time Systems.
22. Uncovering the relationship between hepatocellular carcinoma and compounds belonging to Simaroubaceae using a network pharmacology approach and molecular docking techniques
23. A diffusion bias-compensated LMS algorithm for distributed estimation with ARMAX models.
24. An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model.
25. A novel spatial electric load forecasting method based on LDTW and GCN
26. An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model
27. Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services
28. Enhancing the Transferability of Adversarial Samples with Random Noise Techniques
29. Toward efficient and effective bullying detection in online social network
30. Identification of discrete Hammerstein systems by using adaptive finite rational orthogonal basis functions.
31. A novel spatial electric load forecasting method based on LDTW and GCN.
32. Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control.
33. Long-term Incentive Mechanism for Federated Learning: A Dynamic Repeated Game Approach
34. An Approach for Attack Scenario Construction Based on Dynamic Attack Path Graph
35. A Scheme for Robust Federated Learning with Privacy-preserving Based on Krum AGR
36. System identification of hammerstein models by using backward shift algorithm.
37. An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA
38. A Family of Adaptive Decorrelation NLMS Algorithms and Its Diffusion Version Over Adaptive Networks.
39. Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds
40. FPDT: a multi-scale feature pyramidal object detection transformer
41. DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network
42. Conjunctive Query over Encrypted Multidimensional Data
43. Range Query over Encrypted Metering Data for Financial Audit
44. Introduction
45. Equality Query for Auction in Emerging Smart Grid Marketing
46. Big Data Storage Security
47. A privacy-aware data dissemination scheme for smart grid with abnormal data traceability
48. Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing
49. Efficient steganographer detection over social networks with sampling reconstruction
50. Unsupervised steganalysis over social networks based on multi-reference sub-image sets
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.