Search

Your search keyword '"Wenli Shang"' showing total 111 results

Search Constraints

Start Over You searched for: Author "Wenli Shang" Remove constraint Author: "Wenli Shang"
111 results on '"Wenli Shang"'

Search Results

1. A decentralized authentication scheme for smart factory based on blockchain

2. Quantitative Evaluation Method for Industrial Control System Vulnerability Based on Improved Expert Elicitation and Fuzzy Set Method

3. Terahertz Metamaterials for Biosensing Applications: A Review

4. Benefits of ozone on mortality in patients with COVID-19: A systematic review and meta-analysis

5. A One-Bit Programmable Multi-Functional Metasurface for Microwave Beam Shaping

6. A Real-time and Robust Monocular Visual Inertial SLAM System Based on Point and Line Features for Mobile Robots of Smart Cities Toward 6G

7. A reflective metasurface for broadband OAM vortex wave generation

8. Higher-Order Iterative Learning Control with Optimal Control Gains Based on Evolutionary Algorithm for Nonlinear System

9. Manipulation of Elastic Instability of Viscoelastic Fluid in a Rhombus Cross Microchannel

22. Benefits of continuous positive airway pressure on blood pressure in patients with hypertension and obstructive sleep apnea: a meta-analysis

23. Anakinra was not associated with lower mortality in hospitalised COVID‐19 patients: A systematic review and meta‐analysis of randomized controlled trials

24. Genome-wide identification, evolutionary, and expression analyses of the PP2C gene family in Castanea mollissima Blume

25. Benefits of ozone on mortality in patients with COVID-19: A systematic review and meta-analysis

30. Clinical characteristics of 194 cases of COVID-19 in Huanggang and Taian, China

33. Key Process Protection of High Dimensional Process Data in Complex Production

34. ICS Software Trust Measurement Method Based on Dynamic Length Trust Chain

35. A Test Cases Generation Method for Industrial Control Protocol Test

36. The safety of long-term use of inhaled corticosteroids in patients with asthma: A systematic review and meta-analysis

37. Feature Extraction and Recognition Method of Industrial Internet of Things Terminal Based on MGA-SVM Dimension Reduction

38. Security monitoring method for ICS based on information gain ratio and maximum entropy model

41. Benefits of continuous positive airway pressure on glycaemic control and insulin resistance in patients with type 2 diabetes and obstructive sleep apnoea: A meta-analysis

42. The research and application of trusted startup of embedded TPM

43. Authentication Technology in Industrial Control System Based on Identity Password

44. STEAP1 facilitates metastasis and epithelial–mesenchymal transition of lung adenocarcinoma via the JAK2/STAT3 signaling pathway

45. DDoS Attack Detection Based on One-Class SVM in SDN

46. Energy minimum encrypted data aggregation scheme for WSN in smart grid

47. Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems

49. A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series

50. Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees

Catalog

Books, media, physical & digital resources