98 results on '"Yi, Shengwei"'
Search Results
2. Linear RNNs Provably Learn Linear Dynamic Systems
3. Do the residual metals in multiple environmental media surrounding mines pose ecological and health risks? A case of an abandoned mining area in central south China
4. DNA-stable isotope probing and metagenomics reveal Fe(II) oxidation by core microflora in microoxic rhizospheric habitats to mitigate the accumulation of cadmium and phenanthrene in rice
5. In-situ enrichment of ARGs and their carriers in soil by hydroxamate siderophore: A promising biocontrol approach for source reduction
6. Contamination characteristics of uncultivated arable lands and health risk warning based on the predicted heavy metal content in rice—Dongting Lake Basin, China
7. Reducing the accumulation of cadmium and phenanthrene in rice by optimizing planting spacing: Role of low-abundance but core rhizobacterial communities
8. Co-transformation of HMs-PAHs in rhizosphere soils and adaptive responses of rhizobacteria during whole growth period of rice (Oryza sativa L.)
9. Diffusion and enrichment of high-risk antibiotic resistance genes (ARGs) via the transmission chain (mulberry leave, guts and feces of silkworm, and soil) in an ecological restoration area of manganese mining, China: Role of heavy metals
10. Effects of phosvitin phosphopeptide-Ca complex prepared by efficient enzymatic hydrolysis on calcium absorption and bone deposition of mice
11. Hydroxamate Siderophores Intensify the Co-Deposition of Cadmium and Silicon as Phytolith-Like Particulates in Rice Stem Nodes: A Natural Strategy to Mitigate Grain Cadmium Accumulation.
12. Synergistic leaching of heavy metal-polycyclic aromatic hydrocarbon in co-contaminated soil by hydroxamate siderophore: Role of cation-π and chelation
13. Multi-channel Man-in-the-Middle Attack Against Communication-Based Train Control Systems: Attack Implementation and Impact
14. Design and Implementation of Security System for IPv6 Sensor Networks
15. Genetically engineered microbial remediation of soils co-contaminated by heavy metals and polycyclic aromatic hydrocarbons: Advances and ecological risk assessment
16. Metagenomic and proteomic insights into the self‐adaptive cell surface hydrophobicity of Sphingomonas sp. strain PAH02 reducing the migration of cadmium‐phenanthrene co‐pollutant in rice
17. A Graph Neural Network Model for Live Face Anti-Spoofing Detection Camera Systems
18. Social networks formed by follower–followee relationships on academic social networking sites: an examination of corporation users
19. How Corporations Utilize Academic Social Networking Website?: A Case Study of Health & Biomedicine Corporations
20. Generating Optimized Universal Adversarial Watermark for Preventing Face Deepfake
21. Preference-Aware Top-k Spatio-Textual Queries
22. Design and Implementation of Security System for IPv6 Sensor Networks
23. How Corporations Utilize Academic Social Networking Website?: A Case Study of Health & Biomedicine Corporations
24. A Scalable Data Acquisition Architecture in Web-Based IOT
25. An Attributes-Based Access Control Architecture within Large-Scale Device Collaboration Systems Using XACML
26. Preference-Aware Top-k Spatio-Textual Queries
27. An effective algorithm for mining sequential generators
28. Characteristics and Risk Assessment of Heavy Metals in Uncultivated Arable Lands at Dongting Lake Basin, China
29. ASSCA: API sequence and statistics features combined architecture for malware detection
30. Continuous authentication by free-text keystroke based on CNN plus RNN
31. Learning-Based Detection for Malicious Android Application Using Code Vectorization
32. ASSCA: API based Sequence and Statistics features Combined malware detection Architecture
33. A Scalable Data Acquisition Architecture in Web-Based IOT
34. A Safety-Security Assessment Approach for Communication-Based Train Control (CBTC) Systems Based on the Extended Fault Tree
35. Study on Wireless Sensor Networks
36. Mining High Utility Itemsets over Uncertain Databases
37. A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism
38. OPC-MFuzzer: A Novel Multi-Layers Vulnerability Detection Tool for OPC Protocol Based on Fuzzing Technology
39. A vulnerability detecting method for Modbus-TCP based on smart fuzzing mechanism.
40. A new query dependent feature fusion approach for medical image retrieval based on one-class SVM
41. Mining Frequent Rooted Ordered Tree Generators Efficiently
42. Design and Implementation of Fuzzing Technology for OPC Protocol
43. Overview on attack graph generation and visualization technology
44. Pairing and Authentication Security Technologies in Low-Power Bluetooth
45. Efficient Sequential Generator Discovery Over Stream Sliding Windows
46. SeqGen: Mining Sequential Generator Patterns from Sequence Databases
47. A Multiple-Policy supported Attribute-Based Access Control Architecture within Large-scale Device Collaboration Systems
48. Gird or cloud? Survey on scientific computing infrastructure
49. Multi-Standard Compatible Metadata Framework for Geo-Spatial Data
50. From XML Schema to Relations: A Incremental Approach to XML Storage
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.