Showing 1 - 20 results of 33 for search 'Chun Guo', query time: 0.02s
Refine Results
-
1
Superposition Attacks on Pseudorandom Schemes Based on Two or Less Permutations by Shaoxuan Zhang, Chun Guo, Qingju Wang
Published 2024-01-01Get full text
Article -
2
Nonce‐misuse resilience of Romulus‐N and GIFT‐COFB by Akiko Inoue, Chun Guo, Kazuhiko Minematsu
Published 2023-05-01Get full text
Article -
3
Emerging Roles of MTG16 in Cell-Fate Control of Hematopoietic Stem Cells and Cancer by Nickolas Steinauer, Chun Guo, Jinsong Zhang
Published 2017-01-01Get full text
Article -
4
-
5
Harvesting Renewable Resources of Population with Size Structure and Diffusion by Qiang-Jun Xie, Ze-Rong He, Chun-Guo Zhang
Published 2014-01-01Get full text
Article -
6
Cyber security entity recognition method based on residual dilation convolution neural network by Bo XIE, Guowei SHEN, Chun GUO, Yan ZHOU, Miao YU
Published 2020-10-01Get full text
Article -
7
Image saliency detection in wavelet domain based on the contrast sensitivity function by Ying-chun GUO, Yan-hong FENG, Gang YAN, Ming YU
Published 2015-10-01Get full text
Article -
8
-
9
Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition by Bohan Wang, Qian Sui, Fanjie Ji, Chun Guo, Weijia Wang
Published 2024-01-01Get full text
Article -
10
-
11
Content-aware image resizing based on random-carving with probability by Ying-chun GUO, Jun-teng HOU, Ming YU, Rui-li WANG
Published 2017-06-01Get full text
Article -
12
Content-aware image resizing based on random-carving with probability by Ying-chun GUO, Jun-teng HOU, Ming YU, Rui-li WANG
Published 2017-06-01Get full text
Article -
13
Researches on efficient transmission protocol for multi-cell system based on interference toleration by Bao-feng JI, Chun-guo LI, Kang SONG, Yi WANG, Liang SONG
Published 2016-05-01Get full text
Article -
14
Researches on efficient transmission protocol for multi-cell system based on interference toleration by Bao-feng JI, Chun-guo LI, Kang SONG, Yi WANG, Liang SONG
Published 2016-05-01Get full text
Article -
15
-
16
A Code-Based ISE to Protect Boolean Masking in Software by Qi Tian, Hao Cheng, Chun Guo, Daniel Page, Meiqin Wang, Weija Wang
Published 2025-03-01Get full text
Article -
17
Towards saturation attack detection in SDN: a multi-edge representation learning-based method by Zhangli Ji, Yunhe Cui, Yinyan Guo, Guowei Shen, Yi Chen, Chun Guo
Published 2025-07-01Get full text
Article -
18
-
19
-
20