Showing 1 - 20 results of 25 for search 'FANG Bin', query time: 0.02s
Refine Results
-
1
Dynamics Simulation of Multistage Planetary Gear Transmission System based on LMS Motion by Zhang Zhonggang, Fang Bin, Xu Ming
Published 2015-01-01
Article -
2
Target sampling based on routing behavior analysis in network topology measurement by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2009-01-01
Article -
3
Chinese IP-level network topology measurement and analysis by ZHANG Yu, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
4
Approach to early detection and defense against internet worms by CHEN Bo, FANG Bin-xing, YUN Xiao-chun
Published 2007-01-01
Article -
5
Large scale network worm detection using automatic signature extraction by WANG Ping, FANG Bin-xing, YUN Xiao-chun
Published 2006-01-01
Article -
6
Threshold traceability anonymous authentication scheme without trusted center for ad hoc network by Fang-bin LIU, Kun ZHANG, Hai LI, Hong ZHANG
Published 2012-08-01
Article -
7
A survey of firewall technology based on image content filtering by DONG Kai-kun, HU Ming-zeng, FANG Bin-xing
Published 2003-01-01
Article -
8
DDoS attacks detection based on link character by SUN Hong-jie, FANG Bin-xing, ZHANG Hong-li
Published 2007-01-01
Article -
9
-
10
Tendon Driven Dexterous Hands Based on Airbag Structure by Zheng Haoxian, Fang Bin, Sun Fuchun, Song Yixu, Yan Junxia
Published 2022-11-01
Article -
11
Hybrid-structured onion scheme against replay attack of MIX by SHI Jin-qiao, FANG Bin-xing, GUO Li, WANG Li-hong
Published 2009-01-01
Article -
12
DESIGN AND SIMULATION OF FAST DISPATCHING HEXAGONAL CLAMP BASED ON ANSYS/LS<sub>D</sub>YNA by LIU GuoPing, FANG Bin, WANG WeiQiang, HU RongHua
Published 2016-01-01
Article -
13
User-habit based early warning of worm by WANG Ping, FANG Bin-xing, YUN Xiao-chun, PENG Da-wei
Published 2006-01-01
Article -
14
DESIGN OF SYNCHRONOUS TELESCOPIC CLAMPING MECHANISM OF FAST DISPATCHING HEXAGONAL CLAMP by LIU GuoPing, FANG Bin, WANG WeiQiang, HU RongHua
Published 2016-01-01
Article -
15
Survey of software assurance by FANG Bin-xing1, LU Tian-bo2, LI Chao1
Published 2009-01-01
Article -
16
Approach for topology partitioning in parallel network simulation by WANG Xiao-feng, FANG Bin-xing, YUN Xiao-chun, ZHANG Hong-li
Published 2006-01-01
Article -
17
Real-time anomaly detection model for worm mails in high-speed network by LUO Hao, FANG Bin-xing, YUN Xiao-chun, WANG Xin, XIN Yi
Published 2006-01-01
Article -
18
Spam filtering algorithm based on geographic E-mail path analysis by ZHANG Ni1, JIANG Yu2, FANG Bin-xing1, LI Guo1
Published 2007-01-01
Article -
19
Safe communicated model of SIP network based on improved SIP protocol by ZHANG Zhao-xin1, FANG Bin-xing1, ZHANG Hong-li1, JIANG Chun-xiang2
Published 2007-01-01
Article -
20
HitIct:Chinese corpus for the evaluation of lossless compression algorithms by CHANG Wei-ling1, YUN Xiao-chun2, FANG Bin-xing1, WANG Shu-peng2
Published 2009-01-01
Article