Showing 1 - 20 results of 29 for search 'Fenghua LI', query time: 0.02s
Refine Results
-
1
-
2
-
3
Instance structure based multi-label learning with missing labels by Tianzhu CHEN, Fenghua LI, Yunchuan GUO, Zifu LI
Published 2021-11-01Get full text
Article -
4
A lightweight hardware implementation of CRYSTALS-Kyber by Shiyang He, Hui Li, Fenghua Li, Ruhui Ma
Published 2024-03-01Get full text
Article -
5
An Efficient Stream Data Processing Model for Multiuser Cryptographic Service by Li Li, Fenghua Li, Guozhen Shi, Kui Geng
Published 2018-01-01Get full text
Article -
6
Academic connotation and research trends of privacy computing by Fenghua LI, Hui LI, Ben NIU, Weidong QIU
Published 2022-12-01Get full text
Article -
7
Risk assessing and privacy-preserving scheme for privacy leakage in APP by Xinyu WANG, Ben NIU, Fenghua LI, Kun HE
Published 2019-05-01Get full text
Article -
8
-
9
Fuzzy evaluation for response effectiveness in cases of incomplete information by Fenghua LI, Yongjun LI, Zhengkun YANG, Han ZHANG, Lingcui ZHANG
Published 2019-04-01Get full text
Article -
10
Scheduling algorithm for stochastic job stream cipher service based on load balancing by Li LI, Guozhen SHI, Kui GENG, Xiuze DONG, Fenghua LI
Published 2018-06-01Get full text
Article -
11
Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO
Published 2020-09-01Get full text
Article -
12
Traffic characteristic based privacy leakage assessment scheme for Android device by Zhu WANG, Kun HE, Xinyu WANG, Ben NIU, Fenghua LI
Published 2020-02-01Get full text
Article -
13
Traffic characteristic based privacy leakage assessment scheme for Android device by Zhu WANG, Kun HE, Xinyu WANG, Ben NIU, Fenghua LI
Published 2020-02-01Get full text
Article -
14
Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO
Published 2020-09-01Get full text
Article -
15
-
16
An Action-Based Fine-Grained Access Control Mechanism for Structured Documents and Its Application by Mang Su, Fenghua Li, Zhi Tang, Yinyan Yu, Bo Zhou
Published 2014-01-01Get full text
Article -
17
Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO
Published 2018-02-01Get full text
Article -
18
Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO
Published 2018-02-01Get full text
Article -
19
Extended access control mechanism for cross-domain data exchange by Rongna XIE, Yunchuan GUO, Fenghua LI, Guozhen SHI, Yaqiong WANG, Kui GENG
Published 2019-07-01Get full text
Article -
20
Fine-grained privacy operation control method for layout documents by Peijie YIN, Fenghua LI, Ben NIU, Haiyang LUO, Bin KUANG, Lingcui ZHANG
Published 2023-05-01Get full text
Article