Showing 1 - 20 results of 21 for search 'JIN Bo', query time: 0.02s
Refine Results
-
1
-
2
Fragment-based visual tracking with adaptive appearance model by ZHAO Ling, FENG Bin, QIU Jin-bo
Published 2011-01-01
Article -
3
Security control scheme for cloud data copy based on differential privacy model by Jun REN, Jin-bo XIONG, Zhi-qiang YAO
Published 2017-05-01
Article -
4
-
5
Three-dimensional spherical model based XML communication protocols security evaluation method by Hong-yu YANG, Jin-bo YU, Li-xia XIE
Published 2013-03-01
Article -
6
Adaptively secure key-policy ABE scheme with fast decryption by Qi LI, Jian-feng MA, Jin-bo XIONG, Xi-meng LIU
Published 2014-11-01
Article -
7
Multilevel access control for video database by Jin-bo XIONG, Zhi-qiang YAO, Jian-feng MA, Qi LI
Published 2012-08-01
Article -
8
DATA⁃DRIVEN RELIABILITY ANALYSIS MODEL OF QINGHAI⁃TIBET RAILWAY IN PERMAFROST ZONE by WANG JinBo, TANG JiaYin, LIU XinLing, WU Yi
Published 2024-08-01
Article -
9
Secure network coding scheme for scalable video streaming by Xi-meng LIU, Guang-jun LIU, Jian-feng MA, Jin-bo XIONG
Published 2013-05-01
Article -
10
Security sharing and associated deleting scheme for multi-replica in cloud by Jin-bo XIONG, Wei-wei SHEN, Yang-qun HUANG, Zhi-qiang YAO
Published 2015-11-01
Article -
11
Attribute based sanitizable signature scheme by Xi-meng LIU, Jian-feng MA, Jin-bo XIONG, Jun MA, Qi LI
Published 2013-08-01
Article -
12
STUDY ON CONSTRAINT OF MIXED MODE CRACK AND FAILURE ASSESSMENT DIAGRAM OF PRESSURE-BEARING STRUCTURE by MIAO XinTing, ZHANG JinBo, LIU GuoXu, PENG Jian, BIE FengFeng
Published 2024-01-01
Article -
13
Community field-centric trust-based access control model by Zhi-qiang YAO, Jin-bo XIONG, Jian-feng MA, Qi LI, Xi-meng LIU
Published 2013-09-01
Article -
14
Novel cyberspace-oriented access control model by Feng-hua LI, Yan-chao WANG, Li-hua YIN, Rong-na XIE, Jin-bo XIONG
Published 2016-05-01
Article -
15
Research progress on cloud data assured deletion based on cryptography by Jin-bo XIONG, Feng-hua LI, Yan-chao WANG, Jian-feng MA, Zhi-qiang YAO
Published 2016-08-01
Article -
16
-
17
Research progress on secure data deduplication in cloud by Jin-bo XIONG, Yuan-yuan ZHANG, Feng-hua LI, Su-ping LI, Jun REN, Zhi-qiang YAO
Published 2016-11-01
Article -
18
PoSW:novel secure deduplication scheme for collaborative cloud applications by Jin-bo XIONG, Su-ping LI, Yuan-yuan ZHANG, Xuan LI, EA-yong Y, Zhi-qiang YAO
Published 2017-07-01
Article -
19
Hyssopus cuspidatus volatile oil: a potential treatment for steroid-resistant asthma via inhibition of neutrophil extracellular traps by Xu Wang, Hui-Ming Peng, Meng-Ru Zhang, Jing-Jing Li, Chuan-Peng Zhao, Ya-Li Zhang, Si-Yu Wang, Si-Ying Zhu, Jian-Kang Lu, Hai-Long Yin, Qiang Yin, Jin-Bo Fang
Published 2025-02-01
Article -
20
Preoperative prediction of lymph node metastasis in intrahepatic cholangiocarcinoma: an integrative approach combining ultrasound-based radiomics and inflammation-related markers by Yu-ting Peng, Jin-shu Pang, Peng Lin, Jia-min Chen, Rong Wen, Chang-wen Liu, Zhi-yuan Wen, Yu-quan Wu, Jin-bo Peng, Lu Zhang, Hong Yang, Dong-yue Wen, Yun He
Published 2025-01-01
Article