Showing 1 - 20 results of 20 for search 'Ming TANG', query time: 0.03s
Refine Results
-
1
Multi-dimensional adaptive transmission technique for shortto-medium reach optical fiber communication system by Ming TANG, Xi CHEN
Published 2019-11-01
Article -
2
Load-to-store: exploit the time leakage of store buffer transient window by Ming TANG, Yifan HU
Published 2023-04-01
Article -
3
Side channel leakage assessment with the Bartlett and multi-classes F-test by Yaru WANG, Ming TANG
Published 2021-12-01
Article -
4
-
5
Using side-channel and quantization vulnerability to recover DNN weights by Jinghai LI, Ming TANG, Chengxuan HUANG
Published 2021-08-01
Article -
6
Multi-parties key agreement protocol based on elliptic curve by Long GAO, Chun-ming TANG, Yong-qiang ZHANG
Published 2016-05-01
Article -
7
Anti-packet-loss joint encoding for voice-over-IP steganography by Zhan-zhan GAO, Guang-ming TANG, Wei-wei ZHANG
Published 2016-11-01
Article -
8
-
9
-
10
Optical semantic communication through multimode fiber: from symbol transmission to sentiment analysis by Zheng Gao, Ting Jiang, Mingming Zhang, Hao Wu, Ming Tang
Published 2025-01-01
Article -
11
-
12
Adaptive JPEG steganography based on distortion cost updating by Guang-ming TANG, Yi SUN, Xiao-yu XU, Yu WANG
Published 2017-09-01
Article -
13
Attack path prediction method based on causal knowledge net by Shuo WANG, Guang-ming TANG, Guang KOU, Hai-tao SONG
Published 2016-10-01
Article -
14
The Target Recovery Strategy for Preventing Avalanche Breakdown on Interdependent Community Networks by Kai Gong, Yu Huang, Xiao-long Chen, Qing Li, Ming Tang
Published 2020-01-01
Article -
15
Mode-Dependent Loss Equalized Few-Mode Fiber Photonic Lantern by Yingxuan Li, Senyu Zhang, Zhiyong Zhao, Jing Liu, Zhuyixiao Liu, Ming Tang
Published 2024-01-01
Article -
16
Using deep learning for detecting BotCloud by Guang KOU, Guang-ming TANG, Shuo WANG, Hai-tao SONG, Yuan BIAN
Published 2016-11-01
Article -
17
Automatic Extraction of Rock Discontinuities from the Point Cloud Using Dynamic DBSCAN Algorithm by Ming Tang, Song Yang, Guohua Huang, Xiongyao Xie, Jiafu Guo, Junli Zhai
Published 2022-01-01
Article -
18
Training of information security undergraduate in the education mode of cyberspace security by Ruiying DU, Huanguo ZHANG, Jianming FU, Jing CHEN, Ming TANG, Kun HE, Dan LIU, Yongping DAI
Published 2019-06-01
Article -
19
-
20
Morpho-phylogenetic analyses of two novel edible mushrooms from China and a mini review of Lyophyllum (Agaricales, Lyophyllaceae) cultivation and bioactivities by Song-Ming Tang, Feng-Ming Yu, Samantha C. Karunarathna, Zong-Long Luo, Kai-Yang Niu, Rui-Yu Li, Lin Li, Xi-Jun Su, Shu-Hong Li
Published 2025-01-01
Article