Showing 1 - 11 results of 11 for search 'Qi Pei', query time: 0.01s
Refine Results
-
1
-
2
Mining and utilization of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI
Published 2017-10-01
Article -
3
Clustering perception mining of network protocol’s stealth attack behavior by Yan-jing HU, Qing-qi PEI
Published 2017-06-01
Article -
4
A Trust Value-Based Spectrum Allocation Algorithm in CWSNs by Qing-Qi Pei, Zi Li, Li-Chuan Ma
Published 2013-05-01
Article -
5
Survey of block chain by Xin SHEN, Qing-qi PEI, Xue-feng LIU
Published 2016-11-01
Article -
6
Analysis of DRM game control by Guo-jun MA, Qing-qi PEI, Xiao-hong JIANG
Published 2012-09-01
Article -
7
-
8
Fair and anonymous ID-based multi-receiver signcryption by Liao-jun PANG, Lu GAO, Qing-qi PEI, Yu-min WANG
Published 2013-08-01
Article -
9
Study on quality enhancement during cigar tobacco fermentation by Staphylococcus nepalensis: insights into microbial community, volatile substances and sensory evaluation by Qi Pei, Qi Pei, Qi Pei, Xue Jiang, Xue Jiang, Xue Jiang, Zhengqin Li, Zhengqin Li, Zhengqin Li, Hong Xu, Hong Xu, Hong Xu, Mingyong Xie, Mingyong Xie, Mingyong Xie, Tao Xiong, Tao Xiong, Tao Xiong, Zhanggen Liu, Zhanggen Liu, Zhanggen Liu, Zhanggen Liu
Published 2025-02-01
Article -
10
Security in cognitive radio networks by Qing-qi PEI, Hong-ning LI, Hong-yang ZHAO, Nan LI, Ying MIN
Published 2013-01-01
Article -
11