Showing 1 - 20 results of 37 for search 'Xian YANG', query time: 0.05s
Refine Results
-
1
Studying on the node’s influence and propagation path modes in microblogging by Hong YU, Xian YANG
Published 2012-09-01
Article -
2
Research on the Slurry for Long-Distance Large-Diameter Pipe Jacking in Expansive Soil by Xian Yang, Yang Liu, Chao Yang
Published 2018-01-01
Article -
3
Target Tracking Algorithm for Underwater Acoustic Sensor Networks under DoS Attack by Jing YAN, Jin YANG, Xian YANG, Xiaoyuan LUO
Published 2024-12-01
Article -
4
Influence of Underground Tunnel Excavation on Upper-level Existing Pipelines by Xingfa Feng, Xian Yang, Yongsuo Li, Xingyu Ding
Published 2022-01-01
Article -
5
Multiscale Tail Risk Connectedness of Global Stock Markets: A LASSO-Based Network Topology Approach by Yuting Du, Xu Zhang, Zhijing Ding, Xian Yang
Published 2022-01-01
Article -
6
Research on the privacy-preserving point-in-polygon protocol by Jing ZHANG, Shou-shan LUO, Yi-xian YANG, Yang XIN
Published 2016-04-01
Article -
7
Novel NFA engine construction method of regular expressions by Mao-hua JING, Yi-xian YANG, Tao WANG, Yang XIN
Published 2014-10-01
Article -
8
-
9
Distributed trust model based on parameter modeling by Jing-pei WANG, Bin SUN, Xin-xin NIU, Yi-xian YANG
Published 2013-04-01
Article -
10
Smart Fuzzing method based on comparison algorithm of control flow sequences by Ying WANG, Yi-xian YANG, Xin-xin NIU, Li-ze GU
Published 2013-04-01
Article -
11
Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG
Published 2015-01-01
Article -
12
Alert processing based on attack graph and multi-source analyzing by Wei-xin LIU, Kang-feng ZHENG, Bin WU, Yi-xian YANG
Published 2015-09-01
Article -
13
-
14
-
15
Danger theory inspired intrusion detection model for wireless sensor networks by Rong-rong FU, Kang-feng ZHENG, Tian-liang LU, Yi-xian YANG
Published 2012-09-01
Article -
16
Moving target defense solution on network layer based on OpenFlow by Yi-xun HU, Kang-feng ZHENG, Yi-xian YANG, Xin-xin NIU
Published 2017-10-01
Article -
17
Identity-based domain key distribution protocol in the E-document security management by Xi-xi YAN, Zhao-feng MA, Yi-xian YANG, Xin-xin NIU
Published 2012-05-01
Article -
18
New solution scheme for the member revocation in group signature by De-dong ZHANG, Zhao-feng MA, Yi-xian YANG, Xin-xin NIU
Published 2014-03-01
Article -
19
New chaos-particle swarm optimization algorithm by Xiao-bo XU, Kang-feng ZHENG, Dan LI, Bin WU, Yi-xian YANG
Published 2012-01-01
Article -
20
Data sharing scheme supporting secure outsourced computation in wireless body area network by Wei-wei ZHANG, Yu-zhao ZHANG, Chao HUANG, Ru ZHANG, Yi-xian YANG
Published 2017-04-01
Article