Showing 1 - 20 results of 136 for search 'Yi CHEN', query time: 0.03s
Refine Results
-
1
Editorial: Functional biomaterials for drug delivery by Yi Chen, Zhengwei Cai
Published 2025-02-01
Article -
2
The dilemma between fertility and work: How did the Universal Two-Child policy affect Chinese women's labor income? by Yi Chen, Zu Wang
Published 2024-01-01
Article -
3
Combination of AAV-CCL19 and GPC3 CAR-T Cells in the Treatment of Hepatocellular Carcinoma by Min Meng, Yi-chen Wu
Published 2021-01-01
Article -
4
Study on multiple wind turbines in a platform under extreme waves and wind loads by Shen-Haw Ju, Yi-Chen Huang
Published 2025-01-01
Article -
5
A study of testing-index and certification systems of IoT terminals for smart city in China by Jing YANG, Jinfeng XIE, Yi CHEN
Published 2022-06-01
Article -
6
Knowledge Flow Dynamics in Organizations: A Stochastic Multi-Scale Analysis of Learning Barriers by Jih-Jeng Huang, Chin-Yi Chen
Published 2025-01-01
Article -
7
Federated Learning Based on Kernel Local Differential Privacy and Low Gradient Sampling by Yi Chen, Dan Chen, Niansheng Tang
Published 2025-01-01
Article -
8
The Design and Implementation of the English Pronunciation Education Device by Kuo-Yi Chen, Wen Jie, Cai Cai
Published 2019-05-01Article -
9
-
10
Practical group signature scheme with verifier-local revocation by LI Ji-guo, SUN Gang, ZHANG Yi-chen
Published 2011-01-01
Article -
11
-
12
Two-Stage Pricing Decision for Low-Carbon Products Based on Consumer Strategic Behaviour by Cheng Che, Zhihong Zhang, Xiaoguang Zhang, Yi Chen
Published 2021-01-01
Article -
13
The Effects of Different Representations on Static Structure Analysis of Computer Malware Signatures by Ajit Narayanan, Yi Chen, Shaoning Pang, Ban Tao
Published 2013-01-01
Article -
14
Optimization Design and Analysis of Sprocket Chain Plate Stage Driving Device by Houjin Zhou, Xue Wang, Yabin Wang, Yi Chen
Published 2020-09-01
Article -
15
-
16
-
17
Detecting and Defending against Replication Attacks in Wireless Sensor Networks by Xiang-yi Chen, Li-xia Meng, Yong-zhao Zhan
Published 2013-06-01
Article -
18
Mobile detection of replication attacks in wireless sensor network by Xiang-yi CHEN, Liang-min WANG, Yong-zhao ZHAN
Published 2012-09-01
Article -
19
-
20
Certificateless signature scheme without random oracles by Yan-qiong LI, Ji-guo LI, Yi-chen ZHANG
Published 2015-04-01
Article