Showing 1 - 20 results of 53 for search 'Yi Xian', query time: 0.03s
Refine Results
-
1
Accretion of Active Galactic Nucleus Stars Under the Influence of Disk Geometry by Yi-Xian Chen, Yan-Fei Jiang, Jeremy Goodman
Published 2025-01-01Get full text
Article -
2
Calculation of impact characteristics and icing phase transitions of salty droplets by TANG Yuhao, CHAI Delin, YI Xian, GUI Yewei
Published 2025-02-01Get full text
Article -
3
Study on niche of dominant tree populations of Cerasus subhirtella var. ascendens communities by XIE Chun-ping, YI Xian-gui, WANG Xian-rong
Published 2008-09-01Get full text
Article -
4
-
5
Research on the privacy-preserving point-in-polygon protocol by Jing ZHANG, Shou-shan LUO, Yi-xian YANG, Yang XIN
Published 2016-04-01Get full text
Article -
6
Novel NFA engine construction method of regular expressions by Mao-hua JING, Yi-xian YANG, Tao WANG, Yang XIN
Published 2014-10-01Get full text
Article -
7
Smart Fuzzing method based on comparison algorithm of control flow sequences by Ying WANG, Yi-xian YANG, Xin-xin NIU, Li-ze GU
Published 2013-04-01Get full text
Article -
8
Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG
Published 2015-01-01Get full text
Article -
9
-
10
Alert processing based on attack graph and multi-source analyzing by Wei-xin LIU, Kang-feng ZHENG, Bin WU, Yi-xian YANG
Published 2015-09-01Get full text
Article -
11
Smart Fuzzing method based on comparison algorithm of control flow sequences by Ying WANG, Yi-xian YANG, Xin-xin NIU, Li-ze GU
Published 2013-04-01Get full text
Article -
12
Constructing optimized Boolean functions by CHEN Wei1, YANG Yi-xian1, NIU Xin-xin2
Published 2006-01-01Get full text
Article -
13
New solution scheme for the member revocation in group signature by De-dong ZHANG, Zhao-feng MA, Yi-xian YANG, Xin-xin NIU
Published 2014-03-01Get full text
Article -
14
Danger theory inspired intrusion detection model for wireless sensor networks by Rong-rong FU, Kang-feng ZHENG, Tian-liang LU, Yi-xian YANG
Published 2012-09-01Get full text
Article -
15
Comparison of Ultraviolet A/B and C Irradiation for Exosome Secretion Enhancement in HEK 293T Cell by Ching-Chih Chan, Pohao Lin, Yi Xian, Ruey-Hwang Chou, Yi-Jui Liu
Published 2025-03-01Get full text
Article -
16
Data sharing scheme supporting secure outsourced computation in wireless body area network by Wei-wei ZHANG, Yu-zhao ZHANG, Chao HUANG, Ru ZHANG, Yi-xian YANG
Published 2017-04-01Get full text
Article -
17
VDSC steganalysis algorithm of echo hiding by YANG Yu1, LEI Min1, NIU Xin-xin1, YANG Yi-xian1
Published 2009-01-01Get full text
Article -
18
Study on security routing algorithm based on dynamic adjacent trust by Ting HAN, Shou-shan LUO, Yang XIN, Yi-xian YANG, Gong CHENG, Xiao WU
Published 2013-06-01Get full text
Article -
19
Model for virtual corporations partner selection based on adaptive genetic algorithm by LI Jian1, JING Bo2, NIU Shao-zhang1, YANG Yi-xian1
Published 2009-01-01Get full text
Article -
20