103 results on '"Luo, Bo"'
Search Results
2. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
3. Field Practice of Carbon Dioxide Huff and Puff in Bottom Water Heavy Oil Reservoirs of the Sixth District of Gangxi Oilfield
4. Sensitivity Quantification Study on the Main Influencing Factors of Water-Flooding Development in Medium Permeability Reservoir
5. Pilot Study on Enhanced Oil Recovery by Gravity Assisted Deoxygenated Air Flooding in N Fault Block
6. A Key Technology Serial to Enhance Oil Recovery at the Ultra-high Water Cut & Ultra-high Recovery Stage in the 4th Block of Gangxi Oilfield
7. New Model for Experimental Data Processing of Oil-Water Relative Permeability in Low Permeability Reservoirs Considering Starting Pressure and Nonlinear Seepage Characteristics
8. Microscopic Pore Structure Characteristics of Low Permeability Rock Samples in Dagang Oilfield
9. A Magnetic Field Energy Harvester to Power Micro-power Sensors on the Freight Train for Railway Application
10. Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature
11. Hide and Seek: On the Stealthiness of Attacks Against Deep Learning Systems
12. IoTPrivComp: A Measurement Study of Privacy Compliance in IoT Apps
13. CONTRA: Defending Against Poisoning Attacks in Federated Learning
14. CANSentry: Securing CAN-Based Cyber-Physical Systems against Denial and Spoofing Attacks
15. Tear Off Your Disguise: Phishing Website Detection Using Visual and Network Identities
16. Analysis on Effects of Regulation Projects in Tongbai Reach of Yangtze Estuary and Their Impacts on River Regime
17. Arcana: Enabling Private Posts on Public Microblog Platforms
18. FGFDect: A Fine-Grained Features Classification Model for Android Malware Detection
19. A-Tor: Accountable Anonymity in Tor
20. Hide Your Hackable Smart Home from Remote Attacks: The Multipath Onion IoT Gateways
21. CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices
22. Examining the Relationships between Foreign Language Anxiety and Attention during Conversation Tasks
23. FamilyID: A Hybrid Approach to Identify Family Information from Microblogs
24. The Structure and Application of Huge Closed-Loop System of Resources-Environment-Ecology
25. A Complete Methodology for Estimating Dynamics of the Heavy Machine Tool Structure
26. Privacy Preserving Group Linkage
27. Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
28. Security-Conscious XML Indexing
29. Pragmatic XML Access Control Using Off-the-Shelf RDBMS
30. A Flexible Framework for Architecting XML Access Control Enforcement Mechanisms
31. Policy Modeling and Anomaly Detection in ABAC Policies
32. Designing a Service for Compliant Sharing of Sensitive Research Data
33. Authenticated Multi-proxy Accumulation Schemes for Delegated Membership Proofs
34. Extending the Exposure Score of Web Browsers by Incorporating CVSS
35. A Stakeholder-Centric Approach for Defining Metrics for Information Security Management Systems
36. Path-Preserving Anonymization for Inter-domain Routing Policies
37. Threat Modeling of Cyber-Physical Systems in Practice
38. Intelligent Decision Support for Cybersecurity Incident Response Teams: Autonomic Architecture and Mitigation Search
39. Using Garbled Circuit for Secure Brokering
40. A Novel Approach for Attack Tree to Attack Graph Transformation
41. A TSX-Based KASLR Break: Bypassing UMIP and Descriptor-Table Exiting
42. AVSDA: Autonomous Vehicle Security Decay Assessment
43. Quantum Computing Threat Modelling on a Generic CPS Setup
44. Model Evasion Attacks Against Partially Encrypted Deep Neural Networks in Isolated Execution Environment
45. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
46. Pass-As-You-Go: A Direct Anonymous Attestation-Based Untraceable Contactless Transit Pass
47. Towards Demystifying Adversarial Robustness of Binarized Neural Networks
48. POSTER: Optimizing Device Implementation of Linear Layers with Automated Tools
49. POSTER: Another Look at Boyar-Peralta’s Algorithm
50. Kryptonite: An Adversarial Attack Using Regional Focus
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.