Search

Your search keyword '"Niansheng Liu"' showing total 25 results

Search Constraints

Start Over You searched for: Author "Niansheng Liu" Remove constraint Author: "Niansheng Liu" Language undetermined Remove constraint Language: undetermined
25 results on '"Niansheng Liu"'

Search Results

1. Refined Voting and Scene Feature Fusion for 3D Object Detection in Point Clouds

4. Protective functions of salvianolic acid B in PC-12 cells against hydrogen peroxide-triggered damage by mediation of microRNA-26a

6. Visual Illusion Induced by Uncertain Environment in Neural Dynamics Cognitive System

7. miR-23b-3p regulates differentiation of osteoclasts by targeting PTEN via the PI3k/AKT pathway

8. Cryptographic performance for Rijndael and RC6 block ciphers

9. Performance analysis of MAC layer for LTE networks

10. Robust blind image watermarking based on chaotic mixtures

11. Complexity of chaotic binary sequence and precision of its numerical simulation

12. Annotations for symmetric probabilistic encryption algorithm based on chaotic attractors of neural networks

13. Watermarking scheme of colour image based on chaotic sequences

14. A new images hiding scheme based on chaotic sequences

15. Security Analysis of MAC Protocol for Mobile Device Identification Based on PARADIS

16. Remote mutual password authentication for online payment with the elliptic curve cryptography based key agreement

17. Robust digital watermarking based on chaotic maps

18. Performance analysis of routing protocols for vehicle safety communications on the freeway

19. Hybrid Maintenance Routing for Client Network of Wireless Mesh Network

20. A New Wavelet Watermark Scheme of Color Image Based on Chaotic Sequences

21. Security analysis and configuration of SSL protocol

22. Study on the Pseudorandomness and Complexity of Chaotic Binary Sequences

23. Research on Cryptographical Properties of the Piecewise Linear Chaotic Map with a Segment Number Parameter

24. Security Analysis of Public-Key Encryption Scheme Based on Neural Networks and Its Implementing

25. A pairing-based password authentication scheme using smart card with user anonymity

Catalog

Books, media, physical & digital resources