78 results on '"Chen, Liqun"'
Search Results
2. A novel feature combination screening method for Li-ion battery state of health prediction
3. Understanding and Constructing Latent Modality Structures in Multi-Modal Representation Learning
4. Interactive Teaching Reform for “Principles of Automatic Control” Course Based on Professional Cases
5. High-Fidelity Variable-Rate Image Compression via Invertible Activation Transformation
6. A study of Hybrid reactive Compensation
7. Multi-modal Alignment using Representation Codebook
8. Vision-Language Pre-Training with Triple Contrastive Learning
9. Practical EMV Relay Protection
10. Research on the Correlation Between China's Meat Non-staple Food Prices Based on Univariate Regression
11. A Survey of Technologies for Building Trusted Networks
12. Research on edge enhancement of optical image based on acousto-optic filtering
13. Hyperspectral imaging system based on fiber endoscope
14. Wasserstein Contrastive Representation Distillation
15. Contextualized Perturbation for Textual Adversarial Attack
16. SpanPredict: Extraction of Predictive Document Spans with Neural Attention
17. Provable-Security Model for Strong Proximity-based Attacks: With Application to Contactless Payments
18. Formal Analysis and Implementation of a TPM 2.0-based Direct Anonymous Attestation Scheme
19. Adversarial Perturbation with ResNet
20. Improving Text Generation with Student-Forcing Optimal Transport
21. A novel feature combination screening method for Li-ion battery state of health prediction.
22. A Framework for Efficient Lattice-Based DAA
23. Message from IEEE TrustCom 2019 General Chairs
24. A Symbolic Analysis of ECC-Based Direct Anonymous Attestation
25. A Hierarchical Multiscale Framework for History Matching and Optimal Well Placement for a HPHT Fractured Gas Reservoir, Tarim Basin, China
26. Improving Textual Network Embedding with Global Attention via Optimal Transport
27. Towards Generating Long and Coherent Text with Multi-Level Latent Variable Models
28. A Linear Distinguisher and its Application for Analyzing Privacy-Preserving Transformation Used in Verifiable (Outsourced) Computation
29. Privacy-enhanced capabilities for VANETs using direct anonymous attestation
30. Authenticating Compromisable Storage Systems
31. Password Authenticated Keyword Search
32. One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation
33. Broadband performance of a piezoelectric energy harvester based on the internal resonance of buckled beam
34. Keynote speaker 1: Global harmonization of cryptographic standards
35. Du-Vote: Remote Electronic Voting with Untrusted Computers
36. The Fairy-Ring Dance
37. A secondary-side phase-shift-controlled soft-switching DC/DC converter utilizing two transformers with wide voltage gain for high step-down applications
38. A high step-down non-isolated bus converter with partial power conversion based on synchronous LLC resonant converter
39. Balancing Societal Security and Individual Privacy: Accountable Escrow System
40. Research on working modal identification of electronic equipment by cross spectrum
41. A privacy-aware reputation-based announcement scheme for VANETs
42. Cross-domain password-based authenticated key exchange revisited
43. Flexible and scalable digital signatures in TPM 2.0
44. When private set intersection meets big data
45. An historical examination of open source releases and their vulnerabilities
46. Message from SOWN Workshop Chairs
47. Ring Group Signatures
48. Publicly Posted Composite Documents in Variably Ordered Workflows
49. End-to-End Policy-Based Encryption and Management of Data in the Cloud
50. Premature silent workflow termination in publicly posted composite documents
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.