68 results on '"Li, Wenjia"'
Search Results
2. Indicating Classroom Observation Protocols in PBL Studies.
3. Study on the influence of installation angle on pitot tube in wind tunnel
4. EnsembleDroid: A Malware Detection Approach for Android System based on Ensemble Learning
5. The impact of ESG information disclosure quality on firm value.
6. Security and Privacy for Emerging IoT and CPS Domains
7. Toward A Decentralized, Trustworthy and Fair Vehicle Resource Sharing as a Service: Key Technologies and Challenges
8. AdversarialDroid: A Deep Learning based Malware Detection Approach for Android System Against Adversarial Example Attacks
9. Self-face Recognition in Schizophrenia: A Meta-analysis
10. Research on visualization method of high dynamic range infrared image based on M-CLAHE
11. Estimating the Average Road Travel Time Based on Soft Set Under Connected and Autonomous Vehicles
12. High dynamic range in infrared image using super-framing framework
13. An Efficient Mobile Server Task Scheduling Algorithm in D2D Environment
14. A Robust Malware Detection Approach for Android System Against Adversarial Example Attacks
15. Clustering-Based Algorithm for Services Deployment in Mobile Edge Computing Environment
16. A numerical analysis of power consumption differences between planning and operation stages using mutual information
17. 4D geomechanical research in hydraulic fracturing of unconventional reservoir
18. Passively Q-switched Er-doped fiber laser based on NbSe2 quantum dot saturable absorber
19. A Low-Cost Edge Server Placement Strategy in Wireless Metropolitan Area Networks
20. An Android Malware Detection Approach Using Weight-Adjusted Deep Learning
21. An efficient Multi-Clusters based Routing algorithm in Mobile Opportunistic Networks
22. The Improved Earliest Deadline First with Virtual Deadlines Mixed-Criticality Scheduling Algorithm
23. Toward Complex Search for Encrypted Cloud Data via Blind Index Storage
24. An Energy-Balancing and Spectrum-Aware Clustering Algorithm for Cognitive Radio Sensor Networks
25. An Effective Clustering Routing Algorithm Based on Social-Interest Similarity in Mobile Opportunistic Networks
26. An Effective Routing Algorithm Based on Social Community for Mobile Opportunistic Networks
27. A Novel Social-Based Clustering and Routing Scheme in Mobile Opportunistic Networks
28. An Enhanced Community-Based Routing with Ferry in Opportunistic Networks
29. Driver identification and authentication with active behavior modeling
30. DroidDeepLearner: Identifying Android malware using deep learning
31. Unequal Failure Protection Coding Technology for Cloud Storage Systems
32. A Deep Learning Approach to Android Malware Feature Learning and Detection
33. BAN-trust: An attack-resilient malicious node detection scheme for body area networks
34. Detecting Malware for Android Platform: An SVM-Based Approach
35. An Indoor Localization Algorithm Based on Dynamic Measurement Compressive Sensing for Wireless Sensor Networks
36. SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks
37. Fest: A feature extraction and selection tool for Android malware detection
38. Android app recommendation approach based on network traffic measurement and analysis
39. SVM-based malware detection for Android applications
40. Recommendation-Based Trust Management in Body Area Networks for Mobile Healthcare
41. Data Center Heat Monitoring Using Wireless Sensor Networks
42. Trustworthy data management for wireless networks in Cyber-Physical Systems
43. Finding abnormal data in vehicular cyber physical systems
44. Analysis of digital predistortion architectures for direct digital-to-RF transmitter systems
45. SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks
46. Extracting Information about Security Vulnerabilities from Web Text
47. CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies
48. ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine
49. Optimization of the structure of bilayer organic solar cells based on light intensity distribution and quantity of effective excitons
50. Enforcing secure and robust routing with declarative policies
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.