37 results on '"Liu, Xiangyu"'
Search Results
2. Typical Cases Analysis of Transmission Cable Sheath Grounding System Defects
3. L-EfficientUNet: Lightweight End-to-End Monocular Depth Estimation for Mobile Robots
4. The Low Back Fatigue Research Based on Controlled Sedentary Driving Tasks
5. Motivation Enhancement Design for Individual Exercise Habits Based on Multimodal Physiological Signals
6. Design for Shoulder and Neck Pain Based on Yoga Asanas Practice
7. Research on Gamified Design of Introductory Core Muscle Training
8. Fine-Grained Verifier NIZK and Its Applications
9. EKE Meets Tight Security in the Universally Composable Framework
10. Virtual Rehabilitation Service for Upper Amputees Based on Computer-Aided Environment
11. Research on Product Design of EMG Wearable Device Based on High-Density Electromyography
12. Edge-Computing System Based on Smart Mat for Sleep Posture Recognition in IoMT
13. Parameter Modification Method and Influence Analysis of Double-Circuit Transmission Lines on the Same Tower
14. Research on the Relationship Between Chinese Nicknames and Accounts in Social Networks
15. Combining Model-Based and Model-Free Reinforcement Learning Policies for More Efficient Sepsis Treatment
16. Research on Development Status of Modern Wireless Communication Technology and Its Future Development Trend
17. Fast Mining of Top-k Frequent Balanced Association Rules
18. Muscle Fatigue Monitoring: Using HD-sEMG Techniques
19. The Impact of Different Levels of Creative Thinking Members in Group Collaboration Based on Semantic Link
20. Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security
21. Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications
22. Analysis and Defense of Network Attacking Based on the Linux Server
23. A Fast and Simple Sample-Based T-Shirt Image Search Engine
24. Dummy-Based Trajectory Privacy Protection Against Exposure Location Attacks
25. Uncertain Data Mining
26. Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild
27. Answering Why-Not Questions on Structural Graph Clustering
28. Remote Sensing Image Fusion Based on Two-Stream Fusion Network
29. Spatio-Temporal Features Based Sensitive Relationship Protection in Social Networks
30. Adaptive Potential Fields Model for Solving Distributed Area Coverage Problem in Swarm Robotics
31. Preserving the d-Reachability When Anonymizing Social Networks
32. An Empirical Study on Android for Saving Non-shared Data on Public Storage
33. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections
34. Protecting Sensitive Relationships against Inference Attacks in Social Networks
35. A Generalization Based Approach for Anonymizing Weighted Social Network Graphs
36. A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing
37. Identification and Characterization of Fibronectin Isoforms from Zebrafish
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.