Search

Your search keyword '"Liu, Xiangyu"' showing total 37 results

Search Constraints

Start Over You searched for: Author "Liu, Xiangyu" Remove constraint Author: "Liu, Xiangyu" Publication Type eBooks Remove constraint Publication Type: eBooks
37 results on '"Liu, Xiangyu"'

Search Results

1. Evaluating Prototype Design Criteria for Human-Computer Interface Using Intuitionistic Fuzzy Z-Numbers Based Best-Worst Method

2. Typical Cases Analysis of Transmission Cable Sheath Grounding System Defects

3. L-EfficientUNet: Lightweight End-to-End Monocular Depth Estimation for Mobile Robots

4. The Low Back Fatigue Research Based on Controlled Sedentary Driving Tasks

5. Motivation Enhancement Design for Individual Exercise Habits Based on Multimodal Physiological Signals

6. Design for Shoulder and Neck Pain Based on Yoga Asanas Practice

7. Research on Gamified Design of Introductory Core Muscle Training

8. Fine-Grained Verifier NIZK and Its Applications

9. EKE Meets Tight Security in the Universally Composable Framework

12. Edge-Computing System Based on Smart Mat for Sleep Posture Recognition in IoMT

13. Parameter Modification Method and Influence Analysis of Double-Circuit Transmission Lines on the Same Tower

15. Combining Model-Based and Model-Free Reinforcement Learning Policies for More Efficient Sepsis Treatment

16. Research on Development Status of Modern Wireless Communication Technology and Its Future Development Trend

17. Fast Mining of Top-k Frequent Balanced Association Rules

18. Muscle Fatigue Monitoring: Using HD-sEMG Techniques

19. The Impact of Different Levels of Creative Thinking Members in Group Collaboration Based on Semantic Link

20. Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security

22. Analysis and Defense of Network Attacking Based on the Linux Server

23. A Fast and Simple Sample-Based T-Shirt Image Search Engine

24. Dummy-Based Trajectory Privacy Protection Against Exposure Location Attacks

26. Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild

27. Answering Why-Not Questions on Structural Graph Clustering

28. Remote Sensing Image Fusion Based on Two-Stream Fusion Network

29. Spatio-Temporal Features Based Sensitive Relationship Protection in Social Networks

30. Adaptive Potential Fields Model for Solving Distributed Area Coverage Problem in Swarm Robotics

31. Preserving the d-Reachability When Anonymizing Social Networks

32. An Empirical Study on Android for Saving Non-shared Data on Public Storage

33. Mind-Reading: Privacy Attacks Exploiting Cross-App KeyEvent Injections

34. Protecting Sensitive Relationships against Inference Attacks in Social Networks

35. A Generalization Based Approach for Anonymizing Weighted Social Network Graphs

36. A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing

Catalog

Books, media, physical & digital resources