Search

Your search keyword '"Qin Yu"' showing total 44 results

Search Constraints

Start Over You searched for: Author "Qin Yu" Remove constraint Author: "Qin Yu" Publication Type eBooks Remove constraint Publication Type: eBooks
44 results on '"Qin Yu"'

Search Results

3. Balancing Topology Research of Lithium-Ion Battery Pack

7. Design and Application of Edge Intelligent Recognition Device for Multiple Video Streams in Substations

8. Screw Missing Detection Based on MSER Algorithm

9. Pretraining Improves Deep Learning Based Tissue Microstructure Estimation

10. Multi-hop Learning Promote Cooperation in Multi-agent Systems

11. A Best-Marketing Time Prediction Algorithm Based on Big Data Analytics

12. Simulation of the Mechanical Vibrations in a High Voltage Transformer

13. An Analysis of the Correlation Reception Applied in Reading a Metal Barcode Label

14. An Analysis for the Inter Bit Interference in Reading a Metal Barcode Label

15. Super-Resolved q-Space Deep Learning

16. An Efficient Trustzone-Based In-application Isolation Schema for Mobile Authenticators

17. Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System

18. Secure Code Updates for Smart Embedded Devices Based on PUFs

20. TICS: Trusted Industry Control System Based on Hardware Security Module

21. Extraction of Expert Relations Integrated with Expert Topic and Associated Relationship Features

22. Computational Soundness Results for Stateful Applied Calculus

23. AEP-M: Practical Anonymous E-Payment for Mobile Devices Using ARM TrustZone and Divisible E-Cash

24. TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems

25. Automated Security Proof of Cryptographic Support Commands in TPM 2.0

26. Improving the Security of the HMQV Protocol Using Tamper-Proof Hardware

27. Approaches to Detect Micro-Blog User Interest Communities Through the Integration of Explicit User Relationship and Implicit Topic Relations

28. DAA-TZ: An Efficient DAA Scheme for Mobile Devices Using ARM TrustZone

30. Universally Composable Secure TNC Protocol Based on IF-T Binding to TLS

31. ExBLACR: Extending BLACR System

32. Automated Proof for Authorization Protocols of TPM 2.0 in Computational Model

33. TEEM: A User-Oriented Trusted Mobile Device for Multi-platform Security Applications

34. Mobile Trusted Agent (MTA): Build User-Based Trust for General-Purpose Computer Platform

35. Type-Based Analysis of Protected Storage in the TPM

37. DAA Protocol Analysis and Verification

39. Analyzing of Mean-Shift Algorithm in Gray Target Tracking Technology

41. IBM Cloud Computing Powering a Smarter Planet

Catalog

Books, media, physical & digital resources