473 results on '"Sun, Jun"'
Search Results
2. Enhancing Power System Resilience with False Data Injection-Resistant Model Predictive Control
3. Data Security Mechanism of Digital Library Based on Blockchain
4. Towards an Effective and Interpretable Refinement Approach for DNN Verification
5. Real-Time Generation and Automatic Update of 3D Point Cloud Maps in Featureless Environments Based on Multi-Sensor Fusion
6. Semantic-Embedded Knowledge Acquisition and Reasoning for Image Segmentation
7. Prompt Prototype Learning Based on Ranking Instruction For Few-Shot Visual Tasks
8. Optimal Fault Estimation and Fault-tolerant Control for Spacecraft Formation via Stackelberg Differential Game approach
9. Explicit Boundary Guided Semi-Push-Pull Contrastive Learning for Supervised Anomaly Detection
10. Analysis of Aluminum Eddy Current Effect for Planar Switched Reluctance Motors
11. Finding Causally Different Tests for an Industrial Control System
12. Network Performance of pLEO Topologies in a High-Inclination Walker Delta Satellite Constellation
13. Mask-Guided Transformer for Human-Object Interaction Detection
14. Design and research on business processor of electricity consumption information collection system
15. Pricing Strategies of AI-enabled and Regular Products
16. How Big Data Analytics Mitigates Supply Chain Vulnerability? An Interpretive Structural Modeling
17. Digital IT Innovation to Improve Supply Chain Resilience: A Systematic Literature Review
18. FBMOT: Flow Bridges the Gap between Detection and Tracking in Multiple Object Tracking
19. Contingent Routing Using Orbital Geometry in Proliferated Low-Earth-Orbit Satellite Networks
20. Failure Resilience in Proliferated Low Earth Orbit Satellite Network Topologies
21. Fault Diagnosis Method of Oil-Immersed Transformer Based on the Production Pattern of Free Gas and Dissolved Gas in Oil
22. LoNAS: Low-Cost Neural Architecture Search Using a Three-Stage Evolutionary Algorithm [Research Frontier].
23. ORIGAMI: Folding Data Structures to Reduce Timing Side-Channel Leakage
24. A Joint Framework Based on Accountable AI for Driving Behavior Assessment and Backtracking
25. Discriminative Mutual Learning for Multi-target Domain Adaptation
26. Keynote Talk 3: Verifying Neural Networks Against Backdoor Attacks
27. MLE-based Device Activity Detection for Grant-free Massive Access under Rician Fading
28. Research on the Characteristics and Security Risks of the Internet of Vehicles Data
29. Data traceability scheme of industrial control system based on digital watermark
30. 10 Gigabit industrial thermal data acquisition and storage solution based on software-defined network
31. No-Reference Point Cloud Quality Assessment via Domain Adaptation
32. An Improved Control Strategy Based On Sliding Mode Observer for Sensorless PMSM Drives
33. Study on Abnormal Gate Structures of GaN HEMT Devices
34. gDefects4DL: A Dataset of General Real-World Deep Learning Program Defects
35. Research on Insulation Defect Discharge Characteristics of Dry-Type Reactor Based on Acoustic Power Spectral Density
36. Study on the Audible Acoustic Features of Dry-Type Reactor under Typical Insulation Defects
37. Observability and Performance Analysis of Spacecraft Autonomous Navigation Using Stellar Aberration Observation
38. Comparative Study of Deep Learning Models For Automatic Detection of Metastases in H&E Stained Images
39. Sentiment Analysis of Cancer Patients About Their Treatment During the Peak Time of Pandemic COVID-19
40. H∞ Robust Control for ICPT System With Selected Weighting Function Considering Parameter Perturbations.
41. Zero-Voltage Switching Regulation Strategy of Full-Bridge Inverter of Inductive Power Transfer System Decoupled From Output Characteristics.
42. PICA: Point-wise Instance and Centroid Alignment Based Few-shot Domain Adaptive Object Detection with Loose Annotations
43. Research on Gas Movement Law of Fault Discharge in Transformer Oil
44. Jamming Resource Allocation for Multi-jammer Cooperatively Suppressing Netted Radar Systems
45. Key Roles of the Full Life Cycle of the “Internet +” Environmental Public Welfare Projects
46. Transboundary Cooperation of Environmental Public Welfare Organizations: An Impact Mechanism Model
47. Supply Chain Vulnerability and Collaborative Management Empowered by Emerging IT: An Analysis from China's Practice
48. A Hybrid Approach with Joint Use of Tag and Rating for Vehicle and Cargo Matching
49. Application of DNN with MDFE in Intrusion Detection
50. Verification Assisted Gas Reduction for Smart Contracts
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.