Search

Your search keyword '"Tan, Zhiyuan"' showing total 451 results

Search Constraints

Start Over You searched for: Author "Tan, Zhiyuan" Remove constraint Author: "Tan, Zhiyuan" Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
451 results on '"Tan, Zhiyuan"'

Search Results

1. HETOCompiler: An MLIR-based crypTOgraphic Compilation Framework for HEterogeneous Devices

4. Pre-configured Error Pattern Ordered Statistics Decoding for CRC-Polar Codes

6. Can Federated Models Be Rectified Through Learning Negative Gradients?

7. Robust Multimodal Failure Detection for Microservice Systems

9. A Probability Mapping-Based Privacy Preservation Method for Social Networks

11. Codes Correcting Burst and Arbitrary Erasures for Reliable and Low-Latency Communication

12. An Omnidirectional Approach to Touch-based Continuous Authentication

13. Reliability and Latency Analysis of Sliding Network Coding With Re-Transmission

15. Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection

16. A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs

20. Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge

21. Deriving ChaCha20 Key Streams From Targeted Memory Analysis

22. Decrypting live SSH traffic in virtual environments

24. The Effects of Heavy Metal Pollution on Soil Nitrogen Transformation and Rice Volatile Organic Compounds under Different Water Management Practices

31. Heterogeneous Services Provisioning in Small Cell Networks with Cache and Mobile Edge Computing

33. The Effects of Heavy Metals Pollution on Nitrogen Transformation and Volatile Organic Compounds in Paddy Soil under Different Water Management Practices

34. Diversity of Unusual Ribosomal Genes and Ecological Origin of Rice (Oryza spp.)

37. Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

38. Diversity of Unusual Ribosomal Genes and Ecological Origin of Rice

44. Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme

45. A Multi-attributes-Based Trust Model of Internet of Vehicle

Catalog

Books, media, physical & digital resources