55 results on '"Li, Zhoujun"'
Search Results
2. PPMGS: An Efficient and Effective Solution for Distributed Privacy-Preserving Semi-Supervised Learning
3. Efficient Dimension Reduction for Data Secure Aggregation with Resilience to Dropouts
4. Rational design of the nanocomposite by in-situ sub-10 nm La(OH)3 formation for selective phosphorus removal in waters
5. Scanning, attention, and reasoning multimodal content for sentiment analysis
6. Unsupervised abstractive summarization via sentence rewriting
7. Effect of test configurations and loading protocols on performance of timber-concrete connectors
8. Ppmgs: An Efficient and Effective Solution for Distributed Privacy-Preserving Semi-Supervised Learning
9. Pbaeg: Combine-Vulnerabilities Aeg to Defeat Protection Mechanisms
10. Dynamic self-attention with vision synchronization networks for video question answering
11. A new methodology for anomaly detection of attacks in IEC 61850-based substation system
12. Neighbor enhanced graph convolutional networks for node classification and recommendation
13. The Effect of Different Test Configurations and Loading Rates on the Shear Performance of Timber-Concrete Composite Shear Connectors
14. Deep learning for online AC False Data Injection Attack detection in smart grids: An approach using LSTM-Autoencoder
15. Dual self-attention with co-attention networks for visual question answering
16. An improved ELM-based and data preprocessing integrated approach for phishing detection considering comprehensive features
17. Dissimilar joining mechanism, microstructure and properties of Ni to 316 stainless steel via Ni-Al thermal explosion reaction
18. Visual Question Answering via Combining Inferential Attention and Semantic Space Mapping
19. Detecting bi-level false data injection attack based on time series analysis method in smart grid
20. Mixture distribution modeling for scalable graph-based semi-supervised learning
21. A unified framework of identity-based sequential aggregate signatures from 2-level HIBE schemes
22. Visual question answering via Attention-based syntactic structure tree-LSTM
23. Adversarial learning for multi-view network embedding on incomplete graphs
24. Visual-textual sentiment classification with bi-directional multi-level attention networks
25. Sentiment analysis of social images via hierarchical deep fusion of content and links
26. Network embedding by fusing multimodal contents and links
27. Image–text sentiment analysis via deep multimodal attentive fusion
28. Self-healing group key distribution protocol in wireless sensor networks for secure IoT communications
29. Deep multi-view representation learning for social images
30. Response selection with topic clues for retrieval-based chatbots
31. From content to links: Social image embedding with deep multimodal model
32. Unsupervised geographically discriminative feature learning for landmark tagging
33. Multi-modal kernel ridge regression for social image classification
34. Response selection from unstructured documents for human-computer conversation systems
35. TinyVisor: An extensible secure framework on android platforms
36. Improved-ELM method for detecting false data attack in smart grid
37. Named entity disambiguation for questions in community question answering
38. Search engine reinforced semi-supervised classification and graph-based summarization of microblogs
39. Event detection and popularity prediction in microblogging
40. A novel fuzzy identity based signature scheme based on the short integer solution problem
41. A novel variable precision (θ,σ)-fuzzy rough set model based on fuzzy granules
42. Social image tagging using graph-based reinforcement on multi-type interrelated objects
43. Efficient and dynamic key management for multiple identities in identity-based systems
44. Relationship strength estimation for online social networks with the study on Facebook
45. A provably secure authenticated key agreement protocol for wireless communications
46. Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT
47. An efficient dynamic authenticated key exchange protocol with selectable identities
48. Provably secure identity-based authenticated key agreement protocols with malicious private key generators
49. An efficient and non-interactive hierarchical key agreement protocol
50. Mining and modeling linkage information from citation context for improving biomedical literature retrieval
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.