Search

Your search keyword '"Jian Mao"' showing total 108 results

Search Constraints

Start Over You searched for: Author "Jian Mao" Remove constraint Author: "Jian Mao" Publisher ieee Remove constraint Publisher: ieee
108 results on '"Jian Mao"'

Search Results

1. Development and Assessment of Improved Global Pressure and Temperature Series Models

2. Development of a New Tabular Zenith Tropospheric Delay Model for Real-Time GNSS Applications

3. A Minimum Capacity Optimization Scheme for Airport Terminals During Peak Periods

4. Identification of Multi-Dimensional Electromagnetic Information Leakage Using CNN

5. An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance

6. Detecting Malicious Behaviors in JavaScript Applications

7. Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity

9. Estimation of Doppler Parameters Based on PSO for BFSAR Ship Target Imaging.

11. An improved social attribute inference scheme based on multi-attribute correlation

12. Research advance on geometric error recognition algorithm for CNC machine tools

13. Research on Predicting Machining Surface Roughness Based on Neural Network

14. An Efficient Social Attribute Inference Scheme Based on Social Links and Attribute Relevance

15. Identification of Multi-Dimensional Electromagnetic Information Leakage Using CNN

18. Detecting Malicious Behaviors in JavaScript Applications

19. Summary of AGV Path Planning

20. Research on layout optimization of cold chain warehouse center based on SLP method

21. A Novel Correction Algorithm for Distorted QR-code Image

22. Research on Target Detection Method Based on HSV Fusion Gaussian Mixture Model

23. Cloud-based Multi-core Architecture against DNS Attacks

24. Transforming knowledge into intelligence The research on Wisdom Class Teaching Theory and Practice

25. A Detecting Method of Electromagnetic Emanations Based on Stochastic Resonance

26. Robust Detection of Android UI Similarity

30. Retracted: Machining Deformation Control and Compensation Using Whole Mirror Milling Method for Tank Thin-Walled Parts

31. Privilege Leakage and Information Stealing through the Android Task Mechanism

32. Enabling practical experimentation in cyber-security training

33. Research on information equipment industry data analysis modelling establish

34. A detecting method of electromagnetic emanations based on virtual instrument

35. On the security of a dynamic-hash-table based public auditing protocol

36. NSV-GUARD: Constructing Secure Routing Paths in Software Defined Networking

37. A Function-Level Behavior Model for Anomalous Behavior Detection in Hybrid Mobile Applications

38. High efficient planar-heterojunction solar cells achieved by using a smooth CH3NH3PbI3 film via a new approach of forming the PbI2 nanostructure together with strategically high CH3NH3I concentration

40. An Oriented-Group Supporting Multi-user Public Auditing for Data Sharing

41. Distributed indexes design to accelerate similarity based images retrieval in airport video monitoring systems

43. BaitAlarm: Detecting Phishing Sites Using Similarity in Fundamental Visual Features

44. Finding Key Leakage in Hierarchical Distribution of Encrypted Data

45. A Comprehensive Client-Side Behavior Model for Diagnosing Attacks in Ajax Applications

46. Simulation of wind farm radar echoes with high fidelity

47. ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage

48. NIST Cloud Computing Reference Architecture

49. Determination of PCBs in Sediments by ASE and GC/MS

50. Supply Chain System Modeling Based on Dynamic Alliance Enterprise

Catalog

Books, media, physical & digital resources