Search

Your search keyword '"Yi Zhuang"' showing total 171 results

Search Constraints

Start Over You searched for: Author "Yi Zhuang" Remove constraint Author: "Yi Zhuang" Topic computer science Remove constraint Topic: computer science
171 results on '"Yi Zhuang"'

Search Results

2. Dynamic Measurement and Data Calibration for Aerial Mobile IoT

3. Effective and efficient crowd-assisted similarity retrieval of medical images in resource-constraint Mobile telemedicine systems

5. Exploiting Multiple Correlations Among Urban Regions for Crowd Flow Prediction

6. Efficient and Transparent Method for Large-Scale TLS Traffic Analysis of Browsers and Analogous Programs

7. Emergent Schrödinger equation in an introspective machine learning architecture

8. Designing and Manufacturing of Automatic Robotic Lawn Mower

9. Categorical Representation Learning: Morphism is All You Need

10. A Network Security Situational Awareness Framework Based on Situation Fusion

11. A Blockchain-Based Reconstruction Framework for UAV Network

12. SCPAC: An Access Control Framework for Diverse IoT Platforms Based on OAuth2.0

13. Optimization of the Personalized Service System of University Library Based on Internet of Things Technology

14. Intelligent Medical Security Framework of Body Area Network Based on Fog Computing

15. Machine learning holographic mapping by neural network renormalization group

16. Vulnerability Analysis of Instructions for SDC-Causing Error Detection

17. Wideband Power Spectrum Estimation Based on Sub-Nyquist Sampling in Cognitive Radio Networks

18. Multi-focus image fusion method using energy of Laplacian and a deep neural network

19. The Information Management and Service of Open Scientific Data for University Library in the Big Data Era

20. A load prediction model for cloud computing using PSO-based weighted wavelet support vector machine

21. Distributed Bayesian Network Learning Algorithm using Storm Topology

22. Ego-network probabilistic graphical model for discovering on-line communities

23. Visible Light Based Occupancy Inference Using Ensemble Learning

24. Consortium Blockchain-Based Malware Detection in Mobile Devices

25. A security type verifier for smart contracts

27. A three-dimensional virtual resource scheduling method for energy saving in cloud computing

29. A Model-driven Collaborative Modeling Method for Software

30. Mechanism of Action of Bu-Fei-Yi-Shen Formula in Treating Chronic Obstructive Pulmonary Disease Based on Network Pharmacology Analysis and Molecular Docking Validation

31. TZ-MRAS: A Remote Attestation Scheme for the Mobile Terminal Based on ARM TrustZone

32. BAHK: Flexible Automated Binary Analysis Method with the Assistance of Hardware and System Kernel

33. A Fault Detection Algorithm for Cloud Computing Using QPSO-Based Weighted One-Class Support Vector Machine

34. Load Forecasting model of Mobile Cloud Computing Based on Glowworm Swarm Optimization LSTM Network

35. Realization of fixed-point SAR imaging based on embedded GPU

36. An Autonomous UAV Navigation System for Unknown Flight Environment

37. Adaptive Virtual Machine Scheduling Algorithm Based on Improved Particle Swarm Optimization

38. Information Scrambling in Quantum Neural Networks

39. A New Method for HVDC Grounding Electrode Line Protection Based on Multi-Band Voltage Amplitude Integration

40. Interactive transmission processing for large images in a resource-constraint mobile wireless network

41. Towards professionally user-adaptive large medical image transmission processing in mobile telemedicine systems

42. A formal model and risk assessment method for security-critical real-time embedded systems

43. On the optimal design of secure network coding against wiretapping attack

44. Accuracy-Aware Interference Modeling and Measurement in Wireless Sensor Networks

45. High sampling rate or high resolution in a sub-Nyquist sampling system

46. Incorporating Handcrafted Features into Deep Learning for Point Cloud Classification

47. PHRiMA: A permission-based hybrid risk management framework for android apps

48. A Flexible Network Utility Optimization Approach for Energy Harvesting Sensor Networks

49. ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds

50. A Concept Drift Based Ensemble Incremental Learning Approach for Intrusion Detection

Catalog

Books, media, physical & digital resources