Search

Your search keyword '"Xiuzhen CHEN"' showing total 211 results

Search Constraints

Start Over You searched for: Author "Xiuzhen CHEN" Remove constraint Author: "Xiuzhen CHEN"
211 results on '"Xiuzhen CHEN"'

Search Results

101. GW26-e0807 Multimodality Molecular Imaging Monitors Bone Marrow Mesenchymal Stem Cells for the Treatment of Ischemic Heart Disease in Rats

102. Malicious virtual machines detection through a clustering approach

103. An Ime2-like mitogen-activated protein kinase is involved in cellulase expression in the filamentous fungus Trichoderma reesei

104. Multiple behavior information fusion based quantitative threat evaluation

105. Temperature-sensitive membranes prepared by the plasma-induced graft polymerization ofN-Isopropylacrylamide into porous polyethylene membranes

106. A novel major facilitator transporter TrSTR1 is essential for pentose utilization and involved in xylanase induction in Trichoderma reesei

107. Characterization and homologous overexpression of an N-acetylglucosaminidase Nag1 from Trichoderma reesei

108. Wormhole Attacks Detection in MANETs using Graph Theory

109. Histone methyltransferase G9a contributes to H3K27 methylation in vivo

110. GW26-e1342 Relationship between blood pressure and severity of coronary atherosclerosis in asymptomatic adults: assessment with coronary CT angiography

111. A trustless architecture of blockchain-enabled metaverse

112. Towards a Fine-Grained Access Control for Cloud

113. Transcriptional profiling of biomass degradation-related genes during Trichoderma reesei growth on different carbon sources

114. Detecting Community Structure of Complex Networks Based on Network Potential

115. Quantitative threat assessment of denial of service attacks on service availability

116. A privacy-preserving alert correlation model

118. Using attack graphs and intrusion evidences to extrapolate network security state

119. Study of generating attack graph based on privilege escalation for computer networks

120. Evaluating attack time expenses for network security alert causal correlation

121. Generating network attack graphs for security alert correlation

122. Forecast of intrusion behavior based on interactive knowledge discovery

125. Fast Skyline Community Search in Multi-Valued Networks

126. When blockchain meets smart grids: A comprehensive survey

127. A cloud-based framework for verifiable privacy-preserving spectrum auction

128. Delayed bronchobiliary fistula following radiofrequency ablation in a patient with hepatocellular carcinoma: A case report and lesson regarding treatment.

129. CSRF protection in JavaScript frameworks and the security of JavaScript applications

130. Electrolint and security of electron applications

135. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications

137. Perturbation-Based Private Profile Matching in Social Networks

138. An Attribute-Based Encryption Scheme to Secure Fog Communications

139. A Secure and Practical Authentication Scheme Using Personal Devices

140. Cooperative spectrum sharing of multiple primary users and multiple secondary users

145. QuickCash: Secure Transfer Payment Systems

146. Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy

147. Radar and Sonar Sensor Networks

148. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach

149. In Situ Key Establishment in Large-Scale Sensor Networks

150. On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks

Catalog

Books, media, physical & digital resources