165 results on '"Jinyue Xia"'
Search Results
2. A Secure Fine-Grained Micro-Video Subscribing System in Cloud Computing
3. Quantum Fuzzy Support Vector Machine for Binary Classification.
4. Operation Configuration Optimization of Power Gas Energy Hub System Considering NOx Emission.
5. Blockchain Cross-Chain Research Based on Verifiable Ring Signatures.
6. Blockchain-Based Efficient Incentive Mechanism in Crowdsensing.
7. BFAC-CS: A Blockchain-Based Fine-Grained Access Control Scheme for Complex Scenarios.
8. Development of Intelligent Integrated Energy System Based on MVC.
9. Quantum Fuzzy K-Means Algorithm Based on Fuzzy Theory.
10. A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds.
11. Revocable Attribute-Based Encryption With Data Integrity in Clouds.
12. Structured Graded Lung Rehabilitation for Children with Mechanical Ventilation.
13. Early Rehabilitation of Orthopedic Internal Fixation Removal in Daytime Ward.
14. Towards Public Integrity Audition for Cloud-IoT Data Based on Blockchain.
15. Correlation Analysis between Economic Growth and Environmental Quality.
16. Secure Keyword Search and Data Sharing Mechanism for Cloud Computing.
17. Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds.
18. An Integrated Artificial Neural Network-based Precipitation Revision Model.
19. Front-end Control Mechanism of Electronic Records.
20. A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain.
21. Clustering Collision Power Attack on RSA-CRT.
22. A Secure Fine-Grained Identity-Based Proxy Broadcast Re-encryption Scheme for Micro-video Subscribing System in Clouds.
23. Multi-function Quantum Cryptography Protocol Based on Bell State.
24. A physiological and behavioral feature authentication scheme for medical cloud based on fuzzy-rough core vector machine.
25. Comparative analysis on detection performance with ground-based microwave radiometer and radiosonde.
26. A multi-group e-commerce signature scheme based on quantum teleportation.
27. Instructor Perspectives on Comparative Heatmap Visualizations of Student Engagement with Lecture Video: Comparative Heatmap Visualizations of Student Video Engagement.
28. A new user behavior evaluation method in online social network.
29. A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system.
30. Local outlier detection based on information entropy weighting.
31. Using GAN Neural Networks for Super-Resolution Reconstruction of Temperature Fields
32. A Source Hiding Identity-Based Proxy Reencryption Scheme for Wireless Sensor Network.
33. A Secure Multimedia Data Sharing Scheme for Wireless Network.
34. Corrigendum to 'A New User Behavior Evaluation Method in Online Social Network' Journal of Information Security and Applications Volume 48 (2019) 102371.
35. Revocable Attribute-Based Encryption With Data Integrity in Clouds
36. A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
37. A Cluster Correlation power analysis against double blinding exponentiation.
38. Exploring the design space of multiple video interaction.
39. Process Optimization Method for Day Ward Based on Bayesian Decision-Tree
40. A Dynamic Reputation–based Consensus Mechanism for Blockchain
41. CNN-BiLSTM-Attention Model in Forecasting Wave Height over South-East China Seas
42. A Scalable Double-Chain Storage Module for Blockchain
43. Early Rehabilitation After Craniosynostosis Surgery
44. A Sea Ice Recognition Algorithm in Bohai Based on Random Forest
45. Energy-saving-oriented Berth Scheduling Model at Bulk Terminal
46. Chosen-Ciphertext Secure Multi-Authority Fuzzy Identity-Based Key Encapsulation without ROM.
47. Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
48. Secure Key Distribution for the Smart Grid.
49. Conveyor Belt Detection Based on Deep Convolution GANs
50. Outlier Detection of Mixed Data Based on Neighborhood Combinatorial Entropy
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.