Search

Your search keyword '"Niu, Xinxin"' showing total 30 results

Search Constraints

Start Over You searched for: Author "Niu, Xinxin" Remove constraint Author: "Niu, Xinxin"
30 results on '"Niu, Xinxin"'

Search Results

1. Comparative Pathogenicity of Three Strains of Infectious Bursal Disease Virus Closely Related to Poultry Industry.

2. Macrocycle-on-COF photocatalyst constructed by in-situ linker exchange for efficient photocatalytic CO2 cycloaddition.

3. Development of a loop-mediated isothermal amplification assay for the detection of chicken anemia virus.

4. A Secure and Efficient Transmission Method in Connected Vehicular Cloud Computing.

5. First findings of duck circovirus in migrating wild ducks in China.

6. Games Based Study of Nonblind Confrontation.

7. Noise Folding in Completely Perturbed Compressed Sensing.

8. A Single Mutation of VP2 is Responsible for the Lethality and Antigenicity Differences between Novel Variant and Very Virulent IBDV Strains.

9. Explicit matrix gradient expression for residual network.

10. Coupling of NiFe Layered Double Hydroxides with Sulfides for Highly Efficient Urea Electrolysis and Hydrogen Evolution.

11. Identification of Coupled Map Lattice Based on Compressed Sensing.

12. Loop PDE of viral capsid protein is involved in immune escape of the emerging novel variant infectious bursal disease virus.

13. Unlocking active metal site of Ti-MOF for boosted heterogeneous catalysis via a facile coordinative reconstruction.

14. Adv-Emotion: The Facial Expression Adversarial Attack.

15. Research Note: A novel recombinant subgroup E isolate of the avian leukosis virus with a subgroup B-like Gp85 region in China.

16. Game Theoretic Suppression of Forged Messages in Online Social Networks.

17. Image captioning with triple-attention and stack parallel LSTM.

18. An Ensemble Method based on Selection Using Bat Algorithm for Intrusion Detection.

19. Fuzzy encryption in cloud computation: efficient verifiable outsourced attribute-based encryption.

20. Fuzzy–synthetic minority oversampling technique: Oversampling based on fuzzy set theory for Android malware detection in imbalanced datasets.

21. Efficient Dynamic Replicated Data Possession Checking in Distributed Cloud Storage Systems.

22. A Secure and Effective Anonymous Integrity Checking Protocol for Data Storage in Multicloud.

23. Tailoring oxygenated groups of monolithic cobalt-nitrogen-carbon frameworks for highly efficient hydrogen peroxide production in acidic media.

24. A Quantum Watermarking Protocol Based on Bell Dual Basis.

25. Generating facial expression adversarial examples based on saliency map.

26. A Novel Identity-Based Multi-Signcryption Scheme.

27. Identification and Pathogenicity Evaluation of a Novel Reassortant Infectious Bursal Disease Virus (Genotype A2dB3).

28. Naturally occurring mutated infectious bursal disease virus of genotype A8B1 associated with bursa damage in China.

29. Smart safety early warning system of coal mine production based on WSNs.

30. Pairing-free equality test over short ciphertexts.

Catalog

Books, media, physical & digital resources