Search

Your search keyword '"Ruize Wang"' showing total 71 results

Search Constraints

Start Over You searched for: Author "Ruize Wang" Remove constraint Author: "Ruize Wang"
71 results on '"Ruize Wang"'

Search Results

1. Two-dimensional Bi2O2Se nanosheets for sensitive and fast-response high-temperature photodetectors

2. Neutralizing antibody levels associated with injectable and aerosolized Ad5-nCoV boosters and BA.2 infection

3. Research on Alternating Current Field Measurement Method for Buried Defects of Titanium Alloy Aircraft Skin

4. Safety analysis of a live attenuated mumps vaccine in healthy adolescents in China: A phase 4, observational, open-label trial.

5. Immunogenicity and safety of an inactivated enterovirus 71 vaccine co-administered with measles-mumps-rubella vaccine and live-attenuated Japanese encephalitis vaccine: a phase 4, single-center, randomized controlled trial

6. Seroepidemiology of pertussis and diphtheria among healthy adults in Shaanxi Province, northwest China: A large - scale cross-sectional study

7. Associated factors in distinguishing patients with brucellosis from suspected cases

8. Immunogenicity and Safety of an Inactivated Enterovirus 71 Vaccine Administered Simultaneously with Hepatitis B Virus Vaccine, Group A Meningococcal Polysaccharide Vaccine, Measles-Rubella Combined Vaccine and Japanese Encephalitis Vaccine: A Multi-Center, Randomized, Controlled Clinical Trial in China

33. LIPAuth : Hand-dependent Light Intensity Patterns for Resilient User Authentication

35. A Message Recovery Attack on LWE/LWR-Based PKE/KEMs Using Amplitude-Modulated EM Emanations

36. Observation of intrinsic chiral bound states in the continuum

37. Engineering a Cu/ZnOx Interface for High Methane Selectivity in CO2 Electrochemical Reduction

38. Storytelling from an Image Stream Using Scene Graphs

39. Exploring Logical Reasoning for Referring Expression Comprehension

40. Analysis and Evaluation of the Effects of Single Event Upsets (SEU s) on Memories in Polar Decoders

41. Research on Data Encryption Technology in Computer Network Communication Security Based on Genetic Algorithms

42. K-AID: Enhancing Pre-trained Language Models with Domain Knowledge for Question Answering

45. TCIC: Theme Concepts Learning Cross Language and Vision for Image Captioning

46. K-Adapter: Infusing Knowledge into Pre-Trained Models with Adapters

48. Far Field EM Side-Channel Attack on AES Using Deep Learning

49. Look, Listen, and Attend: Co-Attention Network for Self-Supervised Audio-Visual Representation Learning

50. Neural Deepfake Detection with Factual Structure of Text

Catalog

Books, media, physical & digital resources