266 results on '"Sun, Degang"'
Search Results
2. PromptSAM+: Malware Detection based on Prompt Segment Anything Model
3. Mitigating the Impact of Malware Evolution on API Sequence-based Windows Malware Detector
4. ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis
5. Kairos: Practical Intrusion Detection and Investigation using Whole-system Provenance
6. On eliminating blocking interference of RFID unauthorized reader detection system
7. DualAttlog: Context aware dual attention networks for log-based anomaly detection
8. DSGN: Log-based anomaly diagnosis with dynamic semantic gate networks
9. Hierarchical Graph Convolutional Skeleton Transformer for Action Recognition
10. Rethinking the Misalignment Problem in Dense Object Detection
11. Objects as Extreme Points
12. ASGNet: Adaptive Semantic Gate Networks for Log-Based Anomaly Diagnosis
13. Rethinking the Misalignment Problem in Dense Object Detection
14. ITAR: A Method for Indoor RFID Trajectory Automatic Recovery
15. R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering
16. On Eliminating Blocking Interference of RFID Unauthorized Reader Detection
17. Building an “Outer Space Silk Road”
18. Rethinking the Misalignment Problem in Dense Object Detection
19. The Images of China and Britain in the Syrian Media : A Comparison
20. Dual attention mechanism network for lung cancer images super-resolution
21. DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
22. BertHANK: hierarchical attention networks with enhanced knowledge and pre-trained model for answer selection
23. China's ‘Zero-Enemy Policy' in the Gulf
24. A novel deep framework for dynamic malware detection based on API sequence intrinsic features
25. Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models
26. Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition
27. URTracker: Unauthorized Reader Detection and Localization Using COTS RFID
28. On Eliminating Blocking Interference of RFID Unauthorized Reader Detection
29. R-TDBF: An Environmental Adaptive Method for RFID Redundant Data Filtering
30. The effect of different activation irrigations on intracanal smear layer removal: a vitro study.
31. Long noncoding RNA TUG1 promotes osteogenic differentiation of human periodontal ligament stem cell through sponging microRNA-222-3p to negatively regulate Smad2/7
32. China's partnership diplomacy in the Middle East
33. Berberine reduces inflammation of human dental pulp fibroblast via miR-21/KBTBD7 axis
34. China and Türkiye's Strategic Cooperation in the 21st Century: A 'Complex Role' Prism.
35. Association between MAPK and PI3K/Akt signaling pathway‐related gene polymorphisms and migraine.
36. Sprelog: Log-Based Anomaly Detection with Self-matching Networks and Pre-trained Models
37. Graph Attention Convolutional Network with Motion Tempo Enhancement for Skeleton-Based Action Recognition
38. URTracker: Unauthorized Reader Detection and Localization Using COTS RFID
39. Objects as Extreme Points
40. China’s Military Diplomacy towards Arab Countries in Africa’s Peace and Security : The Case of Djibouti
41. AFRICOM’s military base in Djibouti
42. A Novel Use of Kernel Discriminant Analysis as a Higher-Order Side-Channel Distinguisher
43. Categorising and Comparing Cluster-Based DPA Distinguishers
44. A Behavior-Based Method for Distinction of Flooding DDoS and Flash Crowds
45. Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest
46. China and the Middle East security governance in the new era
47. DTrap:A cyberattack-defense confrontation technique based on Moving Target Defense
48. LWVN:A Lightweight Virtual Network View Method to Defend Lateral Movement
49. China’s Hedging Strategy in the Gulf: A Case of ‘Even-handedness’ Diplomacy
50. Conflict Resolution Initiatives in the Gulf Region: A Perspective and Assessment
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.