Search

Your search keyword '"Tan, Zhiyuan"' showing total 449 results

Search Constraints

Start Over You searched for: Author "Tan, Zhiyuan" Remove constraint Author: "Tan, Zhiyuan"
449 results on '"Tan, Zhiyuan"'

Search Results

1. HETOCompiler: An MLIR-based crypTOgraphic Compilation Framework for HEterogeneous Devices

3. Pre-configured Error Pattern Ordered Statistics Decoding for CRC-Polar Codes

6. Robust Multimodal Failure Detection for Microservice Systems

7. Can Federated Models Be Rectified Through Learning Negative Gradients?

8. Codes Correcting Burst and Arbitrary Erasures for Reliable and Low-Latency Communication

10. A Probability Mapping-Based Privacy Preservation Method for Social Networks

11. An Omnidirectional Approach to Touch-based Continuous Authentication

12. Reliability and Latency Analysis of Sliding Network Coding With Re-Transmission

14. Conceptual Text Region Network: Cognition-Inspired Accurate Scene Text Detection

15. A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs

19. Discovering Encrypted Bot and Ransomware Payloads Through Memory Inspection Without A Priori Knowledge

20. Deriving ChaCha20 Key Streams From Targeted Memory Analysis

21. Decrypting live SSH traffic in virtual environments

23. The Effects of Heavy Metal Pollution on Soil Nitrogen Transformation and Rice Volatile Organic Compounds under Different Water Management Practices

25. The Effects of Heavy Metals Pollution on Nitrogen Transformation and Volatile Organic Compounds in Paddy Soil under Different Water Management Practices

26. Diversity of Unusual Ribosomal Genes and Ecological Origin of Rice (Oryza spp.)

31. Heterogeneous Services Provisioning in Small Cell Networks with Cache and Mobile Edge Computing

34. Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites

35. Diversity of Unusual Ribosomal Genes and Ecological Origin of Rice

43. Tuning the band gap of the CIGS solar buffer layer Cd1−xZnxS (x=0–1) to achieve high efficiency.

44. Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme

45. A Multi-attributes-Based Trust Model of Internet of Vehicle

Catalog

Books, media, physical & digital resources