Search

Your search keyword '"Yanguo Peng"' showing total 31 results

Search Constraints

Start Over You searched for: Author "Yanguo Peng" Remove constraint Author: "Yanguo Peng"
31 results on '"Yanguo Peng"'

Search Results

1. The relationship between round window and ear canal Cochlear microphonic

2. Quaternion fractional-order color orthogonal moment-based image representation and recognition

3. SecSky: A Secure Dynamic Skyline Query Scheme With Data Privacy

4. Image analysis using modified exponent-Fourier moments

5. Towards Secure Approximate ${k}$ -Nearest Neighbor Query Over Encrypted High-Dimensional Data

11. ADFL: A Poisoning Attack Defense Framework for Horizontal Federated Learning

12. A Control-Chart-Based Detector for Small-Amount Electricity Theft (SET) Attack in Smart Grids

14. LS-RQ: A Lightweight and Forward-Secure Range Query on Geographically Encrypted Data

15. Quaternion fractional-order color orthogonal moment-based image representation and recognition

17. Image analysis by fast improved radial <scp>harmonic‐Fourier</scp> moments algorithm

18. Image analysis using modified exponent-Fourier moments

19. Secure Nearest Neighbors Query for High-Dimensional Vectors in Outsourced Environments

20. PvCT: A Publicly Verifiable Contact Tracing Algorithm in Cloud Computing

21. Novel Color Orthogonal Moments-Based Image Representation and Recognition

22. SCALE: An Efficient Framework for Secure Dynamic Skyline Query Processing in the Cloud

23. Inhibition of lncRNA LINC00461/miR-216a/aquaporin 4 pathway suppresses cell proliferation, migration, invasion, and chemoresistance in glioma

24. A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks

25. Towards Secure Approximate <tex-math notation='LaTeX'>${k}$ </tex-math>-Nearest Neighbor Query Over Encrypted High-Dimensional Data

26. A reusable and single-interactive model for secure approximate k-nearest neighbor query in cloud

27. Walsh orthogonal moments for efficiently reducing Gibbs noise in image reconstruction

29. hOPE: improved order preserving encryption with the power to homomorphic operations of ciphertexts

30. An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D Tree

Catalog

Books, media, physical & digital resources