Search

Your search keyword '"Zhou, Jianying"' showing total 3,449 results

Search Constraints

Start Over You searched for: Author "Zhou, Jianying" Remove constraint Author: "Zhou, Jianying"
3,449 results on '"Zhou, Jianying"'

Search Results

2. Excavating Vulnerabilities Lurking in Multi-Factor Authentication Protocols: A Systematic Security Analysis

3. Inhomogeneous illuminated image enhancement under extremely low visibility condition

4. Harnessing Optical Imaging Limit through Atmospheric Scattering Media

5. 'SSL?! What on earth is that?': Towards Designing Age-Inclusive Secure Smartphone Browsing

6. PAGE: Equilibrate Personalization and Generalization in Federated Learning

8. Towards Atomicity and Composability in Cross-Chain NFTs

9. Guidelines for Cyber Risk Management in Autonomous Shipping

10. Towards Discovering Quantum-Threats for Applications Using Open-Source Libraries

11. Device Fingerprinting in a Smart Grid CPS

13. Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

14. TAP: Transparent and Privacy-Preserving Data Services

15. Designing a Provenance Analysis for SGX Enclaves

16. Protecting the Integrity of IoT Sensor Data and Firmware With A Feather-Light Blockchain Infrastructure

17. FieldFuzz: In Situ Blackbox Fuzzing of Proprietary Industrial Automation Runtimes via the Network

18. A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles

19. Guidelines for cyber risk management in shipboard operational technology systems

22. Results of the phase IIa study to evaluate the efficacy and safety of rezivertinib (BPI-7711) for the first-line treatment of locally advanced or metastatic/recurrent NSCLC patients with EGFR mutation from a phase I/IIa study

23. Central nervous system efficacy of furmonertinib (AST2818) in patients with EGFR T790M mutated non-small cell lung cancer: a pooled analysis from two phase 2 studies

24. Packaging-enhanced optical fiber-chip interconnect with enlarged grating coupler and multimode fiber

25. ZKBdf: A ZKBoo-Based Quantum-Secure Verifiable Delay Function with Prover-Secret

26. EARIC: Exploiting ADC Registers in IoT and Control Systems

27. Safety Watermark: A Defense Tool for Real-Time Digital Forensic Incident Response in Industrial Control Systems

28. Sunvozertinib, a selective EGFR inhibitor for previously treated non-small cell lung cancer with EGFR exon 20 insertion mutationsSunvozertinib for NSCLC with EGFR Exon20ins

29. Garsorasib in patients with KRASG12C-mutated non-small-cell lung cancer in China: an open-label, multicentre, single-arm, phase 2 trial

31. Interim survival analysis of the randomized phase III GEMSTONE-302 trial: sugemalimab or placebo plus chemotherapy as first-line treatment for metastatic NSCLC

32. Threat Modeling and Security Analysis of Containers: A Survey

33. Reinshard: An optimally sharded dual-blockchain for concurrency resolution

34. Post-Quantum VRF and its Applications in Future-Proof Blockchain System

36. Befotertinib for patients with pretreated EGFR T790M mutated locally advanced or metastatic NSCLC: Final overall survival results from a phase 2 trial

38. Toward Safe Integration of Legacy SCADA Systems in the Smart Grid

40. First-line penpulimab combined with paclitaxel and carboplatin for metastatic squamous non-small-cell lung cancer in China (AK105-302): a multicentre, randomised, double-blind, placebo-controlled phase 3 clinical trial

43. Sunvozertinib for patients in China with platinum-pretreated locally advanced or metastatic non-small-cell lung cancer and EGFR exon 20 insertion mutation (WU-KONG6): single-arm, open-label, multicentre, phase 2 trial

44. Accountable Fine-grained Blockchain Rewriting in the Permissionless Setting

45. Transparent Electricity Pricing with Privacy

46. Graph-based Pyramid Global Context Reasoning with a Saliency-aware Projection for COVID-19 Lung Infections Segmentation

47. VNGuard: Intrusion Detection System for In-Vehicle Networks

48. Unsupervised Attack Isolation in Cyber-physical Systems: A Competitive Test of Clustering Algorithms

49. Predicate Private Set Intersection with Linear Complexity

50. Migrating Blockchains Away from ECDSA for Post-quantum Security: A Study of Impact on Users and Applications

Catalog

Books, media, physical & digital resources