1
|
Differential Fault Attack on Camellia
|
2009 Vol.18(1):13-19
|
|
ZHOU Yongbin;WU Wenling;XU Nannan;FENG Dengguo |
[Abstract]
(587)
[HTML 0 KB][PDF 424 KB]
(6863)
|
|
|
|
2
|
Face Liveness Detection Based on the Improved CNN with Context and Texture Information
|
2019 Vol.28(6):1092-1098
|
|
GAO Chenqiang, LI Xindou, ZHOU Fengshun, MU Song |
[Abstract]
(34)
[HTML 0 KB][PDF 3163 KB]
(5901)
|
|
|
|
3
|
An Ultra Low Steady-State Current Power-on- Reset Circuit in 65nm CMOS Technology
|
2014 Vol.23(4):678-681
|
|
SHAN Weiwei, WANG Xuexiang, LIU Xinning, SUN Huafang |
[Abstract]
(200)
[HTML 0 KB][PDF 832 KB]
(5333)
|
|
|
|
4
|
Identity Based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing
|
2012 Vol.21(2):254-259
|
|
CHENG Hongbing;RONG Chunming;TAN Zhenghua;ZENG Qingkai |
[Abstract]
(965)
[HTML 0 KB][PDF 274 KB]
(5145)
|
|
|
|
5
|
A Global K-modes Algorithm for Clustering Categorical Data
|
2012 Vol.21(3):460-465
|
|
BAI Tian;C.A. Kulikowski;GONG Leiguang;YANG Bin;HUANG Lan;ZHOU Chunguang |
[Abstract]
(394)
[HTML 0 KB][PDF 335 KB]
(4725)
|
|
|
|
6
|
Large Spaceborne Deployable Antennas (LSDAs)-A Comprehensive Summary
|
2020 Vol.29(1):1-15
|
|
DUAN Baoyan |
[Abstract]
(120)
[HTML 0 KB][PDF 4262 KB]
(4388)
|
|
|
|
7
|
An Enhanced IRC Algorithm for LTE Downlink Receiver in Multi-cell Environment
|
2014 Vol.23(2):377-381
|
|
YAN Zhiting, HE Guanghui, MA Jun |
[Abstract]
(471)
[HTML 0 KB][PDF 458 KB]
(4059)
|
|
|
|
8
|
The Wolf Colony Algorithm and Its Application
|
2011 Vol.20(2):212-216
|
|
LIU Changan;YAN Xiaohu;LIU Chunyang;WU Hua |
[Abstract]
(836)
[HTML 0 KB][PDF 281 KB]
(3733)
|
|
|
|
9
|
An Improved Current Mode Logic Latch
|
2013 Vol.22(1):214-218
|
|
ZHANG Wei, ZHANG Liang, ZHANG Xu, MA Xuepo, LIU Yanyan |
[Abstract]
(402)
[HTML 0 KB][PDF 330 KB]
(3672)
|
|
|
|
10
|
Some New Trends of Deep Learning Research
|
2019 Vol.28(6):1087-1091
|
|
MENG Deyu, SUN Lina |
[Abstract]
(65)
[HTML 0 KB][PDF 200 KB]
(3257)
|
|
|
|
11
|
A Secure Distributed Authentication Scheme Based on CRT-VSS and Trusted Computing in MANET
|
2014 Vol.23(2):284-290
|
|
WANG Xingfu, LU Qiwei, XIONG Yan, MIAO Fuyou, HUANG Wenchao, LIU Tao, WU Xuangou |
[Abstract]
(186)
[HTML 0 KB][PDF 229 KB]
(3146)
|
|
|
|
12
|
Secure DRM Scheme Based on Blockchain with High Credibility
|
2018 Vol.27(5):1025-1036
|
|
MA Zhaofeng, HUANG Weihua, GAO Hongmin |
[Abstract]
(29)
[HTML 0 KB][PDF 815 KB]
(3063)
|
|
|
|
13
|
Ciphertext-Policy Attribute-Based Encryption with Short Keys
|
2014 Vol.23(4):655-660
|
|
XU Peng, TANG Yong, JIANG Wenbin, JIN Hai, ZOU Deqing |
[Abstract]
(244)
[HTML 0 KB][PDF 433 KB]
(2845)
|
|
|
|
14
|
A Homomorphic Aggregate Signature Scheme Based on Lattice
|
2012 Vol.21(4):701-704
|
|
ZHANG Peng, YU Jianping, WANG Ting |
[Abstract]
(305)
[HTML 0 KB][PDF 216 KB]
(2796)
|
|
|
|
15
|
Characteristics of Electric Charges Carried by Dust Particles and Their Effects on Connector Contact Failure
|
2012 Vol.21(3):559-565
|
|
GAO Jinchun;XIE Gang |
[Abstract]
(256)
[HTML 0 KB][PDF 1449 KB]
(2755)
|
|
|
|
16
|
A Novel Image Enhancement Method for SIFT Feature Extraction of Low Resolution Palmprint Images
|
2011 Vol.20(1):111-113
|
|
LIU Di;SUN Dongmei;QIU Zhengding |
[Abstract]
(594)
[HTML 0 KB][PDF 352 KB]
(2703)
|
|
|
|
17
|
nID-based Internet of Things and Its Application in Airport Aviation Risk Management
|
2012 Vol.21(2):209-214
|
|
NING Huansheng;HU Sha;HE Wei;XU Qunyu;LIU Hong;CHEN Weishi |
[Abstract]
(429)
[HTML 0 KB][PDF 551 KB]
(2649)
|
|
|
|
18
|
A Survey on Emerging Computing Paradigms for Big Data
|
2017 Vol.26(1):1-12
|
|
ZHANG Yaoxue, REN Ju, LIU Jiagang, XU Chugui, GUO Hui, LIU Yaping |
[Abstract]
(257)
[HTML 0 KB][PDF 1424 KB]
(2640)
|
|
|
|
19
|
A GPS Receiver Adaptive Digital Beamforming Interference Suppression Algorithm Based on Kalman Filter
|
2013 Vol.22(2):433-436
|
|
DING Wenrui, ZHU Yunlong, ZHANG Bo, YANG Dongkai |
[Abstract]
(403)
[HTML 0 KB][PDF 224 KB]
(2612)
|
|
|
|
20
|
A Novel Approach to Detect the Unresolved Towed Decoy in Terminal Guidance
|
2012 Vol.21(2):367-373
|
|
SONG Zhiyong;XIAO Huaitie;ZHU Yilong;LU Zaiqi |
[Abstract]
(331)
[HTML 0 KB][PDF 485 KB]
(2576)
|
|
|
|
21
|
Weighted Multi-source TrAdaBoost
|
2013 Vol.22(3):505-510
|
|
CHENG Yuhu, CAO Ge, WANG Xuesong, PAN Jie |
[Abstract]
(588)
[HTML 0 KB][PDF 397 KB]
(2563)
|
|
|
|
22
|
A Novel Image Digital Rights Management Scheme with High-Level Security, Usage Control and Traceability
|
2016 Vol.25(3):481-494
|
|
MA Zhaofeng, HUANG Jianqing, JIANG Ming, NIU Xinxin |
[Abstract]
(75)
[HTML 0 KB][PDF 2166 KB]
(2535)
|
|
|
|
23
|
Microblog Burst Keywords Detection Based on Social Trust and Dynamics Model
|
2014 Vol.23(4):695-700
|
|
DONG Guozhong, LI Ruiguang, YANG Wu, WANG Wei, GONG Liangyi, SHEN Guowei, YU Miao, LV Jiguang |
[Abstract]
(184)
[HTML 0 KB][PDF 966 KB]
(2513)
|
|
|
|
24
|
Clustering by Fast Search and Find of Density Peaks with Data Field
|
2016 Vol.25(3):397-402
|
|
WANG Shuliang, WANG Dakui, LI Caoyuan, LI Yan, DING Gangyi |
[Abstract]
(298)
[HTML 0 KB][PDF 6951 KB]
(2510)
|
|
|
|
25
|
Nonuniform Extrema Resampling and Empirical Mode Decomposition
|
2009 Vol.18(4):759-762
|
|
YANG Yanli;DENG Jiahao;TANG Wuchu;Wu Caipeng;KANG Dali |
[Abstract]
(479)
[HTML 0 KB][PDF 1092 KB]
(2487)
|
|
|
|
26
|
A Description Model of Multi-Step Attack Planning Domain Based on Knowledge Representation
|
2013 Vol.22(3):437-441
|
|
HU Liang, XIE Nannan, CHAI Sheng, Nurbol |
[Abstract]
(240)
[HTML 0 KB][PDF 342 KB]
(2473)
|
|
|
|
27
|
PCNN Model Analysis and Its Automatic Parameters Determination in Image Segmentation and Edge Detection
|
2014 Vol.23(1):97-103
|
|
DENG Xiangyu, MA Yide |
[Abstract]
(249)
[HTML 0 KB][PDF 526 KB]
(2457)
|
|
|
|
28
|
Small-signal Modeling and Analysis of the Weinberg Converter for High-Power Satellites Bus Application
|
2009 Vol.18(1):171-176
|
|
LEI Weijun;LI Yanjun |
[Abstract]
(471)
[HTML 0 KB][PDF 1102 KB]
(2407)
|
|
|
|
29
|
A Novel GGNMOS Macro-Model for ESD Circuit Simulation
|
2009 Vol.18(4):630-634
|
|
JIAO Chao;YU Zhiping |
[Abstract]
(468)
[HTML 0 KB][PDF 464 KB]
(2387)
|
|
|
|
30
|
Sparse Representations for Speech Enhancement
|
2011 Vol.20(2):268-272
|
|
ZHAO Nan;XU Xin;YANG Yi |
[Abstract]
(732)
[HTML 0 KB][PDF 883 KB]
(2373)
|
|
|
|