CORC

浏览/检索结果: 共8条,第1-8条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones 其他
2017-01-01
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:3/0  |  提交时间:2019/12/05
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones 其他
2017-01-01
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
You Can Hear But You Cannot Steal: Defending against Voice Impersonation Attacks on Smartphones 其他
2017-01-01
作者:  Chen, Si;  Ren, Kui;  Piao, Sixu;  Wang, Cong;  Wang, Qian
收藏  |  浏览/下载:4/0  |  提交时间:2019/12/05
The exon junction complex regulates the splicing of cell polarity gene dig1 to control Wingless signaling in development 其他
2016-01-01
Liu, Min; Li, Yajuan; Liu, Aiguo; Li, Ruifeng; Su, Ying; Du, Juan; Li, Cheng; Zhu, Alan Jian
收藏  |  浏览/下载:3/0  |  提交时间:2017/12/04
Modeling pre-earthquake cloud shape from remote-sensing images 其他
2014-01-01
Tan, Xiang; Ma, Yu-Zhong; Jiao, Jian-Nan; Su, Lin-Lin; Ma, Ai-Nai; Hou, Jian-Jun; Yan, Lei
收藏  |  浏览/下载:8/0  |  提交时间:2015/11/17
Access control algorithm with limited power constraint for mobile satellite communications 其他
2014-01-01
Gao, Ya Zhe; Xia, Xiao Han; Su, Zi Ming; Luan, Xi; Wu, Jian Jun
收藏  |  浏览/下载:4/0  |  提交时间:2015/11/13
Exploring strategies for developing link analysis based question-oriented multi-document summarization models 其他
2011-01-01
Li, Su-Jian; Wang, Wei; Li, Wen-Jie
收藏  |  浏览/下载:9/0  |  提交时间:2015/11/17
SUPPORT VECTOR BASED METHOD FOR ACQUIRING DOMAIN SPECIFIC PATENTS 其他
2009-01-01
Wang, Chen; Li, Su-Jian
收藏  |  浏览/下载:3/0  |  提交时间:2015/11/12


©版权所有 ©2017 CSpace - Powered by CSpace