×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [6]
兰州理工大学 [5]
清华大学 [1]
北京大学 [1]
兰州大学 [1]
华南理工大学 [1]
更多...
内容类型
期刊论文 [10]
会议论文 [5]
其他 [1]
发表日期
2019 [1]
2018 [1]
2016 [1]
2015 [4]
2014 [1]
2012 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共16条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Cross-modality interactive attention network for multispectral pedestrian detection
期刊论文
Information Fusion, 2019, 卷号: 50, 页码: 20-29
作者:
Zhang, Lu
;
Liu, Zhiyong
;
Zhang, Shifeng
;
Yang, Xu
;
Qiao, Hong
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2019/11/19
Automotive driving
Cross modality
Feature hierarchies
Interactive properties
Modality Fusion
Pedestrian detection
Security surveillance
State-of-the-art performance
LBS privacy protection technology based on searchable encryption mechanism
会议论文
Beijing, China, May 25, 2018 - May 27, 2018
作者:
Feng, Tao
;
Wang, Xudong
;
Li, Xinghua
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Cryptography
Global positioning system
Information services
Location
Manufacture
Search engines
Telecommunication services
Wireless sensor networks
Location privacy protection
Mobile communication networks
Mobile intelligent terminals
Positioning technologies
Privacy protection model
Search information
Searchable encryptions
Security properties
Model checking quantum key distribution protocols
会议论文
作者:
Huang, Baichuan
;
Huang, Yan
;
Kong, Jiaming
;
Huang, Xin
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/11/26
BB84
Discrete time Markov chains
Group QKD
Probabilistic computation tree logic
Quantum information theory
Quantum key distribution protocols
Security properties
Verification techniques
Yaksha scheme based content publish/subscribe system for NDN
期刊论文
Tongxin Xuebao/Journal on Communications, 2015, 卷号: 36, 期号: 11
作者:
Guo, Xian
;
Feng, Tao
;
Cao, Lai-Cheng
;
Wang, Jing
;
Lu, Ye
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Message passing
Comparison analysis
Content delivery network
ElGamal
MANET
Named data networkings
Publish/Subscribe system
Security properties
Yaksha system
A functionalized, injectable hydrogel for localized drug delivery with tunable thermosensitivity: Synthesis and characterization of physical and toxicological properties
期刊论文
Journal of Controlled Release, 2015, 卷号: 208, 页码: 76-84
作者:
Elias, Paul Z.
;
Liu, Gary W.
;
Wei, Hua
;
Jensen, Michael C.
;
Horner, Philip J.
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2017/01/11
Hydrogels
Cell culture
Cells
Conjugated polymers
Cytology
Drug delivery
Drug therapy
Ethylene
Ethylene glycol
Functional polymers
Gelation
Mobile security
Peptides
Polyacrylates
Polymers
Polyols
T-cells
Cell therapy
Immunotherapy
Injectable hydrogels
Oligo(ethylene glycol) methacrylate
Physiological temperature
Spinal cord injuries (SCI)
Synthesis and characterizations
Toxicological properties
Optimization Design of a Low Power Asynchronous DES for Security Applications Based on Balsa and Synchronous Tools
其他
2015-01-01
Zhang, Qihui
;
Cao, Jian
;
Cao, Xixin
;
Zhang, Xing
;
Ye, Yin
;
Zhao, Yanguang
;
Chen, Botao
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
asynchronous DES
low power
Balsa properties
optimization schemes
ASIC
FPGA
dual-rail
security applications
Content-dependent biomineralization activity and mechanical properties based on polydimethylsiloxane-bioactive glass-poly(caprolactone) hybrids monoliths for bone tissue regeneration (EI收录)
期刊论文
RSC Advances, 2015, 卷号: 5, 页码: 61309-61317
作者:
Chen, Jing[1]
;
Du, Yuzhang[1]
;
Que, Wenxiu[1]
;
Xing, Yonglei[1]
;
Lei, Bo[1,2,3]
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/04/25
Apatite
Bioactive glass
Biocompatibility
Biomechanics
Biomimetics
Biomineralization
Bone
Cracks
Hydrophilicity
Mechanical properties
Microchannels
Mobile security
Monolithic integrated circuits
Phosphate minerals
Sol
gel process
Sol
gels
Tissue regeneration
Centrality metrics of importance in access behaviors and malware detections
会议论文
作者:
Mao, Weixuan
;
Cai, Zhongmin
;
Guan, Xiaohong
;
Towsley, Don
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/02
Access Behaviors
Centrality
Dependency networks
Importance Metrics
Malware detection
Security properties
Security protection
Selective protection
Provably secure certificate less blind proxy re-signatures
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: SUPPL.1, 页码: 58-69+78
作者:
Feng, Tao
;
Y.-X., Liang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/11/14
Network security
Bilinear map
Blind signature scheme
Blind signatures
Certificate-based
Certificateless cryptographies
Proxy re-signatures
Security properties
Signature Scheme
Coding-aware secure routing for multi-hop wireless networks
期刊论文
Tongxin Xuebao/Journal on Communications, 2012, 卷号: 33, 期号: 6, 页码: 133-142
作者:
Guo, Xian
;
Feng, Tao
;
Yuan, Zhan-Ting
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/11/14
Codes (symbols)
Formal methods
Location
Network coding
Network routing
Wireless networks
DCAR
Distributed coding
Dynamic topologies
Multihop wireless network
Secure routing
Security issues
Security properties
Wireless broadcast
©版权所有 ©2017 CSpace - Powered by
CSpace