Showing results 1 to 20 of 34
next >
Issue Date | Title | Author(s) |
2024-01-01 | A 2-Bit Electronically Planar Reconfigurable Array Antenna with 2-D Beam-Scanning Capacity Using Hybrid Phase Control Method | Wang, M; Hu, N; Li, X; Mo, Y; Xie, W; Chen, Z; Chen, S; Tian, Z |
2022-12-23 | A Comprehensive Survey on Poisoning Attacks and Countermeasures in Machine Learning | Tian, Z; Cui, L; Liang, J; Yu, S |
2022-01-01 | A Novel Android Malware Detection Method Based on Visible User Interface | Tan, S; Tian, Z; Zhong, X; Yu, S; Zhang, W; Dong, G; Zhao, L; Kumar, N; Hsu, RC; Zou, D |
2021-11-07 | Aligning conductive particles using magnetic field for enhanced piezoresistivity of cementitious composites | Tian, Z; Li, Y; Li, S |
- | An Asynchronous Multi-Task Semantic Communication Method | Tian, Z; Vo, H; Zhang, C; Min, G; Yu, S |
2023-10-06 | An Asynchronous Multi-Task Semantic Communication Method | Tian, Z; Vo, H; Zhang, C; Min, G; Yu, S |
2023-07-10 | BFU: Bayesian Federated Unlearning with Parameter Self-Sharing | Wang, W; Tian, Z; Zhang, C; Liu, A; Yu, S |
2005-09-01 | Chinese negotiation practice: A perspective from New Zealand exporters | Stark, A; Fam, K; Waller, DS; Tian, Z |
2023-10-23 | Construct New Graphs Using Information Bottleneck Against Property Inference Attacks | Zhang, C; Tian, Z; Yu, JJQ; Yu, S |
2022-09-30 | Deep feature pyramid network for EEG emotion recognition | Hou, F; Gao, Q; Song, Y; Wang, Z; Bai, Z; Yang, Y; Tian, Z |
2019-01-01 | DPIF: A framework for distinguishing unintentional quality problems from potential shilling attacks | Li, M; Sun, Y; Su, S; Tian, Z; Wang, Y; Wang, X |
2023 | Dual-channel NCSs performance error estimation under DoS attacks and intelligent control supervised by machine learning to AGV application | Cai, X; Shi, K; Sun, Y; Cao, J; Wen, S; Chen, P; Tian, Z |
2021-11-17 | Enhanced sensing performance of cement-based composites achieved via magnetically aligned nickel particle network | Tian, Z; Li, S; Li, Y |
2023-11-10 | Generative Adversarial Networks: A Survey on Attack and Defense Perspective | Zhang, C; Yu, S; Tian, Z; Yu, JJQ |
2022-01-01 | GSMI: A Gradient Sign Optimization Based Model Inversion Method | Tian, Z; Zhang, C; Cui, L; Yu, S; Long, G; Yu, X; Wang, S |
2023-10 | Hexyl-pentynoic acid serves as a novel radiosensitizer for breast cancer by inhibiting UCHL3-dependent Rad51 deubiquitination | Cai, Z; Lim, D; Jia, B; Liu, G; Ding, W; Wang, Z; Tian, Z; Peng, J; Zhang, F; Dong, C; Feng, Z |
2017-11-01 | Improving anoxic/aerobic nutrients removal by the enhanced biological phosphorus removal-sulfur autotrophic denitrification (EBPR-SAD) system when treating low C/N ratio municipal wastewater | Li, H; Zhou, B; Tian, Z; Guo, J; Ngo, HH; Lu, C; Han, Y; Song, Y |
2022-09-07 | In situ implanting MnO nanoparticles into carbon nanorod-assembled microspheres enables performance-enhanced room-temperature Na-S batteries | Huang, XL; Xiang, P; Liu, H; Feng, C; Zhang, S; Tian, Z; Liu, HK; Dou, SX; Wang, Z |
2023-10-06 | Inferring Private Data from AI Models in Metaverse through Black-box Model Inversion Attacks | Tian, Z; Zhang, C; Sood, K; Yu, S |
2022-01-01 | Influence of particle morphology and concentration on the piezoresistivity of cement-based sensors with magneto-aligned nickel fillers | Tian, Z; Li, Y; Li, S; Vute, S; Ji, J |