Customise results display
Results 1-6 of 6 (Search time: 0.392 seconds).
|2019-06-01||SaaS: A situational awareness and analysis system for massive android malware detection||Zhang, Y; Ren, W; Zhu, T; Ren, Y|
|2018-07-29||A watermark-based in-situ access control model for image big data||Guo, J; Ren, W; Ren, Y; Zhu, T|
|2018-07-05||Performance and Security Evaluations of Identity-and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt||Zhong, S; Ren, W; Zhu, T; Ren, Y; Choo, KKR|
|2017-07-01||Reliability of Cloud Controlled Multi-UAV Systems for On-Demand Services||Wang, J; Jiang, C; Ni, Z; Guan, S; Yu, S; Ren, Y|
|2012-05-22||Identifying microphone from noisy recordings by using representative instance one class-classification approach||Vu, HQ; Liu, S; Yang, X; Li, Z; Ren, Y|
|2019-02-01||Enhanced phosphate removal by zeolite loaded with Mg–Al–La ternary (hydr)oxides from aqueous solutions: Performance and mechanism||Shi, W; Fu, Y; Jiang, W; Ye, Y; Kang, J; Liu, D; Ren, Y; Li, D; Luo, C; Xu, Z|