Showing 1 - 20 results of 60 for search 'QIAO Yan', query time: 0.04s
Refine Results
-
1
-
2
Deep learning with intelligent opponent in fencing by Loh, Qiao Yan
Published 2022
Final Year Project (FYP) -
3
Selfish mining detection scheme based on the characters of transactions by Heli WANG, Qiao YAN
Published 2023-04-01
Article -
4
Cross-correlation properties between GMW and WG sequences and that of WG sequences by TONG Xin, WEN Qiao-yan
Published 2007-01-01
Article -
5
Cross-correlation properties between GMW and WG sequences and that of WG sequences by TONG Xin, WEN Qiao-yan
Published 2007-01-01
Article -
6
Beyond diversity: the impact mechanism of organizational inclusion on employee knowledge hoarding by Qingheng Cheng, Qiao Yan, Ting Nie
Published 2024-11-01
Article -
7
Building Materials Classification Model Based on Text Data Enhancement and Semantic Feature Extraction by Qiao Yan, Fei Jiao, Wei Peng
Published 2024-06-01
Article -
8
Improved certificateless sequential multi-signature scheme by Hong-zhen DU, Qiao-yan WEN
Published 2015-10-01
Article -
9
Improving the convergence property of DFE using the deterministic blind channel estimation by QIAO Yan-tao, ZHANG Li-jun
Published 2005-01-01
Article -
10
Application of ICF classification system in rehabilitation of stroke patients by Qiao-Yan LIU, Ai-Min ZHANG
Published 2021-06-01
Article -
11
Certificateless strong designated verifier multi-signature by Hong-zhen DU, Qiao-yan WEN
Published 2016-06-01
Article -
12
Improved certificateless sequential multi-signature scheme by Hong-zhen DU, Qiao-yan WEN
Published 2015-10-01
Article -
13
-
14
Certificateless strong designated verifier multi-signature by Hong-zhen DU, Qiao-yan WEN
Published 2016-06-01
Article -
15
Improving the convergence property of DFE using the deterministic blind channel estimation by QIAO Yan-tao, ZHANG Li-jun
Published 2005-01-01
Article -
16
Facilitation or hindrance? The impact of downward social comparison on adversarial growth by Ting Nie, Jing Wu, Qiao Yan
Published 2024-06-01
Article -
17
ATME : accurate traffic matrix estimation in both public and private datacenter networks by Hu, Zhiming, Qiao, Yan, Luo, Jun
Published 2019
Get full text
Journal Article -
18
Survey of braid-based cryptography by ZHU Ping1, WEN Qiao-yan2
Published 2009-01-01
Article -
19
Survey of braid-based cryptography by ZHU Ping1, WEN Qiao-yan2
Published 2009-01-01
Article -
20
Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2
Published 2009-01-01
Article