Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 23 matches
- 2024
- Lei Yang, Yuanye Zhang, Jiale Cao, Kangshun Li, Dongya Wang:
A many-objective evolutionary algorithm based on reference vector guided selection and two diversity and convergence enhancement strategies. Appl. Soft Comput. 154: 111369 (2024) - Jialei Su, Kang Li, Chen Xing:
Plug-and-Play of Grid-Forming Units in DC Microgrids Assisted With Power Buffers. IEEE Trans. Smart Grid 15(2): 1213-1226 (2024) - Jiani Fan, Minrui Xu, Jiale Guo, Lwin Khin Shar, Jiawen Kang, Dusit Niyato, Kwok-Yan Lam:
Decentralized Multimedia Data Sharing in IoV: A Learning-Based Equilibrium of Supply and Demand. IEEE Trans. Veh. Technol. 73(3): 4035-4050 (2024) - Jiani Fan, Minrui Xu, Jiale Guo, Lwin Khin Shar, Jiawen Kang, Dusit Niyato, Kwok-Yan Lam:
Decentralized Multimedia Data Sharing in IoV: A Learning-based Equilibrium of Supply and Demand. CoRR abs/2403.20218 (2024) - 2023
- Jiale Cheng, Nan Liu, Wei Kang:
On the Asymptotic Capacity of Information-Theoretic Privacy-Preserving Epidemiological Data Collection. Entropy 25(4): 625 (2023) - Jia-Le Kang, Ming-Hui Zhang, Xiao-Peng Liu, Jia-Hui Xie:
Machine learning with neural networks for parameter optimization in twin-field quantum key distribution. Quantum Inf. Process. 22(8): 309 (2023) - Chuanli Kang, Zitao Lin, Siyi Wu, Jiale Yang, Siyao Zhang, Sai Zhang, Xuanhao Li:
Method to Solve Underwater Laser Weak Waves and Superimposed Waves. Sensors 23(13): 6058 (2023) - Wenbin Dai, Yingyue Zhang, Yunpeng Zhang, Jiale Kang, Dan Huang:
Automatic Information Model Generation for Industrial Edge Applications Based on IEC 61499 and OPC UA. IEEE Trans. Ind. Informatics 19(4): 6093-6104 (2023) - Ping Feng, Jiahong Ning, Tingting Yang, Jiabao Kang, Jiale Wang, Yicheng Li:
Federated Optimal Framework with Low-bitwidth Quantization for Distribution System. GLOBECOM 2023: 2039-2044 - Jiale Kang, Xiaojing Wen, Wenbin Dai:
A Hot Redundancy Method For Virtualized Industrial Edge Applications. IECON 2023: 1-6 - Baosheng Zhang, Panlu You, Jiale Gai, Jialong Kang, Dapeng Cheng:
Multimodal Approaches for Autism Spectrum Disorder Prediction. ISAIMS 2023: 769-774 - Jiale Kang, Xiao Wu, Huiwen Wu, Dali Yang, Wenbin Dai:
Automatic Microservice Orchestration and Deployment Method Based On the Modular Type Package for Industrial Edge Applications. ISIE 2023: 1-6 - 2022
- Bingqian Chen, Hao Yu, Xiang Zhang, Zhenhong Li, Jianrong Kang, Yang Yu, Jiale Yang, Lu Qin:
Time-Varying Surface Deformation Retrieval and Prediction in Closed Mines through Integration of SBAS InSAR Measurements and LSTM Algorithm. Remote. Sens. 14(3): 788 (2022) - Jiale Cheng, Nan Liu, Wei Kang, Yang Li:
The Capacity of Symmetric Private Information Retrieval Under Arbitrary Collusion and Eavesdropping Patterns. IEEE Trans. Inf. Forensics Secur. 17: 3037-3050 (2022) - Yongxin Zhou, Jiale Chen, Xiong Zhang, Wenxiong Kang, Zeng Ming:
Semantic Center Guided Windows Attention Fusion Framework for Food Recognition. PRCV (2) 2022: 626-638 - Jiale Cheng, Nan Liu, Wei Kang:
On the Asymptotic Capacity of Information Theoretical Privacy-preserving Epidemiological Data Collection. CoRR abs/2212.05914 (2022) - 2021
- Jiale Zhao, Yong Ma, Jiangtao Cui, Yanguo Peng, Kangshun Li, Tengyu Wang:
SecSky: A Secure Dynamic Skyline Query Scheme With Data Privacy. IEEE Access 9: 5690-5703 (2021) - Yong Ma, Jiale Zhao, Kangshun Li, Yuanlong Cao, Huyuan Chen, Youcheng Zhang:
Research Review on the Application of Homomorphic Encryption in Database Privacy Protection. Int. J. Cogn. Informatics Nat. Intell. 15(4): 1-22 (2021) - Guang-Hui Liu, Yiming Bao, Jing Qu, Weiqi Zhang, Tao Zhang, Wang Kang, Fei Yang, Qianzhao Ji, Xiaoyu Jiang, Yingke Ma, Shuai Ma, Zunpeng Liu, Siyu Chen, Si Wang, Shuhui Sun, Lingling Geng, Kaowen Yan, Pengze Yan, Yanling Fan, Moshi Song, Jie Ren, Qiaoran Wang, Shanshan Yang, Yuanhan Yang, Muzhao Xiong, Chuqiang Liang, Lan-Zhu Li, Tianling Cao, Jianli Hu, Ping Yang, Jiale Ping, Huifang Hu, Yandong Zheng, Guoqiang Sun, Jiaming Li, Lixiao Liu, Zhiran Zou, Yingjie Ding, Mingheng Li, Di Liu, Min Wang, Xiaoyan Sun, Cui Wang, Shijia Bi, Hezhen Shan, Xiao Zhuo:
Aging Atlas: a multi-omics database for aging biology. Nucleic Acids Res. 49(Database-Issue): D825-D830 (2021) - Yingyue Zhang, Jiale Kang, Wenbin Dai:
Non-Functional Requirements Elicitation Based on Domain Knowledge Graph for Automatic Code Generation of Industrial Cyber-Physical Systems. IECON 2021: 1-6 - Andrey Ignatov, Grigory Malivenko, David Plowman, Samarth Shukla, Radu Timofte, Ziyu Zhang, Yicheng Wang, Zilong Huang, Guozhong Luo, Gang Yu, Bin Fu, Yiran Wang, Xingyi Li, Min Shi, Ke Xian, Zhiguo Cao, Jin-Hua Du, Pei-Lin Wu, Chao Ge, Jiaoyang Yao, Fangwen Tu, Bo Li, Jung Eun Yoo, Kwanggyoon Seo, Jialei Xu, Zhenyu Li, Xianming Liu, Junjun Jiang, Wei-Chi Chen, Shayan Joya, Huanhuan Fan, Zhaobing Kang, Ang Li, Tianpeng Feng, Yang Liu, Chuannan Sheng, Jian Yin, Fausto T. Benavide:
Fast and Accurate Single-Image Depth Estimation on Mobile Devices, Mobile AI 2021 Challenge: Report. CoRR abs/2105.08630 (2021) - 2020
- Wenjie Kang, Jiale Deng, Peidong Zhu, Xuchong Liu, Wei Zhao, Zhi Hang:
Multi-dimensional Security Risk Assessment Model Based on Three Elements in the IoT System. ICCC 2020: 518-523 - Jiale Cheng, Nan Liu, Wei Kang:
The Capacity of Symmetric Private Information Retrieval under Arbitrary Collusion and Eavesdropping Patterns. CoRR abs/2010.08249 (2020)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-03 16:57 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint