×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
浙江工商大学 [26]
华南理工大学 [12]
兰州理工大学 [6]
江苏大学 [6]
过程工程研究所 [6]
西安交通大学 [5]
更多...
内容类型
期刊论文 [98]
会议论文 [14]
发表日期
2022 [3]
2021 [2]
2020 [5]
2019 [9]
2018 [20]
2017 [5]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共112条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Expert consensus on the diagnosis and treatment of NTRK gene fusion solid tumors in China
期刊论文
THORACIC CANCER, 2022
作者:
Xu, Chunwei
;
Si, Lu
;
Wang, Wenxian
;
Li, Ziming
;
Song, Zhengbo
收藏
  |  
浏览/下载:56/0
  |  
提交时间:2022/12/22
fusion
precision medicine
solid tumor
targeted therapy
tyrosine receptor kinase
Study of the fast electron behavior in electron cyclotron current driven plasma on J-TEXT
期刊论文
Plasma Science and Technology, 2022, 卷号: 24
作者:
ZHANG,Xiaobo
;
YAN,Wei
;
CHEN,Zhongyong
;
FANG,Jiangang
;
ZHANG,Junli
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/12/22
fast electron
tokamak
electron cyclotron current drive
power deposition location
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Secure Data Collaborative Computing Scheme Based on Blockchain
期刊论文
Security and Communication Networks, 2021, 卷号: 2021
作者:
Feng, Tao
;
Wang, Xusheng
;
Liu, Chunyan
;
Fang, Junli
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/03/02
Blockchain
Digital storage
Electronic voting
Privacy by design
Anti collusions
Bloom filters
Data informations
Data storage
Secret sharing
Secure multi-party computation
Security datum
Verifiability
Group signature with time-bound keys and unforgeability of expiry time for smart cities
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1
作者:
Fang, Junli
;
Feng, Tao
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/06/03
Group signatures
Unforgeability of expiry time
Time-bound keys
Internet of things
Smart cities
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
rGO modified nanoplate-assembled ZnO/CdO junction for detection of NO2
期刊论文
JOURNAL OF HAZARDOUS MATERIALS, 2020, 卷号: 394, 页码: 9
作者:
Bai, Shouli
;
Sun, Xi
;
Han, Ning
;
Shu, Xin
;
Pan, Junli
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/06/15
Gas sensor
ZnO/CdO
Graphene
rGO
NO2
Selective Deoxygenation of Lignin-Derived Phenols and Dimeric Ethers with Protic Ionic Liquids
期刊论文
INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH, 2020, 卷号: 59, 期号: 11, 页码: 4864-4871
作者:
Yang, Shaoqi
;
Cai, Guangming
;
Lu, Xingmei
;
Wang, Chenguang
;
Feng, Mi
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2020/10/29
Selective Deoxygenation of Lignin-Derived Phenols and Dimeric Ethers with Protic Ionic Liquids
期刊论文
INDUSTRIAL & ENGINEERING CHEMISTRY RESEARCH, 2020, 卷号: 59, 期号: 11, 页码: 4864-4871
作者:
Yang, Shaoqi
;
Cai, Guangming
;
Lu, Xingmei
;
Wang, Chenguang
;
Feng, Mi
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/05/21
Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model
会议论文
Hohhot, China, July 17, 2020 - July 20, 2020
作者:
Feng, Tao
;
Dou, Manfang
;
Xie, Pengshou
;
Fang, Junli
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Artificial intelligence
Big data
Feature extraction
Intrusion detection
Classification accuracy
Classification results
Data characteristics
Ensemble classifiers
Ensemble modeling
Network intrusion detection
Network intrusions
Stacking framework
©版权所有 ©2017 CSpace - Powered by
CSpace