Showing 1 - 20 results of 51 for search 'Feng MA', query time: 0.03s
Refine Results
-
1
-
2
-
3
Silicon transport and its “homeostasis” in rice by Sheng Huang, Jian Feng Ma
Published 2024-01-01Get full text
Article -
4
-
5
-
6
Protocol to enhance the security of Early data in TLS 1.3 by Xing-long ZHANG, Qing-feng CHENG, Jian-feng MA
Published 2017-12-01Get full text
Article -
7
Approach on runtime monitoring based on the embedded trusted platforms by Zhao-chang SUN, Jian-feng MA, Cong SUN, Di LU
Published 2017-10-01Get full text
Article -
8
Numerical Study on the Seismic Response of Structure with Consideration of the Behavior of Base Mat Uplift by Guo-Bo Wang, Xin Zhou, Xian-Feng Ma, Jun Wu
Published 2017-01-01Get full text
Article -
9
Anonymous aggregator election protocol for wireless sensor networks by Shuai FU, Jian-feng MA, Hong-tao LI, GQi JIAN
Published 2015-02-01Get full text
Article -
10
-
11
Study on the effect of load on the structural response of projectile during penetration process by Jun Liang, Xuanhua Fan, Tao Li, Shifu Xiao, Feng Ma
Published 2025-04-01Get full text
Article -
12
Towards cooperation location privacy-preserving group nearest neighbor queries in LBS by Sheng GAO, Jian-feng MA, Qing-song YAO, Cong SUN
Published 2015-03-01Get full text
Article -
13
Composable information flow verification for service chain based on model checking by Ning XI, Jian-feng MA, Cong SUN, Di LU, Tao ZHANG
Published 2014-11-01Get full text
Article -
14
New remote authorization protocol for vehicle diagnosis by Zheng-da JIAO, Jian-feng MA, Cong SUN, Qing-song YAO
Published 2014-11-01Get full text
Article -
15
Blind audio watermarking mechanism based on variational Bayesian learning by Xin TANG, Zhao-feng MA, Xin-xin NIU, Yi-xian YANG
Published 2015-01-01Get full text
Article -
16
-
17
Rational analysis of authentication protocols based on NGUYEN L H scheme by Xing-hua LI, Ling-juan DENG, Yuan ZHANG, Jian-feng MA
Published 2013-08-01Get full text
Article -
18
Multilevel access control for video database by Jin-bo XIONG, Zhi-qiang YAO, Jian-feng MA, Qi LI
Published 2012-08-01Get full text
Article -
19
ESYN:efficient synchronization clustering algorithm based on dynamic synchronization model by Xue-wen DONG, Chao YANG, Li-jie SHENG, Jian-feng MA
Published 2014-11-01Get full text
Article -
20
Routing metric based on interference measurement for multi-radio multi-channel wireless mesh networks by Wen-jiang JI, Jian-feng MA, Jun-wei ZHANG, Zhuo MA
Published 2013-04-01Get full text
Article