Showing 1 - 20 results of 32 for search 'Fenghua LI', query time: 0.03s
Refine Results
-
1
-
2
Instance structure based multi-label learning with missing labels by Tianzhu CHEN, Fenghua LI, Yunchuan GUO, Zifu LI
Published 2021-11-01
Article -
3
Academic connotation and research trends of privacy computing by Fenghua LI, Hui LI, Ben NIU, Weidong QIU
Published 2022-12-01
Article -
4
Risk assessing and privacy-preserving scheme for privacy leakage in APP by Xinyu WANG, Ben NIU, Fenghua LI, Kun HE
Published 2019-05-01
Article -
5
Research on cross-domain access control technology by Tianyi ZHU, Fenghua LI, Lin CHENG, Yunchuan GUO
Published 2021-02-01
Article -
6
Scheduling algorithm for stochastic job stream cipher service based on load balancing by Li LI, Guozhen SHI, Kui GENG, Xiuze DONG, Fenghua LI
Published 2018-06-01
Article -
7
Using rule association to generate data collection policies by Pei CHEN, Fenghua LI, Zifu LI, Yunchuan GUO, Lin CHENG
Published 2021-10-01
Article -
8
Research on Space-Ground Network Security Guarantee Technology by Fenghua LI, Linjie ZHANG, Yueming LU, Kui GENG, Yunchuan GUO
Published 2020-09-01
Article -
9
Traffic characteristic based privacy leakage assessment scheme for Android device by Zhu WANG, Kun HE, Xinyu WANG, Ben NIU, Fenghua LI
Published 2020-02-01
Article -
10
-
11
High-performance and high-concurrency encryption scheme for Hadoop platform by Wei JIN, Mingjie YU, Fenghua LI, Zhengkun YANG, Kui GENG
Published 2019-12-01
Article -
12
Fastly match threat response policies based on interval decision diagram by Lingcui ZHANG, Fenghua LI, Liang FANG, Yunchuan GUO, Zifu LI
Published 2021-05-01
Article -
13
Privacy-preserving photo sharing framework cross different social network by Fenghua LI, Zhe SUN, Ben NIU, Jin CAO, Hui LI
Published 2019-07-01
Article -
14
Multipath congestion control algorithm based on link capacity by Zhu WANG, Qingyun YUAN, Fanfan HAO, Liang FANG, Fenghua LI
Published 2020-05-01
Article -
15
Fuzzy evaluation for response effectiveness in cases of incomplete information by Fenghua LI, Yongjun LI, Zhengkun YANG, Han ZHANG, Lingcui ZHANG
Published 2019-04-01
Article -
16
Cache of cryptographic key based on query popularity by Wei JIN, Fenghua LI, Ziyan ZHOU, Xiyang SUN, Yunchuan GUO
Published 2023-02-01
Article -
17
Efficient and provably-secure certificateless sequential aggregate signature scheme by Zhu WANG, Siqi YANG, Fenghua LI, Kui GENG, Tingting PENG, Mengyao SHI
Published 2022-05-01
Article -
18
Cross-domain access control policy mapping mechanism for balancing interoperability and autonomy by Tianyi ZHU, Fenghua LI, Wei JIN, Yunchuan GUO, Liang FANG, Lin CHENG
Published 2020-09-01
Article -
19
Cross-domain multi-copy of flow discovery mechanism based on dual certificate storage by Haiyang LUO, Bin KUANG, Shoukun GUO, Lingcui ZHANG, Ben NIU, Fenghua LI
Published 2024-02-01
Article -
20
Cross-network access control mechanism for complex network environment by Fenghua LI, Tianzhu CHEN, Zhen WANG, Linjie ZHANG, Guozhen SHI, Yunchuan GUO
Published 2018-02-01
Article