Showing 1 - 14 results of 14 for search 'Nenghai Yu', query time: 0.02s
Refine Results
-
1
Improvement of the blockchain protocol based on memory-hard function by Sui CHENG, Xianzheng LIN, Nenghai YU
Published 2020-10-01Get full text
Article -
2
Color Image Quality Assessment Based on CIEDE2000 by Yang Yang, Jun Ming, Nenghai Yu
Published 2012-01-01Get full text
Article -
3
Rapid responsive and efficient multi-valued Byzantine consensus scheme by Wang ZHOU, Honggang HU, Nenghai YU
Published 2021-02-01Get full text
Article -
4
Compression of bitcoin blockchain by Xiaojiao CHEN, Xianzheng LIN, Nenghai YU
Published 2021-02-01Get full text
Article -
5
Carrier-independent deep optical watermarking algorithm by Hao CHEN, Feng WANG, Weiming ZHANG, Nenghai YU
Published 2022-08-01Get full text
Article -
6
Location privacy protection method based on lightweight K-anonymity incremental nearest neighbor algorithm by Saite CHEN, Weihai LI, Yuanzhi YAO, Nenghai YU
Published 2023-06-01Get full text
Article -
7
Mining Local Specialties for Travelers by Leveraging Structured and Unstructured Data by Kai Jiang, Like Liu, Rong Xiao, Nenghai Yu
Published 2012-01-01Get full text
Article -
8
Quantum information course for the undergraduate students of cyber security by Wei CHEN, Zhenqiang YIN, Zhengfu HAN, Nenghai YU
Published 2019-06-01Get full text
Article -
9
Computationally secure steganography based on speech synthesis by Menghan LI, Kejiang CHEN, Weiming ZHANG, Nenghai YU
Published 2022-06-01Get full text
Article -
10
Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU
Published 2023-02-01Get full text
Article -
11
Improved fast leakage assessment based on online counting by Zhengguang SHI, Mengce ZHENG, Honggang HU, Nenghai YU
Published 2021-04-01Get full text
Article -
12
Dual-verification-based model fingerprints against ambiguity attacks by Boyao Zhao, Haozhe Chen, Jie Zhang, Weiming Zhang, Nenghai Yu
Published 2024-12-01Get full text
Article -
13
Network function outsourcing system based on prefix-preserving encryption by Lingbo WEI, Xiaobing FENG, Chi ZHANG, Hualong SHENG, Nenghai YU
Published 2018-04-01Get full text
Article -
14
Lightweight and secure vehicle track verification scheme via broadcast communication channels by Zhiqiang NING, Yuanyuan WANG, Chi ZHANG, Lingbo WEI, Nenghai YU, Yue HAO
Published 2023-10-01Get full text
Article