Browsing by ???browse.type.metadata.advisor??? Wei, Ruizhong

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 17 of 17
PreviewIssue DateTitleAuthor(s)???itemlist.dc.contributor.advisor???
ShiH2004m-1a.pdf.jpg2004A classification study of rough sets generalizationShi, Han YinYao, Yiyu; Wei, Ruizhong
WuJ2005m-1a.pdf.jpg2005Access control scheme for partially ordered set hierarchy with provable securityWu, JiangWei, Ruizhong
ZhaoJ2022m-1a.pdf.jpg2023Adding time-series data to enhance performance of naural language processing tasksZhao, JingtianYang, Yimin; Wei, Ruizhong
DengH2022m-1a.pdf.jpg2022Boosting feature extraction performance on the aspect of representation learning efficiencyDeng, HaojinYang, Yimin; Wei, Ruizhong
DingleL2023m-1a.pdf.jpg2024A comparison and analysis of explainable clinical decision making using white box and black box modelsDingle, LiamYang, Yimin; Saha, Ashirbani; Wei, Ruizhong
HsuS2008m-1b.pdf.jpg2008Database anonymization and protections of sensitive attributesHsu, Shih-Ying PeterWei, Ruizhong
MadugulaS2020m-1a.pdf.jpg2020An enhanced passkey entry protocol for secure simple pairing in bluetoothMadugula, Sai SwaroopWei, Ruizhong
WangS2020m-1a.pdf.jpg2020Feature learning boosts network performanceWang, ShiqiYang, Yimin; Wei, Ruizhong
CacicB2004m-1a.pdf.jpg2004Indirect key derivation schemes for key management of access hierarchiesCacic, Brian JohnWei, Ruizhong
YuanK2008m-1b.pdf.jpg2008Joint design of PAPR, PICR and OBP in OFDM systemsYuan, KeweiZhiwei Mao; Wei, Ruizhong
IsmailA2020m-1a.pdf.jpg2020Permissioned blockchains for real world applicationsIsmail, AshianaWei, Ruizhong
FentonM2003m-1a.pdf.jpg2003Searching for incomplete self orthogonal latin squares : a targeted and parallel approachFenton, Mike (Michael Ryan)Wei, Ruizhong
MiaoC2003m-1a.pdf.jpg2003Secret sharing for mobile agent cryptographyMiao, ChungWei, Ruizhong
YingC2005m-1a.pdf.jpg2005The inference problem in multilevel secure databasesChen, Xue YingWei, Ruizhong
LiuW2022m-1a.pdf.jpg2023Vapnik-Chervonenkis dimension in neural networksLiu, WeitingYang, Yimin; Wei, Ruizhong
HuangS2006m-1b.pdf.jpg2006Visual cryptography with cheating sharesHuang, ShanfengWei, Ruizhong
WangB2009m-1a.pdf.jpg10-Nov-2012Wireless sensor network scheduling schemesWang, BoWei, Ruizhong; Li, Deli