Showing 1 - 20 results of 78 for search 'Ping WU', query time: 0.02s
Refine Results
-
1
Variations in green investment efficiency of enterprises under different low-carbon emission reduction strategies by Ping Wu
Published 2024-12-01
Article -
2
Efficient certificateless sequential multi-signature scheme by Yan-lin QIN, Xiao-ping WU
Published 2013-07-01
Article -
3
Port address overloading based packet forwarding verification in SDN by Ping WU, Chaowen CHANG, Yingying MA
Published 2021-07-01
Article -
4
Unknown attack detection model based on network behavior analysis by Yi-han YU, Yu FU, Xiao-ping WU
Published 2016-06-01
Article -
5
Efficient certificateless multi-receiver anonymous signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2016-06-01
Article -
6
-
7
Leakage-resilient certificateless signcryption scheme by Yan-lin QIN, Xiao-ping WU, Wei HU
Published 2017-11-01
Article -
8
Address overloading-based packet forwarding verification in SDN by Ping WU, Chaowen CHANG, Zhibin ZUO, Yingying MA
Published 2022-03-01
Article -
9
Power analysis-resistant based on NCL path balance by Fang LUO, Qing-yu OU, Xiao-ping WU
Published 2013-08-01
Article -
10
k-means clustering method preserving differential privacy in MapReduce framework by Hong-cheng LI, Xiao-ping WU, Yan CHEN
Published 2016-02-01
Article -
11
Screening length of a heavy quark–antiquark pair in non-commutative plasma by Ping-ping Wu, Xiangrong Zhu, Zi-qiang Zhang
Published 2024-12-01
Article -
12
Corrigendum: Advances in stem cell therapy for diabetic foot by Yinfeng Xia, Ping Wu, Hong Chen, Zhiyong Chen
Published 2024-12-01
Article -
13
Advances in stem cell therapy for diabetic foot by Yinfeng Xia, Ping Wu, Hong Chen, Zhiyong Chen
Published 2024-09-01
Article -
14
-
15
Identity authentication scheme based on identity-based encryption by Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI
Published 2016-06-01
Article -
16
Traffic anomaly detection method in networks based on improved clustering algorithm by Hong-cheng LI, Xiao-ping WU, Hong-hai JIANG
Published 2015-12-01
Article -
17
Research on selective trust-path search and aggregation in distributed environment by Yan-lin QIN, Xiao-ping WU, Jian-xin GAO
Published 2012-09-01
Article -
18
Research and implement of file safe deposit box based on authentication and authorization by Xiao-ning DONG, Xiao-ping WU, Hong-cheng LI
Published 2016-05-01
Article -
19
Global burden of chronic kidney disease due to dietary factors by Lingtao Yin, Mengni Kuai, Zhuo Liu, Binbin Zou, Ping Wu
Published 2025-01-01
Article -
20
Survey of data possession provability proving on cloud storage by Wei FU, Qing YE, Ze-mao CHEN, Xiao-ping WU
Published 2012-11-01
Article