×
验证码:
换一张
Forgotten Password?
Stay signed in
Login With UMPASS
English
|
繁體
Login With UMPASS
Log In
ALL
ORCID
TI
AU
PY
SU
KW
TY
JN
DA
IN
PB
FP
ST
SM
Study Hall
Image search
Paste the image URL
Home
Faculties & Institutes
Scholars
Publications
Subjects
Statistics
News
Search in the results
Faculties & Institutes
Faculty of Scien... [1]
Authors
ZHANG LIMING [1]
Document Type
Journal article [5]
Date Issued
2022 [1]
2017 [1]
2014 [1]
2010 [1]
2004 [1]
Language
英語English [5]
Source Publication
IEICE Transactio... [4]
IEICE TRANSACTIO... [1]
Indexed By
SCIE [4]
Funding Organization
Funding Project
×
Knowledge Map
UM
Start a Submission
Submissions
Unclaimed
Claimed
Attach Fulltext
Bookmarks
Browse/Search Results:
1-5 of 5
Help
Selected(
0
)
Clear
Items/Page:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
Sort:
Select
Issue Date Ascending
Issue Date Descending
Title Ascending
Title Descending
Author Ascending
Author Descending
WOS Cited Times Ascending
WOS Cited Times Descending
Submit date Ascending
Submit date Descending
Journal Impact Factor Ascending
Journal Impact Factor Descending
Altered Fingerprints Detection Based on Deep Feature Fusion
Journal article
Xu, Chao, Yan, Yunfeng, Yang, Lehangyu, Li, Sheng, Feng, Guorui. Altered Fingerprints Detection Based on Deep Feature Fusion[J]. IEICE Transactions on Information and Systems, 2022, E105D(9), 1647-1651.
Authors:
Xu, Chao
;
Yan, Yunfeng
;
Yang, Lehangyu
;
Li, Sheng
;
Feng, Guorui
Favorite
|
TC[WOS]:
0
TC[Scopus]:
0
IF:
0.6
/
0.6
|
Submit date:2023/01/30
Altered Fingerprint
Connected Networks
Feature Fusion
Spectral Attention
Detect and prevent SIP flooding attacks in VoLTE by utilizing a two-tier PFilter design
Journal article
Ruan N., Wu M., Ma S., Zhu H., Jia W., Wu S.. Detect and prevent SIP flooding attacks in VoLTE by utilizing a two-tier PFilter design[J]. IEICE Transactions on Information and Systems, 2017, E100D(10), 2287-2294.
Authors:
Ruan N.
;
Wu M.
;
Ma S.
;
Zhu H.
;
Jia W.
; et al.
Favorite
|
TC[WOS]:
1
TC[Scopus]:
1
|
Submit date:2019/02/11
Count
Filter
Pfilter
Sip Flooding Attack
Stock index trend analysis based on signal decomposition
Journal article
Zhang L., Zhang D., Li W.. Stock index trend analysis based on signal decomposition[J]. IEICE Transactions on Information and Systems, 2014, E97-D(8), 2187-2190.
Authors:
Zhang L.
;
Zhang D.
;
Li W.
Favorite
|
TC[WOS]:
2
TC[Scopus]:
2
|
Submit date:2019/04/04
Adaptive Fourier Decomposition
Rbf Neural Network
Stock Index Trend Forecasting
The Dow Theory
Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks
Journal article
Peng S., Jia W., Wang G., Wu J., Guo M.. Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks[J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93-D(3), 510-517.
Authors:
Peng S.
;
Jia W.
;
Wang G.
;
Wu J.
;
Guo M.
Favorite
|
TC[WOS]:
12
TC[Scopus]:
16
|
Submit date:2019/02/11
Collaborative Filtering
Mobile Ad-hoc Networks
Multiple Constraints
Trust Evaluation
Trusted Routing
Optimal multicast tree routing for cluster computing in hypercube interconnection networks
Journal article
Weijia JIA, Bo HAN, Pui On AU, Yong HE, Wanlei ZHOU. Optimal multicast tree routing for cluster computing in hypercube interconnection networks[J]. IEICE Transactions on Information and Systems, 2004, E87-D(7), 1625-1632.
Authors:
Weijia JIA
;
Bo HAN
;
Pui On AU
;
Yong HE
;
Wanlei ZHOU
Favorite
|
TC[WOS]:
3
TC[Scopus]:
3
IF:
0.6
/
0.6
|
Submit date:2019/02/11
Cluster Computing
Delay
Hypercube
Multicast Routing
Resource Utilization
Routing Delay
Shared Tree
Source Tree