UM

Browse/Search Results:  1-10 of 19 Help

Selected(0)Clear Items/Page:    Sort:
Observing the structural diversity of electrochemically deposited lithium metal in three dimensions Journal article
Li, Xiangyan, Han, Bing, Zou, Yucheng, Ke, Ruohong, Deng, Yonghong, Wu, Sudong, Zhao, Yusheng, Shao, Huaiyu, Guo, Junpo, Gu, Meng. Observing the structural diversity of electrochemically deposited lithium metal in three dimensions[J]. Journal of Power Sources, 2023, 567, 232948.
Authors:  Li, Xiangyan;  Han, Bing;  Zou, Yucheng;  Ke, Ruohong;  Deng, Yonghong; et al.
Favorite | TC[WOS]:2 TC[Scopus]:2  IF:8.1/8.3 | Submit date:2023/06/05
Cryogenic Electron Tomography  Dead Li  Deposited MetalLic Li  Li Metal Battery  Solid-electrolyte Interphase  
MIPI 2022 Challenge on Under-Display Camera Image Restoration: Methods and Results Conference paper
Feng,Ruicheng, Li,Chongyi, Zhou,Shangchen, Sun,Wenxiu, Zhu,Qingpeng, Jiang,Jun, Yang,Qingyu, Loy,Chen Change, Gu,Jinwei, Zhu,Yurui, Wang,Xi, Fu,Xueyang, Hu,Xiaowei, Hu,Jinfan, Liu,Xina, Chen,Xiangyu, Dong,Chao, Zhang,Dafeng, Huang,Feiyu, Liu,Shizhuo, Wang,Xiaobing, Jin,Zhezhu, Jiang,Xuhao, Shao,Guangqi, Wang,Xiaotao, Lei,Lei, Zhang,Zhao, Zhao,Suiyi, Zheng,Huan, Gao,Yangcheng, Wei,Yanyan, Ren,Jiahuan, Huang,Tao, Fang,Zhenxuan, Huang,Mengluan, Xu,Junwei, Zhang,Yong, Yang,Yuechi, Shu,Qidi, Yang,Zhiwen, Li,Shaocong, Yao,Mingde, Xu,Ruikang, Guan,Yuanshen, Huang,Jie, Xiong,Zhiwei, Zhu,Hangyan, Liu,Ming, Liu,Shaohui, Zuo,Wangmeng, Jia,Zhuang, Song,Binbin, Song,Ziqi, Mao,Guiting, Hou,Ben, Liu,Zhimou, Ke,Yi, Ouyang,Dengpei, Han,Dekui, Zhang,Jinghao, Zhu,Qi, Zheng,Naishan, Zhao,Feng, Jin,Wu, Conde,Marcos, Nathan,Sabari, Timofte,Radu, Xu,Tianyi, Xu,Jun, Hrishikesh,P. S., Puthussery,Densen, Jiji,C. V., Jiang,Biao, Ding,Yuhan, Li,Wan Zhang, Feng,Xiaoyue, Chen,Sijing, Zhong,Tianheng, Lu,Jiyang, Chen,Hongming, Fan,Zhentao, Chen,Xiang. MIPI 2022 Challenge on Under-Display Camera Image Restoration: Methods and Results[C]. Leonid Karlinsky, Tomer Michaeli, Ko Nishino:Springer Science and Business Media Deutschland GmbH, 2023, 60-77.
Authors:  Feng,Ruicheng;  Li,Chongyi;  Zhou,Shangchen;  Sun,Wenxiu;  Zhu,Qingpeng; et al.
Favorite | TC[Scopus]:2 | Submit date:2023/08/03
Image Restoration  Mipi Challenge  Under-display Camera  
Toward Visual Behavior and Attention Understanding for Augmented 360 Degree Videos Journal article
Yucheng Zhu, Xiongkuo Min, Dandan Zhu, Guangtao Zhai, Xiaokang Yang, Wenjun Zhang, Ke Gu, Jiantao Zhou. Toward Visual Behavior and Attention Understanding for Augmented 360 Degree Videos[J]. ACM Trans. Multimedia Computing, Communications, and Applications, 2022, 19(2), 1-24.
Authors:  Yucheng Zhu;  Xiongkuo Min;  Dandan Zhu;  Guangtao Zhai;  Xiaokang Yang; et al.
Favorite |  | Submit date:2022/09/28
Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs Journal article
Gu, Ke, Dong, Xin Ying, Jia, Wei Jia. Malicious Node Detection Scheme Based on Correlation of Data and Network Topology in Fog Computing-Based VANETs[J]. IEEE Transactions on Cloud Computing, 2022, 10(2), 1215-1232.
Authors:  Gu, Ke;  Dong, Xin Ying;  Jia, Wei Jia
Favorite | TC[WOS]:29 TC[Scopus]:28  IF:5.3/4.6 | Submit date:2022/08/05
Data Security  Fog Computing  Malicious Node  Reputation  Vanets  
Secure Data Sequence Query Framework Based on Multiple Fogs Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Sequence Query Framework Based on Multiple Fogs[J]. IEEE Transactions on Emerging Topics in Computing, 2021, 9(4), 1883-1900.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:18 TC[Scopus]:20  IF:5.1/4.5 | Submit date:2022/05/13
Data Sequence Query  Fog Computing  Merkle Hashing Tree  Security  
A Hessenberg-type algorithm for computing PageRank Problems Journal article
Gu, Xian Ming, Lei, Siu Long, Zhang, Ke, Shen, Zhao Li, Wen, Chun, Carpentieri, Bruno. A Hessenberg-type algorithm for computing PageRank Problems[J]. Numerical Algorithms, 2021, 89(4), 1845-1863.
Authors:  Gu, Xian Ming;  Lei, Siu Long;  Zhang, Ke;  Shen, Zhao Li;  Wen, Chun; et al.
Favorite | TC[WOS]:9 TC[Scopus]:9  IF:1.7/1.9 | Submit date:2022/05/04
Arnoldi Process  Hessenberg Process  Krylov Subspace Method  Pagerank Vector  Ritz Values  
IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Li, Xiong, Jia, Weijia. IDS Intelligent Configuration Scheme against Advanced Adaptive Attacks[J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2), 995-1008.
Authors:  Xia, Zhuoqun;  Tan, Jingjing;  Gu, Ke;  Li, Xiong;  Jia, Weijia
Favorite | TC[WOS]:9 TC[Scopus]:10  IF:6.7/6.0 | Submit date:2021/12/07
Advanced Adaptive Attack  Evolutionary Game  Evolutionary Stability Strategy  Intelligent Configuration  Intrusion Detection System.  
Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism Journal article
Gu, Ke, Tang, Linyu, Jiang, Jiafu, Jia, Wei Jia. Resource Allocation Scheme for Community-Based Fog Computing Based on Reputation Mechanism[J]. IEEE Transactions on Computational Social Systems, 2020, 7(5), 1246-1263.
Authors:  Gu, Ke;  Tang, Linyu;  Jiang, Jiafu;  Jia, Wei Jia
Favorite | TC[WOS]:10 TC[Scopus]:13  IF:4.5/4.6 | Submit date:2021/12/06
Community  Fog Computing  Reputation  Resource Allocation  Security  
Detection resource allocation scheme for two-layer cooperative IDSs in smart grids Journal article
Xia, Zhuoqun, Tan, Jingjing, Gu, Ke, Jia, Wei Jia. Detection resource allocation scheme for two-layer cooperative IDSs in smart grids[J]. Journal of Parallel and Distributed Computing, 2020, 147, 236-247.
Authors:  Xia, Zhuoqun;  Tan, Jingjing;  Gu, Ke;  Jia, Wei Jia
Favorite | TC[WOS]:11 TC[Scopus]:13  IF:3.4/3.4 | Submit date:2021/12/07
Intrusion Detection System  Resource Allocation  Sharing Strategy  Smart Grids  
Secure Data Query Framework for Cloud and Fog Computing Journal article
Gu, Ke, Wu, Na, Yin, Bo, Jia, Weijia. Secure Data Query Framework for Cloud and Fog Computing[J]. IEEE Transactions on Network and Service Management, 2020, 17(1), 332-345.
Authors:  Gu, Ke;  Wu, Na;  Yin, Bo;  Jia, Weijia
Favorite | TC[WOS]:69 TC[Scopus]:68  IF:4.7/4.6 | Submit date:2021/12/06
Cloud Computing  Data Query  Fog Computing  Security