Zobrazeno 1 - 10
of 78
pro vyhledávání: '"Changyu Dong"'
Autor:
Yang Gao, Lin Jiang, Weiyan Chen, Fujie Jiang, Hongkui Dong, Wen Zhao, Changyu Dong, Yingqi Feng
Publikováno v:
Frontiers in Earth Science, Vol 12 (2024)
The West Kunlun orogenic belt located in the northwestern margin of the Qinghai-Tibet Plateau is an important record of the formation and northward extension of the plateau, but the current research mainly focuses on the tectonic activities of the Ce
Externí odkaz:
https://doaj.org/article/f7c27c9292004207af866b2e3bcfc45c
Publikováno v:
Journal of Materials Research and Technology, Vol 9, Iss 6, Pp 13161-13173 (2020)
Influences of grain size and temperature on the mechanical properties of nano-polycrystalline Ni-Co alloy were investigated with molecular dynamics simulations. It is found that the critical grain size of Hall-Petch relationship is 4.3 nm, at which t
Externí odkaz:
https://doaj.org/article/a121fabd35d74ab597cf6961fe4aad13
Publikováno v:
Information Sciences. 632:269-284
Publikováno v:
Information Sciences. 626:537-558
Autor:
LI HU, ANLI YAN, HONGYANG YAN, JIN LI, TENG HUANG, YINGYING ZHANG, CHANGYU DONG, CHUNSHENG YANG
Publikováno v:
ACM Computing Surveys; Apr2024, Vol. 56 Issue 4, p1-34, 34p
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 33:3690-3701
Publikováno v:
International Journal of Intelligent Systems. 37:9674-9700
Publikováno v:
IEEE Transactions on Knowledge and Data Engineering. 34:2306-2323
Homomorphic encryption (HE) schemes, such as fully homomorphic encryption (FHE), support a number of useful computations on ciphertext in a broad range of applications, such as e-voting, private information retrieval, cloud security, and privacy prot
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:2023-2037
To achieve efficiently search and update on outsourced encrypted data, dynamic searchable symmetric encryption~(DSSE) was proposed by just leaking some well-defined leakages. Though small, many recent works show that an attacker can exploit these lea
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:1579-1591
Order-preserving encryption (OPE) is a cryptographic primitive that preserves the order of plaintexts. In the past few years, many OPE schemes have been studied to solve the problem of executing range queries in encrypted databases. However, OPE allo