Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Linna Fan"'
Publikováno v:
Drones, Vol 8, Iss 8, p 359 (2024)
Unmanned aerial vehicles (UAVs) play a critical role in various fields, including logistics, agriculture, and rescue operations. Effective identity authentication and key agreement schemes are vital for UAV networks to combat threats. Current schemes
Externí odkaz:
https://doaj.org/article/105b01ad895945e98f50c4abb7e4ea52
Autor:
Linna Fan, Lin He, Yichao Wu, Shize Zhang, Zhiliang Wang Wang, Jia Li, Jiahai Yang, Chaocan Xiang, Xiaoqian Ma
Publikováno v:
IEEE Transactions on Mobile Computing. :1-20
Publikováno v:
The European journal of neuroscienceREFERENCES. 56(3)
Cerebral ischaemia reperfusion (CIR) affects microRNA (miR) expression and causes substantial inflammation. Here, we investigated the influence and underlying mechanism of miR-27a-3p in rats with CIR. First, biliverdin treatment relieved cerebral inf
Publikováno v:
SSRN Electronic Journal.
Publikováno v:
Computer Networks. 219:109450
Publikováno v:
Molecular biology reports. 49(2)
Background Sensitive skin is the result of a complex process that is closely linked to the damage of the skin barrier. There are no recognized methods for evaluating the efficacy of anti-allergy products. Methods In this study, a model of skin barrie
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783030808501
Different kinds of Internet-of-Things (IoT) devices have been widely deployed in recent years, bringing great convenience as well as security threats. Given the grim situation of IoT security, various traffic-based security management systems special
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ac900ca1d30fb4742e3c251fbb3627c
https://doi.org/10.1007/978-3-030-80851-8_15
https://doi.org/10.1007/978-3-030-80851-8_15
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811584107
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::19bac571be7b12c42cce13858bd6e760
https://doi.org/10.1007/978-981-15-8411-4_125
https://doi.org/10.1007/978-981-15-8411-4_125
Publikováno v:
CNSM
With the rapid proliferation of IoT devices, device management and network security are becoming significant challenges. Knowing how many IoT devices are in the network and whether they are behaving normally is significant. IoT device identification