Dong, Jiahan
102  results:
Search for persons X
?
2

Dynamic Real-Time Analysis of Network Attacks Based on Dyna..:

Wang, Chao ; Dong, Jiahan ; Guo, Guangxin..
Journal of Advanced Computational Intelligence and Intelligent Informatics.  28 (2024)  1 - p. 141-149 , 2024
 
?
4

Photocatalytic activation of oxalic acid over FeOOH loaded ..:

Chai, Qingqing ; Dong, Jiahan ; Yu, Xiaofang...
Journal of Environmental Chemical Engineering.  12 (2024)  1 - p. 111728 , 2024
 
?
5

Integrated Monitoring System of Substation Operation and Ma..:

, In: Lecture Notes on Data Engineering and Communications Technologies; Proceedings of the 4th International Conference on Big Data Analytics for Cyber-Physical System in Smart City - Volume 2,
Wang, Xiaohu ; Xu, Kai ; Dong, Jiahan... - p. 463-470 , 2023
 
?
6

Coordinated cyber attack of multiple step based on local an..:

, In: 2023 IEEE 2nd Industrial Electronics Society Annual On-Line Conference (ONCON),
Tian, Qiu-Han ; Sun, Lian-Wen ; Dong, Jia-Han.. - p. 1-6 , 2023
 
?
8

Security Detection Framework for Smart Terminals of Electri..:

, In: Proceedings of the 2023 5th International Conference on Internet of Things, Automation and Artificial Intelligence,
Dong, Jiahan ; Guo, Guangxin ; Wang, Xiaohu... - p. 324-328 , 2023
 
?
9

Camptothecin Delivery via Tumor-Derived Exosome for Radiose..:

Yang, Yiling ; Ren, Shiqi ; Huang, Wenpeng...
Frontiers in Bioengineering and Biotechnology.  10 (2022)  - p. , 2022
 
?
10

Vulnerability Mining Technology Based on Genetic Algorithm ..:

Ren, Tianyu ; Wang, Xiaohu ; Li, Qun...
IOP Conference Series: Materials Science and Engineering.  750 (2020)  1 - p. 012168 , 2020
 
?
11

Network computer security hidden dangers and vulnerability ..:

Wang, Chao ; Ren, Tianyu ; Li, Qun...
IOP Conference Series: Materials Science and Engineering.  750 (2020)  1 - p. 012155 , 2020
 
?
12

Research on Personal Privacy Security Detection Technology ..:

, In: 2022 IEEE 6th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC ),
Chao, Wang ; Jiahan, Dong ; Xiaohu, Wang. - p. 586-590 , 2022
 
?
13

An Android Application Vulnerability Mining Method Based On..:

, In: 2020 IEEE 5th Information Technology and Mechatronics Engineering Conference (ITOEC),
Chao, Wang ; Qun, Li ; XiaoHu, Wang... - p. 599-603 , 2020
 
?
 
?
15

Camptothecin Delivery via Tumor-Derived Exosome for Radiose..:

Yiling Yang ; Shiqi Ren ; Wenpeng Huang...
https://www.frontiersin.org/articles/10.3389/fbioe.2022.876641/full.  , 2022
 
1-15