I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Hua, Jingyu
730
results:
Search for persons
X
Format
Online (730)
Mediatypes
Articles (Online) (424)
Bookchapter (Online) (29)
OpenAccess-fulltext (277)
Languages
english (617)
Sorted by: Relevance
Sorted by: Year
?
1
Intrinsic neural timescales relate to the dynamics of infra..:
Ao, Yujia
;
Catal, Yasir
;
Lechner, Stephan
..
NeuroImage. 285 (2024) - p. 120482 , 2024
Link:
https://doi.org/10.1016/..
?
2
A Comprehensive Study of Trajectory Forgery and Detection i..:
Yang, Huaming
;
Xia, Zhongzhou
;
Shin, Jersy
...
IEEE Transactions on Mobile Computing. 23 (2024) 4 - p. 3228-3242 , 2024
Link:
https://doi.org/10.1109/..
?
3
Backdoor Attack Against Split Neural Network-Based Vertical..:
He, Ying
;
Shen, Zhili
;
Hua, Jingyu
...
IEEE Transactions on Information Forensics and Security. 19 (2024) - p. 748-763 , 2024
Link:
https://doi.org/10.1109/..
?
4
Scalable Differentially Private Model Publishing Via Privat..:
Tong, Wei
;
Niu, Jiacheng
;
Hua, Jingyu
..
IEEE Transactions on Dependable and Secure Computing. 21 (2024) 4 - p. 2494-2506 , 2024
Link:
https://doi.org/10.1109/..
?
5
Hybrid image compression algorithm based on wavelet transfo..:
Zhang, Xiang
;
Wen, Jiangang
;
Zou, Yuanping
.
International Journal of Circuit Theory and Applications. , 2024
Link:
https://doi.org/10.1002/..
?
6
SGBA: A stealthy scapegoat backdoor attack against deep neu..:
He, Ying
;
Shen, Zhili
;
Xia, Chang
...
Computers & Security. 136 (2024) - p. 103523 , 2024
Link:
https://doi.org/10.1016/..
?
7
Angle Residual-Based NLOS Suppression and Localization Meth..:
Wang, Jiale
;
Wen, Jiangang
;
Hua, Jingyu
...
IEEE Sensors Journal. 23 (2023) 13 - p. 14388-14396 , 2023
Link:
https://doi.org/10.1109/..
?
8
Design of nonlinear phase prototype filter based on coeffic..:
Wen, Jiangang
;
Zhou, Runjian
;
Hua, Jingyu
..
Digital Signal Processing. 138 (2023) - p. 104053 , 2023
Link:
https://doi.org/10.1016/..
?
9
Understanding Location Privacy of the Point-of-Interest Agg..:
Tong, Wei
;
Tong, Yinggang
;
Xia, Chang
...
IEEE Transactions on Dependable and Secure Computing. 20 (2023) 3 - p. 2433-2449 , 2023
Link:
https://doi.org/10.1109/..
?
10
FLSwitch: Towards Secure and Fast Model Aggregation for Fed..:
, In:
Applied Cryptography and Network Security; Lecture Notes in Computer Science
,
Mao, Yunlong
;
Dang, Ziqin
;
Lin, Yu
... - p. 476-500 , 2023
Link:
https://doi.org/10.1007/..
?
11
A novel out‐of‐band emission suppression method in future w..:
Chen, Hao
;
Wen, Jiangang
;
Hua, Jingyu
...
International Journal of Communication Systems. 36 (2022) 13 - p. , 2022
Link:
https://doi.org/10.1002/..
?
12
Alpha and theta peak frequency track on- and off-thoughts:
Hua, Jingyu
;
Wolff, Annemarie
;
Zhang, Jianfeng
...
Communications Biology. 5 (2022) 1 - p. , 2022
Link:
https://doi.org/10.1038/..
?
13
Optimization of the energy efficiency in Smart Internet of ..:
Fu, Jiafei
;
Zhu, Pengcheng
;
Hua, Jingyu
..
EURASIP Journal on Advances in Signal Processing. 2022 (2022) 1 - p. , 2022
Link:
https://doi.org/10.1186/..
?
14
GAN-Based Information Leakage Attack Detection in Federated..:
Lai, Jianxiong
;
Huang, Xiuli
;
Gao, Xianzhou
...
Security and Communication Networks. 2022 (2022) - p. 1-10 , 2022
Link:
https://doi.org/10.1155/..
?
15
Optimization of ACF-DSR-based joint Doppler shift and SNR e..:
Wen, Jiangang
;
Yan, Lei
;
Feng, Xiaofei
...
EURASIP Journal on Advances in Signal Processing. 2022 (2022) 1 - p. , 2022
Link:
https://doi.org/10.1186/..
1-15