Huang, Xiuli
1672  results:
Search for persons X
?
1

From wasted polymers to N/O co-doped partially graphitic ca..:

Liu, Huan ; Huang, Xiuli ; Chen, Wei...
Journal of Materials Chemistry A.  12 (2024)  2 - p. 1012-1025 , 2024
 
?
2

Enabling Wasted A4 Papers as a Promising Carbon Source to C..:

Li, Shi ; Chen, Wei ; Huang, Xiuli...
ACS Applied Materials & Interfaces.  16 (2024)  8 - p. 10126-10137 , 2024
 
?
3

Efficient conversion of biomass waste to N/O co-doped hiera..:

Liu, Huan ; Huang, Xiuli ; Zhou, Menglei...
Journal of Analytical and Applied Pyrolysis.  169 (2023)  - p. 105844 , 2023
 
?
5

Personalized Federated Distillation Method Based on Game Th..:

, In: 2023 9th International Conference on Computer and Communications (ICCC),
Jiang, Yiming ; Hong, Yiwei ; Zhang, Haixia.. - p. 2368-2372 , 2023
 
?
6

Rose-petal-inspired fabrication of conductive superhydropho..:

Chen, Wei ; Huang, Xiuli ; Zhou, Menglei...
Colloids and Surfaces A: Physicochemical and Engineering Aspects.  661 (2023)  - p. 130920 , 2023
 
?
8

A comprehensive assessment method for the power structured ..:

, In: 2023 5th International Conference on Communications, Information System and Computer Engineering (CISCE),
Zhai, Yujia ; Huang, Xiuli ; Shi, Congcong.. - p. 332-336 , 2023
 
?
9

Classification and Grading for Power Sensitive Data Based o..:

, In: 2023 IEEE 11th Joint International Information Technology and Artificial Intelligence Conference (ITAIC),
Huang, Xiuli ; Zhai, Yujia ; Shi, Congcong.. - p. 450-456 , 2023
 
?
11

Overall upgrading Zn-ion storage capability by engineering ..:

Huang, Xiuli ; Chen, Wei ; Liu, Huan...
Journal of Energy Storage.  72 (2023)  - p. 108794 , 2023
 
?
12

GAN-Based Information Leakage Attack Detection in Federated..:

Lai, Jianxiong ; Huang, Xiuli ; Gao, Xianzhou...
Security and Communication Networks.  2022 (2022)  - p. 1-10 , 2022
 
?
13

Investigating How to Optimize Immersive Virtual Field Trips..:

, In: 2022 Eleventh International Conference of Educational Innovation through Technology (EITT),
Huang, Xiuli - p. 143-150 , 2022
 
?
14

A Method of Firmware Vulnerability Mining and Verification ..:

, In: Advances in Artificial Intelligence and Security; Communications in Computer and Information Science,
Xiao, Na ; Zeng, Jing ; Yao, Qigui. - p. 543-556 , 2022
 
?
 
1-15