-
1Academic Journal
المؤلفون: Zheng,Lijuan, Ma,Jiachi, Dong,Fang, Wu,Ligang, Gong,Zhenqiang, Qi,Jianbo, Zhao,Xiaodan, Du,Jianbo, Ma,Peilan
مصطلحات موضوعية: Therapeutics and Clinical Risk Management
وصف الملف: text/html
-
2Academic Journal
المؤلفون: Gong, Zhenqiang, Ma, Jiachi, Su, He, Guo, Tiankang, Cai, Hui, Chen, Quan, Zhao, Xiaodan, Qi, Jianbo, Du, Jianbo
المساهمون: National Natural Science Foundation of China
المصدر: International Journal of Clinical Oncology ; volume 23, issue 4, page 659-670 ; ISSN 1341-9625 1437-7772
-
3Academic Journal
المؤلفون: Zheng, Lijuan, Ma, Jiachi, Dong, Fang, Wu, Ligang, Gong, Zhenqiang, Qi, Jianbo, Zhao, Xiaodan, Du, Jianbo, Ma, Peilan
المصدر: Therapeutics and Clinical Risk Management ; volume Volume 14, page 551-556 ; ISSN 1178-203X
-
4Academic Journal
المؤلفون: Gong, Zhenqiang, Matzke, Nichilos J., Ermentrout, Bard, Song, Dawn, Vendetti, Jann E., Slatkin, Montgomery, Oster, George
المصدر: Proceedings of the National Academy of Sciences of the United States of America, 2012 Jan . 109(5), 1367-1367.
URL الوصول: https://www.jstor.org/stable/41477100
-
5Academic Journal
المؤلفون: Ma,Jiachi, Sun,Xiaowen, Guo,Tiankang, Su,He, Chen,Quan, Gong,Zhenqiang, Qi,Jianbo, Zhao,Xiaodan
مصطلحات موضوعية: Cancer Management and Research
وصف الملف: text/html
-
6Academic Journal
المؤلفون: Ma, Jiachi, Sun, Xiaowen, Guo, Tiankang, Su, He, Chen, Quan, Gong, Zhenqiang, Qi, Jianbo, Zhao, Xiaodan
المصدر: Cancer Management and Research ; volume Volume 9, page 481-493 ; ISSN 1179-1322
-
7
المؤلفون: Gong, Zhenqiang
مصطلحات موضوعية: Computer science, authentication, social network analysis, social network security and privacy
وصف الملف: application/pdf
URL الوصول: https://escholarship.org/uc/item/1b14t6kq
-
8Academic Journal
المؤلفون: Shi, Chen, Cheng, Chao-Chun, Kocolowski, Connor, Kozlowski, Emmett, Kuennen, Justin, Lawlor, Matthew, Kerr, Mitchell, Stair, Jacob, Liao, Zhonghao, Gong, Zhenqiang, Guan, Yong
المساهمون: Center for Statistics and Applications in Forensic Evidence, Center for Statistics and Applications in Forensic Evidence (CSAFE)", Electrical and Computer Engineering
المصدر: archive/lib.dr.iastate.edu/csafe_conf/63/2020_ShiC_Android_app_Forensic_Evidence_Database.pdf|||Sat Jan 15 01:20:21 UTC 2022
مصطلحات موضوعية: Electrical and Computer Engineering, Forensic Science and Technology
وصف الملف: application/pdf
Relation: archive/lib.dr.iastate.edu/csafe_conf/63/; 1061; csafe_conf/63; https://dr.lib.iastate.edu/handle/20.500.12876/20349
-
9Book
المؤلفون: Gong, Zhenqiang, Sun, Guang-Zhong, Yuan, Jing, Zhong, Yanjing
المصدر: Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ; Scalable Information Systems ; page 288-305 ; ISSN 1867-8211 1867-822X ; ISBN 9783642104848 9783642104855
-
10
المؤلفون: Tian Zhong, Zhang Xiaoling, Gong Zhenqiang
المصدر: IGARSS
مصطلحات موضوعية: Synthetic aperture radar, Bistatic radar, Computer science, Image processing, Image resolution, Remote sensing
-
11
المؤلفون: Tian Zhong, Wang Yinbo, Zhang Xiaoling, Gong Zhenqiang
المصدر: 2007 1st Asian and Pacific Conference on Synthetic Aperture Radar.
مصطلحات موضوعية: Autofocus, Synthetic aperture radar, Computer science, Doppler radar, Estimator, law.invention, Bistatic radar, symbols.namesake, law, symbols, Chirp, Doppler effect, Energy (signal processing), Remote sensing
-
12Academic Journal
المؤلفون: Gong, Zhenqiang, Matzke, Nicholas, Ermentrout, Bard, Song, Dawn, Vendetti, Jann E., Slatkin, Montgomery, Oster, George
المصدر: PNAS - Proceedings of the National Academy of Sciences of the United States of America
مصطلحات موضوعية: Keywords: animal shell, article, artificial neural network, Conus snail, fossil, molecular evolution, nonhuman, phenotype, phylogeny, pigmentation, priority journal, Animals, Biological Evolution, Models, Biological, Pigmentation Ancestral inference, Developmental evolution, Pattern formation, Phylogenetics
وصف الملف: application/pdf
Relation: http://hdl.handle.net/1885/152363; https://openresearch-repository.anu.edu.au/bitstream/1885/152363/5/01_Gong_Evolution_of_patterns_on_Conus_2012.pdf.jpg
-
13Conference
المؤلفون: Gong, Zhenqiang, Sun, Guang-Zhong, Xie, Xing
المصدر: 2010 Eleventh International Conference on Mobile Data Management (MDM); 2010, p366-371, 6p
-
14Conference
المؤلفون: Wang Yinbo, Zhang Xiaoling, Gong Zhenqiang, Tian Zhong
المصدر: 2007 1st Asian & Pacific Conference on Synthetic Aperture Radar; 2007, p98-102, 5p
-
15Conference
المؤلفون: Gong Zhenqiang, Zhang Xiaoling, Tian Zhong
المصدر: 2007 IEEE International Geoscience & Remote Sensing Symposium; 2007, p831-834, 4p
-
16Dissertation/ Thesis
المؤلفون: Cao, Xiaoyu
المساهمون: Gong, Zhenqiang ZG
مصطلحات موضوعية: Engineering, federated learning, poisoning attacks, provable security
وصف الملف: application/pdf
Relation: https://hdl.handle.net/10161/26785
الاتاحة: https://hdl.handle.net/10161/26785