default search action
Lei Ju
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Other persons with the same name
- Lei Ju 0001 — Shandong University, School of Cyber Science and Technology, Key Laboratory of Cryptologic Technology and Information Security, Qingdao, China (and 2 more)
- Lei Ju 0002 — Dongbei University of Finance and Economics, School of Investment and Construction Management, Dalian, China
- Lei Ju 0003 — Yangtze University, College of Electronic and Information Engineering, Jingzhou, China
- Lei Ju 0004 — Harbin Engineering University, State Key Laboratory of Autonomous Underwater Vehicle, Harbin, China
- Lei Ju 0005 — University of Surrey, School of Computer Science and Electronic Engineering, Guildford, UK (and 1 more)
Refine list
refinements active!
zoomed in on 15 of 15 records
view refined list in
export refined list as
refine by search term
refine by type
- |
- no options
- temporarily not available
refine by coauthor
- no options
- temporarily not available
refine by orcid
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
2020 – today
- 2024
- [j7]Anqing Wang, Lei Ju, Lu Liu, Haoliang Wang, Nan Gu, Zhouhua Peng, Dan Wang:
Safety-critical formation control of switching uncertain Euler-Lagrange systems with control barrier functions. Appl. Math. Comput. 479: 128860 (2024) - [j6]Wenyi Hu, Lei Ju, Yujia Du, Yuxia Li:
A Super-Resolution Reconstruction Model for Remote Sensing Image Based on Generative Adversarial Networks. Remote. Sens. 16(8): 1460 (2024) - [j5]Guoxiao Liu, Keting Jia, Puwen Wei, Lei Ju:
High-Performance Hardware Implementation of MPCitH and Picnic3. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 190-214 (2024) - [c7]Xinjian Xu, Suqin Wang, Lei Ju:
Algorithm Design for Intelligent Processing of Medical Big Data Based on Artificial Neural Networks. ICCBD 2024: 70-74 - [c6]Shangshang Xiao, Mengxia Sun, Wei Zhang, Naijun Zhan, Lei Ju:
Cache Behavior Analysis with SP-Relative Addressing for WCET Estimation. SETTA 2024: 256-274 - 2023
- [j4]Zhiqiang Wang, Xinyue Yu, Peiyang Xue, Yunhan Qu, Lei Ju:
Research on Medical Security System Based on Zero Trust. Sensors 23(7): 3774 (2023) - [c5]Lei Ju, Zhiwei Wang, Anqing Wang, Xiaotong Zhou:
Consensus of Uncertain Euler-Lagrange Multi-agent Systems under Switching Digraphs and Disturbances. CACRE 2023: 62-67 - [c4]Lei Ju, Xiuwei Lv, Zhiqiang Wang, Zhangwang Miao:
Multi-step Review Generation Based on Masked Language Model for Cross-Domain Aspect-Based Sentiment Analysis. NLPCC (1) 2023: 723-735 - [c3]Xiuwei Lv, Zhiqiang Wang, Lei Ju:
Review Generation Combined with Feature and Instance-Based Domain Adaptation for Cross-Domain Aspect-Based Sentiment Analysis. NLPCC (2) 2023: 813-825 - [c2]Zexiao Zou, Yan Zhang, Jin Chen, Jianyi Zhang, Zhiqiang Wang, Lei Ju, Ri Xu:
Be like a Chameleon: Protect Traffic Privacy with Mimicry. TrustCom 2023: 1449-1454 - 2022
- [i1]Lei Jiang, Lei Ju:
FHEBench: Benchmarking Fully Homomorphic Encryption Schemes. CoRR abs/2203.00728 (2022) - 2020
- [j3]Likai Zhu, Yuanyuan Guo, Chi Zhang, Jijun Meng, Lei Ju, Yuansuo Zhang, Wenxue Tang:
Assessing Community-Level Livability Using Combined Remote Sensing and Internet-Based Big Geospatial Data. Remote. Sens. 12(24): 4026 (2020) - no results
2010 – 2019
- 2016
- [c1]Xiaohong Fan, Zezheng Lu, Lei Ju, Di Mu:
The research on security SDN south interface based on OTR protocol. ISCIT 2016: 629-633 - 2015
- [j2]Yingjie Ma, Hua Jiang, Lei Ju:
Circuit Implementation of Multiscroll Chaotic Attractors Generated Using Step Function. Int. J. Bifurc. Chaos 25(12): 1550160:1-1550160:7 (2015) - [j1]Lei Ju, Yaping Chi, Qiaoyu Liu, Huamin Feng:
基于CPK的虚拟桌面系统认证方法研究 (Research on Virtual Desktop System Authentication Method Based on CPK). 计算机科学 42(Z6): 399-401 (2015) - no results
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
[+][–] Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
[+][–] Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint