×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [28]
沈阳自动化研究所 [8]
兰州理工大学 [7]
计算技术研究所 [7]
地理科学与资源研究所 [2]
数学与系统科学研究院 [2]
更多...
内容类型
期刊论文 [44]
会议论文 [11]
学位论文 [1]
发表日期
2021 [56]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共56条,第1-10条
帮助
限定条件
发表日期:2021
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2021, 卷号: 2021
作者:
Akhtar, Muhammad Shoaib
;
Feng, Tao
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/03/01
Global invasion risk of Apocephalus borealis, a honey bee parasitoid
期刊论文
APIDOLOGIE, 2021, 页码: 13
作者:
Tihelka, Erik
;
Hafernik, John
;
Brown, Brian, V
;
Quock, Christopher
;
Zink, Andrew G.
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2022/02/16
Apocephalus borealis
Parasitoid
Invasion risk
Habitat-suitability
Biosecurity
Beekeeping
Stealthy false data injection attacks against extended Kalman filter detection in power grids
会议论文
Beijing, China, 2021.12.10-12
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/06/28
False data injection, state estimation, extended Kalman filter, attack sequence
An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 页码: 16
作者:
Zheng, Wenbo
;
Yan, Lan
;
Gou, Chao
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2022/01/27
Encryption
DNA
Color
Resists
Computational modeling
Image coding
Complex systems
Artificial image and parallel execution (ACP) method
color image encryption
computational experiment
image division block
parallel computing
Enhancing Feature Point-Based Video Watermarking against Geometric Attacks with Template
期刊论文
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 期号: 2021, 页码: 9
作者:
Lv, Zhongze
;
Guan, Hu
;
Huang, Ying
;
Zhang, Shuwu
;
Zheng, Yang
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2022/01/27
geometric attacks, template, feature point, video watermarking
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
Adversarial Analysis for Source Camera Identification
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 11, 页码: 4174-4186
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Dai, Xiaorui
;
Li, Yi
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/12/28
Cameras
Feature extraction
Forensics
Task analysis
Perturbation methods
Neural networks
Training
Adversarial attacks
fingerprint copy-move attack
joint feature-based auto-learning attack
relation mismatch
Adversarial Perturbation Defense on Deep Neural Networks
期刊论文
ACM COMPUTING SURVEYS, 2021, 卷号: 54, 期号: 8, 页码: 36
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Mao, Wenji
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2021/12/28
Adversarial perturbation defense
deep neural networks
security
origin
A Spread Spectrum Based Audio Watermarking Method with Embedding Positions Adaption Using Predominant Local Pulse Extraction
会议论文
Beijing, China, November 18-21, 2021
作者:
Shiqiang Wu
;
Ying Huang
;
Hu Guan
;
Shuwu Zhang
;
Jie Liu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/04/08
An Improved Robust Digital Image Watermarking Algorithm based on two-level DCT
会议论文
Beijing, China, November 18-21, 2021
作者:
Huijuan Guo
;
Baoning Niu
;
Ying Huang
;
Hu Guan
;
Fangpeng Lan
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/04/08
©版权所有 ©2017 CSpace - Powered by
CSpace