CORC

浏览/检索结果: 共2024条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Tubule system of earliest shells as a defense against increasing microbial attacks 期刊论文
ISCIENCE, 2024, 卷号: 27, 期号: 3, 页码: 13
作者:  Li, Luoyang;  Topper, Timothy P.;  Betts, Marissa J.;  Altanshagai, Gundsambuu;  Enkhbaatar, Batktuyag
收藏  |  浏览/下载:0/0  |  提交时间:2024/05/15
Daqing formula ameliorated allergic asthma and airway dysbacteriosis in mice challenged with ovalbumin and ampicillin 期刊论文
JOURNAL OF ETHNOPHARMACOLOGY, 2024, 卷号: 318
作者:  Wu, Li-ren;  Peng, Qian-Yu;  Li, Xue-Jian;  Guo, Mei-Ying;  He, Jia-Qi
收藏  |  浏览/下载:12/0  |  提交时间:2023/11/10
Surveillance Face Anti-Spoofing 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 1535-1546
作者:  Fang, Hao;  Liu, Ajian;  Wan, Jun;  Escalera, Sergio;  Zhao, Chenxu
收藏  |  浏览/下载:3/0  |  提交时间:2024/02/22
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 851-865
作者:  Jing Zhou;  Jun Shang;  Tongwen Chen
收藏  |  浏览/下载:1/0  |  提交时间:2024/03/18
Side Information-Based Stealthy False Data Injection Attacks Against Multi-Sensor Remote Estimation 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 1054-1056
作者:  Haibin Guo;  Zhong-Hua Pang;  Chao Li
收藏  |  浏览/下载:1/0  |  提交时间:2024/03/18
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:  Qingsong Zhao;  Lei Shu;  Kailiang Li;  Mohamed Amine Ferrag;  Ximeng Liu
收藏  |  浏览/下载:3/0  |  提交时间:2024/01/02
Non-Deterministic Liveness-Enforcing Supervisor Tolerant to Sensor-Reading Modification Attacks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 240-248
作者:  Dan You;  Shouguang Wang
收藏  |  浏览/下载:1/0  |  提交时间:2024/01/02
Protocol-Based Non-Fragile State Estimation for Delayed Recurrent Neural Networks Subject to Replay Attacks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 249-251
作者:  Fan Yang;  Hongli Dong;  Yuxuan Shen;  Xuerong Li;  Dongyan Dai
收藏  |  浏览/下载:1/0  |  提交时间:2024/01/02
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples 期刊论文
NEUROCOMPUTING, 2023, 卷号: 551, 页码: 11
作者:  Zhao, Mengnan;  Wang, Bo;  Guo, Weikuo;  Wang, Wei
收藏  |  浏览/下载:1/0  |  提交时间:2023/11/17
Towards Better Word Importance Ranking in Textual Adversarial Attacks 会议论文
Gold Coast, Australia, June 18-23, 2023
作者:  Shi, Jiahui;  Li, Linjing;  Zeng, Daniel Dajun
收藏  |  浏览/下载:12/0  |  提交时间:2023/09/27


©版权所有 ©2017 CSpace - Powered by CSpace