×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [14]
武汉大学 [14]
兰州理工大学 [9]
北京航空航天大学 [9]
安徽大学 [8]
湖南大学 [7]
更多...
内容类型
期刊论文 [89]
会议论文 [30]
会议 [3]
其他 [3]
发表日期
2024 [1]
2023 [1]
2022 [3]
2021 [1]
2020 [3]
2019 [10]
更多...
学科主题
Electrical... [1]
Engineerin... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共125条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
FedBrain: A robust multi-site brain network analysis framework based on federated learning for brain disease diagnosis
期刊论文
NEUROCOMPUTING, 2023, 卷号: 559, 页码: 13
作者:
Zhang, Chang
;
Meng, Xiangzhu
;
Liu, Qiang
;
Wu, Shu
;
Wang, Liang
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/11/16
Functional magnetic resonance image
Brain network
Federated learning
Deep neural networks
Brain disease diagnosis
Quantum Fully Homomorphic Encryption by Integrating Pauli One-time Pad with Quaternions
期刊论文
QUANTUM, 2022, 卷号: 6, 页码: 45
作者:
Ma, Guangsheng
;
Li, Hongbo
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/02/07
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
期刊论文
JOURNAL OF MATHEMATICS, 2022, 卷号: 2022
作者:
Liu, Lei
;
Liu, Xue
;
Wan, Jiahua
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/12/23
Design of Embedded Ai Engine Based on the Microkernel Operating System
期刊论文
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 卷号: 2022, 页码: 9
作者:
Wang, Tun
;
Tian, Yu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2023/02/07
BCP-based joint delegation learning model and protocol
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 5, 页码: 137-148
作者:
Gao, Sheng
;
Xiang, Kang
;
Tian, Youliang
;
Tan, Weijie
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Crime
Cryptography
Data mining
Decision trees
Privacy by design
Random forests
Data mining process
Decision tree modeling
Entropy algorithms
Ho-momorphic encryptions
Horizontal distribution
Model construction
Performance analysis
Privacy protection
Searchable Encryption Cloud Storage with Dynamic Data Update to Support Efficient Policy Hiding
期刊论文
CHINA COMMUNICATIONS, 2020, 卷号: 17, 期号: 6, 页码: 153-163
作者:
Cao, Laicheng
;
Kang, Yifan
;
Wu, Qirui
;
Wu, Rong
;
Guo, Xian
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2022/03/01
cloud storage
dynamic update
keywords search
policy hidden
Privacy Preserving Solution for the Asynchronous Localization of Underwater Sensor Networks
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 6, 页码: 1511-1527
作者:
Haiyan Zhao
;
Jing Yan
;
Xiaoyuan Luo
;
Xinping Guan
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/03/11
Asynchronous clock
localization
privacy preservation
underwater sensor networks (USNs)
seIMC: A GSW-Based Secure and Efficient Integer Matrix Computation Scheme With Implementation
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 98383-98394
作者:
Bai, Yanan
;
Shi, Xiaoyu
;
Wu, Wenyuan
;
Chen, Jingwei
;
Feng, Yong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2020/08/24
Encryption
Data privacy
Cloud computing
Lattices
Machine learning
Computational efficiency
Homomorphic encryption
matrix computation
machine learning
GSW encryption scheme
big data
privacy protection
Algorithm of blockchain data provenance based on ABE
期刊论文
Tongxin Xuebao/Journal on Communications, 2019, 卷号: 40, 期号: 11, 页码: 101-111
作者:
Tian, Youliang
;
Yang, Kedi
;
Wang, Zuan
;
Feng, Tao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/14
Blockchain
Data privacy
Data Sharing
Information dissemination
Visibility
Attribute-based encryptions
Data provenance
Dynamic protections
Experimental simulations
Ho-momorphic encryptions
Privacy protection
Traceability information
Zero knowledge proof
©版权所有 ©2017 CSpace - Powered by
CSpace