×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
湖南大学 [17]
四川大学 [12]
厦门大学 [11]
兰州理工大学 [8]
清华大学 [6]
北京航空航天大学 [6]
更多...
内容类型
期刊论文 [58]
会议论文 [27]
学位论文 [18]
其他 [1]
发表日期
2021 [3]
2020 [6]
2019 [6]
2018 [2]
2017 [3]
2016 [16]
更多...
学科主题
Astronomy ... [1]
Computer S... [1]
Physics [1]
computer s... [1]
electrical... [1]
应用心理学 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共104条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Dryland Food Security in Ethiopia: Current Status, Opportunities, and a Roadmap for the Future
期刊论文
SUSTAINABILITY, 2021, 卷号: 13, 期号: 11, 页码: 10
作者:
Peng, Yu
;
Hirwa, Hubert
;
Zhang, Qiuying
;
Wang, Guoqin
;
Li, Fadong
收藏
  |  
浏览/下载:50/0
  |  
提交时间:2021/08/19
drylands
Ethiopia
food security
resilience
Integrated security control method for industrial cyber-physical system with attack and fault
期刊论文
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2021, 卷号: 55, 期号: 6, 页码: 1185-1198
作者:
Li, Wei
;
Zhang, Jian-Jun
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/02/17
Actuators
Computation theory
Cyber Physical System
Design
Embedded systems
Fault tolerance
Network security
Numerical methods
Communication resources
Communication schemes
Computing resource
Conservative technologies
Estimation results
False data injection
Integrated security control
Lyapunov stability theory
Decomposed Meta Batch Normalization for Fast Domain Adaptation in Face Recognition
期刊论文
IEEE Transactions on Information Forensics and Security, 2021, 卷号: 16, 期号: -, 页码: 3082-3095
作者:
Guo JZ(郭建珠)
;
Zhu XY(朱翔昱)
;
Lei Z(雷震)
;
Li ZQ(李子青)
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2021/05/31
Face recognition
unsupervised domain adaptation
meta-learning
batch normalization
Risk perception and intelligent decision in complex social information network
期刊论文
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2020, 页码: 12
作者:
Wu, Desheng
;
Song, Jingxiu
;
Bian, Yuan
;
Zheng, Xiaolong
;
Zhang, Zhu
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2021/03/08
Complex information network
Risk perception
Intelligent decision making
Integrated platform
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
The design of large scale IP address and port scanning tool
期刊论文
Sensors (Switzerland), 2020, 卷号: 20, 期号: 16, 页码: 1-12
作者:
Yuan, Chao
;
Du, Jinze
;
Yue, Min
;
Ma, Tao
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/14
Computer viruses
Heavy ions
Linear accelerators
Network security
Scanning
Transmission control protocol
Viruses
Accelerator system
Control network
Development needs
Graphic displays
Heavy-ion accelerator
Rapid expansion
Security situation
Stable operation
The Design of Large Scale IP Address and Port Scanning Tool
期刊论文
SENSORS, 2020, 卷号: 20, 期号: 16, 页码: 12
作者:
Yuan, Chao
;
Du, Jinze
;
Yue, Min
;
Ma, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/12/15
port scanning
HIRFL
Golang
GTK
TCP
The China-Pakistan economic corridor: The Pakistani media attitudes perspective
期刊论文
TECHNOLOGY IN SOCIETY, 2020, 卷号: 62, 期号: 62, 页码: 101303
作者:
Qianqian Li
;
Yijun Liu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/01/16
文本挖掘
复杂网络
媒体信息价值挖掘
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles
会议论文
Hohhot, China, July 17, 2020 - July 20, 2020
作者:
Xie, Peng-shou
;
Han, Xue-ming
;
Feng, Tao
;
Yan, Yan
;
Ma, Guo-qiang
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/15
Artificial intelligence
Data privacy
Fuzzy sets
Road vehicles
Roads and streets
Vehicle to vehicle communications
Fuzzy algorithms
K-Anonymity
L diversities
Location privacy protection
Protection algorithms
Road network
Time complexity
Voronoi diagrams
Distribution Network Security Situation Awareness Method Based on Security Distance
期刊论文
IEEE ACCESS, 2019, 卷号: Vol.7, 页码: 37855-37864
作者:
Xiao, J.
;
Zhang, B.
;
Luo, F.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/21
©版权所有 ©2017 CSpace - Powered by
CSpace