×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [9]
自动化研究所 [9]
清华大学 [6]
厦门大学 [5]
兰州理工大学 [4]
华南理工大学 [4]
更多...
内容类型
期刊论文 [43]
会议论文 [8]
其他 [5]
学位论文 [5]
SCI/SSCI论文 [1]
会议 [1]
更多...
发表日期
2023 [1]
2022 [4]
2021 [5]
2020 [2]
2019 [5]
2018 [2]
更多...
学科主题
Computer S... [1]
Physics [1]
radio syst... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共64条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:
Li Duan
;
Yangyang Sun
;
Wei Ni
;
Weiping Ding
;
Jiqiang Liu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/07/20
Blockchain
cross-chain
defense
distributed private key control
hash-locking
notary
security threats
sidechain/relay
Monte Carlo-based reinforcement learning control for unmanned aerial vehicle systems
期刊论文
NEUROCOMPUTING, 2022, 卷号: 507, 页码: 282-291
作者:
Wei, Qinglai
;
Yang, Zesheng
;
Su, Huaizhong
;
Wang, Lijian
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2022/09/19
Reinforcement learning
Adaptive dynamic programming (ADP)
UAV control
Monte Carlo simulation
Neural networks
VGN: Value Decomposition With Graph Attention Networks for Multiagent Reinforcement Learning
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2022, 页码: 14
作者:
Wei, Qinglai
;
Li, Yugu
;
Zhang, Jie
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/07/25
Mathematical models
Task analysis
Games
Q-learning
Neural networks
Behavioral sciences
Training
Deep learning
graph attention networks (GATs)
multiagent systems
reinforcement learning
Survey of Industrial Control Systems Security
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 卷号: 59, 期号: 5, 页码: 1035-1053
作者:
Yang, Ting
;
Zhang, Jiayuan
;
Huang, Zaiqi
;
Chen, Yujie
;
Huang, Chenglong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/08/09
Computer architecture
Control systems
Digital devices
Firmware
Industrial research
Industrial water treatment
Internet of things
Network architecture
Network security
Attack
Communications security
Control system security
Countermeasure
Digital technologies
Energy
Industrial control system security
Industrial control systems
Manufacturing industries
Security research
Perturbation Inactivation Based Adversarial Defense for Face Recognition
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 2947-2962
作者:
Ren, Min
;
Zhu, Yuhao
;
Wang, Yunlong
;
Sun, Zhenan
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/11/14
Face recognition
Perturbation methods
Robustness
Immune system
Principal component analysis
Deep learning
Training
Adversarial machine learning
deep learning
graph neural network
face recognition
Adversarial Analysis for Source Camera Identification
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 11, 页码: 4174-4186
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Dai, Xiaorui
;
Li, Yi
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2021/12/28
Cameras
Feature extraction
Forensics
Task analysis
Perturbation methods
Neural networks
Training
Adversarial attacks
fingerprint copy-move attack
joint feature-based auto-learning attack
relation mismatch
Design and Analysis of a Human-Machine Interaction System for Researching Human's Dynamic Emotion
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 卷号: 51, 期号: 10, 页码: 6111-6121
作者:
Sun, Xiao
;
Pei, Zhengmeng
;
Zhang, Chen
;
Li, Guoqiang
;
Tao, Jianhua
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2021/11/04
Heuristic algorithms
Hidden Markov models
Robots
Sun
Vehicle dynamics
Task analysis
Deep learning
Emotional guidance
emotional transfer
human-machine interaction
Markov chain Monte Carlo
Are You Confident That You Have Successfully Generated Adversarial Examples?
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Wei, Fei
;
Qin, Zhan
收藏
  |  
浏览/下载:69/0
  |  
提交时间:2021/08/15
Perturbation methods
Iterative methods
Computational modeling
Neural networks
Security
Training
Robustness
Deep neural networks
adversarial examples
structural black box
buffer
Integrated security control method for industrial cyber-physical system with attack and fault
期刊论文
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2021, 卷号: 55, 期号: 6, 页码: 1185-1198
作者:
Li, Wei
;
Zhang, Jian-Jun
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/02/17
Actuators
Computation theory
Cyber Physical System
Design
Embedded systems
Fault tolerance
Network security
Numerical methods
Communication resources
Communication schemes
Computing resource
Conservative technologies
Estimation results
False data injection
Integrated security control
Lyapunov stability theory
Characteristic Insights on Industrial Cyber Security and Popular Defense Mechanisms
期刊论文
CHINA COMMUNICATIONS, 2021, 卷号: 18, 期号: 1, 页码: 130-150
作者:
Wan M(万明)
;
Li JW(李嘉玮)
;
Liu Y(刘颖)
;
Zhao JM(赵剑明)
;
Wang, Jiushuang
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/03/14
industrial cyber threats
industrial characteristics
vulnerabilities
security mechanisms and viewpoints
©版权所有 ©2017 CSpace - Powered by
CSpace