×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [26]
北京大学 [23]
清华大学 [20]
数学与系统科学研究... [14]
厦门大学 [10]
山东大学 [10]
更多...
内容类型
期刊论文 [119]
会议论文 [31]
学位论文 [16]
其他 [13]
发表日期
2022 [4]
2021 [3]
2020 [3]
2019 [2]
2018 [10]
2017 [13]
更多...
学科主题
Mathematic... [3]
Computer S... [2]
Computer S... [1]
Computer S... [1]
Computer T... [1]
Electrical... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共179条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Efficient implementation of high-order WENO schemes with sharing function for solving Euler equations
期刊论文
COMPUTERS & FLUIDS, 2023, 卷号: 251, 页码: 9
作者:
Liu, Shengping
;
Shen YQ(申义庆)
;
Guo, Shaodong
;
Yong, Heng
;
Ni, Guoxi
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/02/03
Euler equations
WENO
Sharing function
Common-weights
APRIL: Finding the Achilles' Heel on Privacy for Vision Transformers
会议论文
New Orleans, Louisiana, USA, 2022-6
作者:
Jiahao, Lu
;
Xi Sheryl, Zhang
;
Tianli, Zhao
;
Xiangyu, He
;
Jian Cheng
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/06/23
Trustworthy AI
Privacy-preserving machine learning
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Performance analysis of cooperative cognitive radio networks based on hybrid NOMA/OMA and best relay selection
期刊论文
IET Communications, 2022
作者:
Li, Suoping
;
Liang, Wenwu
;
Xu, Qianyu
;
Yang, Nana
;
Jia, Kejun
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2022/09/22
Cognitive radio
Decoding
Error correction
Outages
Cooperative Cognitive Radio Networks
Cooperative schemes
Multiple access
Network-based
Non-orthogonal
Performances analysis
Retransmissions
Secondary networks
Secondary user
Superimposed signal
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
Blockchain Data Sharing Scheme Based on Searchable Agent Re-encryption
期刊论文
International Journal of Network Security, 2021, 卷号: 23, 期号: 3, 页码: 535-544
作者:
Feng, Tao
;
Pei, Hongmei
;
Xie, Pengshoou
;
Feng, Xiaoqing
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Access control
Blockchain
Data privacy
Data Sharing
Digital storage
Query processing
External database
Privacy disclosures
Proxy encryptions
Proxy re encryptions
Searchable encryptions
Searchable proxy re encryptions
Sharing schemes
Transaction information
Blockchain-Assisted Secure Fine-Grained Searchable Encryption for a Cloud-Based Healthcare Cyber-Physical System
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1877-1890
作者:
null Mamta
;
Brij B. Gupta
;
Kuan-Ching Li
;
Victor C. M. Leung
;
Kostas E. Psannis
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2021/09/03
Cloud-based cyber-physical systems (CCPS)
data encryption
healthcare information search and retrieval
keyword search
public-key cryptosystems
searchable encryption
A Two-Layered Incentive Scheme for Cooperation in Sliced 5G D2D Networks
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 卷号: 69, 期号: 11, 页码: 13289-13304
作者:
Sun, Qian
;
Tian, Lin
;
Zhou, Yiqing
;
Shi, Jinglin
;
Wang, Yuanyuan
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/12/01
Device-to-device communication
Incentive schemes
Relays
Throughput
Indexes
5G mobile communication
Resource management
D2D cooperation
incentive resource allocation
network slicing
slice isolation
Decision-Making in Driver-Automation Shared Control: A Review and Perspectives
期刊论文
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2020, 卷号: 7, 期号: 5, 页码: 1289-1307
作者:
Wang, Wenshuo
;
Na, Xiaoxiang
;
Cao, Dongpu
;
Gong, Jianwei
;
Xi, Junqiang
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2020/09/07
Automated vehicle
decision-making
human driver
human-vehicle interaction
shared control
©版权所有 ©2017 CSpace - Powered by
CSpace