×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [20]
北京大学 [13]
清华大学 [9]
软件研究所 [8]
计算技术研究所 [6]
兰州理工大学 [5]
更多...
内容类型
期刊论文 [85]
会议论文 [17]
学位论文 [9]
其他 [8]
发表日期
2023 [7]
2022 [5]
2021 [11]
2020 [5]
2019 [4]
2018 [5]
更多...
学科主题
计算机科学技术基础学... [3]
计算机系统结构::计... [3]
计算机软件::操作系... [3]
计算机软件::程序设... [3]
计算机软件::编译系... [3]
Plant Scie... [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共119条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Daqing formula ameliorated allergic asthma and airway dysbacteriosis in mice challenged with ovalbumin and ampicillin
期刊论文
JOURNAL OF ETHNOPHARMACOLOGY, 2024, 卷号: 318
作者:
Wu, Li-ren
;
Peng, Qian-Yu
;
Li, Xue-Jian
;
Guo, Mei-Ying
;
He, Jia-Qi
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/11/10
Lung dysbiosis
Th1/Th2 balance
Antibiotic
GSK-3 ss
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:
Qingsong Zhao
;
Lei Shu
;
Kailiang Li
;
Mohamed Amine Ferrag
;
Ximeng Liu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/01/02
Challenges
Internet of Things (IoT)
privacy and security
security requirements
solar insecticidal lamps (SIL)
Coordinated Heat and Power Cyber-Attacks With Time Window Matching Strategy
期刊论文
IEEE TRANSACTIONS ON SMART GRID, 2023, 卷号: 14, 期号: 4, 页码: 2747-2761
作者:
Gu, Wei
;
Ding, Shixing
;
Lu, Shuai
;
Zhao, Pengfei
;
Zou, Dehu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/11/17
Cyber-attack
CPS
false data injection attacks
heating system
integrated energy system
Optimal Resource Allocation and Feasible Hexagonal Topology for Cyber-Physical Systems
期刊论文
Journal of Systems Science and Complexity, 2023, 页码: 1-26
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/06/29
Robust Monitor for Industrial IoT Condition Prediction
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2023, 卷号: 10, 期号: 10, 页码: 8618-8629
作者:
Zhang, Xingwei
;
Tian, Hu
;
Zheng, Xiaolong
;
Zeng, Daniel Dajun
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/11/17
Perturbation methods
Monitoring
Industrial Internet of Things
Training
Predictive models
Robustness
Temperature sensors
Adversarial perturbation
adversarial training
Industrial Internet of Things (IIoT)
machine learning (ML)
temporal convolutional network (TCN)
Curiosity-Driven and Victim-Aware Adversarial Policies
会议论文
Austin TX, USA, December 5-9, 2022
作者:
Gong C(龚晨)
;
Yang Z(杨洲)
;
Bai YP(白云鹏)
;
Shi JK(史杰克)
;
Sinha Arunesh
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2023/06/27
Deep Learning for Face Anti-Spoofing: A Survey
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5609-5631
作者:
Yu, Zitong
;
Qin, Yunxiao
;
Li, Xiaobai
;
Zhao, Chenxu
;
Lei, Zhen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2023/11/16
Face recognition
Deep learning
Cameras
Task analysis
Sensors
Protocols
Three-dimensional displays
Face anti-spoofing
presentation attack
deep learning
pixel-wise supervision
multi-modal
domain generalization
Detecting Vulnerability on IoT Device Firmware: A Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
作者:
Xiaotao Feng
;
Xiaogang Zhu
;
Qing-Long Han
;
Wei Zhou
;
Sheng Wen
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2023/01/03
Firmware emulation
internet of things (IoT) firmware
network fuzzing
security
static analysis
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:
Li Duan
;
Yangyang Sun
;
Wei Ni
;
Weiping Ding
;
Jiqiang Liu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/07/20
Blockchain
cross-chain
defense
distributed private key control
hash-locking
notary
security threats
sidechain/relay
Hashing Fake: Producing Adversarial Perturbation for Online Privacy Protection Against Automatic Retrieval Models
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2022, 页码: 11
作者:
Zhang, Xingwei
;
Zheng, Xiaolong
;
Mao, Wenji
;
Zeng, Daniel Dajun
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/11/14
Perturbation methods
Semantics
Computational modeling
Codes
Task analysis
Privacy
Software
Adversarial perturbation
deep neural network (DNN)
privacy protection
semantic retrieval
©版权所有 ©2017 CSpace - Powered by
CSpace