×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
西安交通大学 [5]
兰州理工大学 [4]
湖南大学 [3]
大连理工大学 [2]
自动化研究所 [2]
山东大学 [2]
更多...
内容类型
期刊论文 [13]
会议论文 [9]
学位论文 [2]
会议 [1]
发表日期
2022 [2]
2019 [3]
2018 [4]
2017 [2]
2016 [1]
2015 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共25条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Novel Optical Frequency-Hopping Scheme Using Dual Drive Mach-Zehnder Modulator
期刊论文
IEEE PHOTONICS JOURNAL, 2022, 卷号: 14, 期号: 1
作者:
Jin, Ya
;
Chen, Shaokang
;
Xie, Zhuang
;
Zhai, Kunpeng
;
Xu, Changda
收藏
  |  
浏览/下载:78/0
  |  
提交时间:2022/02/07
Optical fiber dispersion
Optical fibers
Frequency shift keying
Optical fiber networks
Amplitude modulation
Optical modulation
Fiber gratings
Dual drive Mach-Zehnder modulator
optical frequency hopping
physical layer security
secure transmission
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Research on secure routing technology based on NDN for VANET
会议论文
Hong Kong, Hong kong, June 1, 2019 - June 3, 2019
作者:
Gai, Xiaowei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/11/15
Cryptography
Distributed computer systems
Dynamics
Floods
Memory architecture
Mobile security
Mobile telecommunication systems
Network architecture
Network routing
Signal processing
Transmission control protocol
Vehicular ad hoc networks
Data network
Forward-secure
Identity based cryptography
Named data networkings
Network environments
Security requirements
Trust values
Wireless mobile networks
Secure probabilistic caching in random multi-user multi-UAV relay networks
期刊论文
PHYSICAL COMMUNICATION, 2019, 卷号: 32, 页码: 31-40
作者:
Shi, Fang
;
Xia, Junjuan
;
Na, Zhenyu
;
Liu, Xin
;
Ding, Yunfei
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2019/12/02
Secure probabilistic caching strategy
Multiple users
Multiple eavesdroppers
Secure transmission
Poisson point process
Secure Transmission via Joint Precoding Optimization for Downlink MISO NOMA
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 卷号: 68, 页码: 7603-7615
作者:
Zhao, Nan
;
Li, Dongdong
;
Liu, Mingqian
;
Cao, Yang
;
Chen, Yunfei
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2019/12/02
Joint precoding optimization
NOMA
secure transmission
successive interference cancellation
Secure transmission for GPQSM system exploiting artificial noise and signal space diversity
会议论文
作者:
Xu, Jing
;
Zhang, Ya
;
Ren, Pinyi
;
Gao, Zhenzhen
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/11/19
Artificial noise
Diversity order
Multiple input multiple output system
Optimal power allocation
Physical layer security
Secure transmission
Signal-space diversity
Spatial modulations
Fountain-coding aided symmetrical encryption for secure wireless transmission
会议论文
作者:
Lyu, Chao
;
Ren, Pinyi
;
Du, Qinghe
;
Sun, Li
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/11/19
Eavesdropper
Encryption schemes
Fading characteristics
Fountain codes
Legitimate channels
Secret key
Secure transmission
Wireless transmissions
Multiple Antennas Secure Transmission Under Pilot Spoofing and Jamming Attack
期刊论文
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 卷号: 36, 页码: 860-876
作者:
Wang, Hui-Ming
;
Huang, Ke-Wen
;
Tsiftsis, Theodoros A.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/11/26
pilot spoofing attack
channel estimation
Physical layer security
secure transmission
jamming attack
Mosaic secret-fragment-visible data hiding for secure image transmission based on two-step energy matching
期刊论文
DIGITAL SIGNAL PROCESSING, 2018, 卷号: Vol.81, 页码: 173-185
作者:
Yin, JJ
;
Ou, B
;
Liu, X
;
Peng, F
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/26
Secure image transmission
Secret-fragment-visible data hiding
Energy function
Two-step matching
Design and ARM-embedded implementation of a chaotic secure communication scheme based on H.264 selective encryption
期刊论文
NONLINEAR DYNAMICS, 2017, 卷号: 89, 期号: 3, 页码: 1949-1965
作者:
Zhang, Xiaoyang
;
Yu, Simin
;
Chen, Ping
;
Lu, Jinhu
;
He, Jianbin
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2018/07/30
Video chaotic secure communication
H.264 selective encryption
Multi-coremulti-process
ARM
WAN remote transmission
©版权所有 ©2017 CSpace - Powered by
CSpace