×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业... [612]
清华大学 [466]
西安交通大学 [257]
湖南大学 [187]
山东大学 [185]
武汉大学 [165]
更多...
内容类型
期刊论文 [3351]
发表日期
2022 [28]
2021 [50]
2020 [62]
2019 [218]
2018 [318]
2017 [254]
更多...
学科主题
Computer ... [26]
Informati... [10]
agronomy [5]
Engineerin... [4]
Environmen... [4]
Telecommun... [4]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共3351条,第1-10条
帮助
限定条件
内容类型:期刊论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:
Qingsong Zhao
;
Lei Shu
;
Kailiang Li
;
Mohamed Amine Ferrag
;
Ximeng Liu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/01/02
Challenges
Internet of Things (IoT)
privacy and security
security requirements
solar insecticidal lamps (SIL)
Novel methods for locating and matching IC cells based on standard cell libraries
期刊论文
MICROELECTRONIC ENGINEERING, 2024, 卷号: 283, 页码: 12
作者:
Liu, Can
;
Wang, Kaige
;
Li, Qing
;
Zhao, Fazhan
;
Zhao, Kun
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2024/02/22
Reverse engineering
Integrated circuits
Scanning electron microscopy
Image processing
Hardware security
Digger: A Graph Contraction Algorithm for Patrolling Games
期刊论文
IEEE TRANSACTIONS ON RELIABILITY, 2023, 页码: 13
作者:
Han, Jinpeng
;
Wang, Zhen
;
Chen, Xiaoguang
;
Yang, Manzhi
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/02/22
Games
Security
Game theory
Resource management
Runtime
Roads
Cyberspace
Graph contraction
minimum vertex cut
patrolling game
security game
Stackelberg game
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples
期刊论文
NEUROCOMPUTING, 2023, 卷号: 551, 页码: 11
作者:
Zhao, Mengnan
;
Wang, Bo
;
Guo, Weikuo
;
Wang, Wei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2023/11/17
Security
Cross-modal
Image captioning
Adversarial attacks
Federated Learning with Privacy-preserving and Model IP-right-protection
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 19-37
作者:
Qiang Yang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/01/18
Federated learning
privacy-preserving machine learning
security
decentralized learning
intellectual property protection
Detecting Vulnerability on IoT Device Firmware: A Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
作者:
Xiaotao Feng
;
Xiaogang Zhu
;
Qing-Long Han
;
Wei Zhou
;
Sheng Wen
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2023/01/03
Firmware emulation
internet of things (IoT) firmware
network fuzzing
security
static analysis
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:
Li Duan
;
Yangyang Sun
;
Wei Ni
;
Weiping Ding
;
Jiqiang Liu
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/07/20
Blockchain
cross-chain
defense
distributed private key control
hash-locking
notary
security threats
sidechain/relay
OTB-morph: One-time Biometrics via Morphing
期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 6, 页码: 855-871
作者:
Mahdi Ghafourian, Julian Fierrez, Ruben Vera-Rodriguez, Aythami Morales, Ignacio Serna
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/11/29
Biometrics, face recognition, template protection, morphing, security
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement
期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:
Zhao, Pengfei
;
Li, Shuangqi
;
Hu, Paul Jen-Hwa
;
Cao, Zhidong
;
Gu, Chenghong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/11/14
Transportation
Computer crime
Renewable energy sources
Smart cities
Vehicle-to-grid
Uncertainty
Turbines
Cyber-attack
cyber security
electric vehicle
false data injection attacks
multi-energy system
smart city manage-ment
social effort
©版权所有 ©2017 CSpace - Powered by
CSpace