×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [13]
湖南大学 [10]
北京大学 [9]
清华大学 [5]
深圳先进技术研究院 [5]
山东大学 [5]
更多...
内容类型
期刊论文 [45]
会议论文 [19]
其他 [6]
学位论文 [5]
发表日期
2021 [3]
2020 [1]
2019 [5]
2018 [5]
2017 [8]
2016 [7]
更多...
学科主题
计算机科学技术其他学... [3]
计算机科学技术基础学... [3]
Computer S... [1]
应用心理学 [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共75条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
An ACP-Based Parallel Approach for Color Image Encryption Using Redundant Blocks
期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 页码: 16
作者:
Zheng, Wenbo
;
Yan, Lan
;
Gou, Chao
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/01/27
Encryption
DNA
Color
Resists
Computational modeling
Image coding
Complex systems
Artificial image and parallel execution (ACP) method
color image encryption
computational experiment
image division block
parallel computing
Security and Efficient Authentication Scheme for Mobile Edge Computing
期刊论文
Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2021, 卷号: 44, 期号: 1, 页码: 110-116
作者:
Xue, Jian-Bin
;
Bai, Zi-Mei
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/06/03
Authentication
Computer terminals
Cryptography
Edge computing
Mobile telecommunication systems
Security systems
Authentication scheme
Computing environments
Efficient authentication
Lightweight identity authentication protocol
Man in the middle attacks
Mutual authentication
Physical layer security
Symmetric crypto systems
Detecting False Data Injection Attacks Using Canonical Variate Analysis in Power Grid
期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 卷号: 8, 期号: 2, 页码: 971-983
作者:
Pei C(裴超)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2021/08/03
Adversarial attack and defense
artificial intelligence security
attack detection
canonical variate analysis
cyber security
false data injection attack (FDIA)
smart grid
state estimation
Reinforcement Learning-Based Mobile Offloading for Edge Computing Against Jamming and Interference
期刊论文
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 卷号: 68, 期号: 10, 页码: 6114-6126
作者:
Xiao, Liang
;
Lu, Xiaozhen
;
Xu, Tangwei
;
Wan, Xiaoyue
;
Ji, Wen
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2020/12/10
Task analysis
Mobile handsets
Edge computing
Computational modeling
Interference
Energy consumption
Jamming
Mobile offloading
edge computing
interference
jamming
reinforcement learning
Towards secure industrial iot: Blockchain system with credit-based consensus mechanism
期刊论文
IEEE Transactions on Industrial Informatics, 2019, 卷号: 15, 期号: 6, 页码: 3680-3689
作者:
Zeng P(曾鹏)
;
Huang, Junqin
;
Kong LH(孔令和)
;
Chen, Guihai
;
Wu, Min-You
收藏
  |  
浏览/下载:84/0
  |  
提交时间:2019/06/29
Blockchain
credit-based
directed acyclic graph (DAG)
efficiency
industrial IoT (IIoT)
privacy
proof-of-work (PoW)
security
Analysis of Electrical Coordinated Cyber Physical Attacks Under Goal Conflict
期刊论文
Dianwang Jishu/Power System Technology, 2019, 卷号: 43, 期号: 7
作者:
Tian, Meng
;
Dong, Zhengcheng
;
Wang, Xianpei
;
Zhao, Le
;
Jian, Zini
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2019/12/05
Vulnerability analysis of cascading dynamics in smart grids under load redistribution attacks
期刊论文
INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2019, 卷号: 111
作者:
Lee, Lily
;
Hu, Po
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2019/12/05
Smart grids
Cyber-physical system
Complex network
False data injection attack
Load redistribution attack
Cascading failures
False Data Injection Attacks Induced Sequential Outages in Power Systems
期刊论文
IEEE Transactions on Power Systems, 2019, 卷号: Vol.34 No.2, 页码: 1513-1523
作者:
Liang Che
;
Xuan Liu
;
Zuyi Li
;
Yunfeng Wen
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/13
Load modeling
Generators
Smart grids
Integrated circuits
Cyberattack
Cyber-attack
false data injection attacks
sequential outage
contingency analysis
power systems
False Data Injection Attacks Induced Sequential Outages in Power Systems
期刊论文
IEEE TRANSACTIONS ON POWER SYSTEMS, 2019, 卷号: Vol.34 No.2, 页码: 1513-1523
作者:
Che, L
;
Liu, X
;
Li, ZY
;
Wen, YF
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/12/17
Cyber-attack
false data injection attacks
sequential outage
contingency analysis
power systems
Stability analysis of token-based wireless networked control systems under deception attacks
期刊论文
INFORMATION SCIENCES, 2018, 卷号: 459, 页码: 168-182
作者:
Du, Dajun[1]
;
Zhang, Changda[2]
;
Wang, Haikuan[3]
;
Li, Xue[4]
;
Hu, Huosheng[5]
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/04/22
Deception attacks
Token-based protocol
Kalman filter
Wireless networked control systems
Switched systems
©版权所有 ©2017 CSpace - Powered by
CSpace