×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
地理科学与资源研究... [16]
沈阳自动化研究所 [15]
自动化研究所 [10]
兰州理工大学 [8]
计算技术研究所 [7]
新疆理化技术研究所 [3]
更多...
内容类型
期刊论文 [58]
会议论文 [9]
学位论文 [4]
专利 [2]
发表日期
2020 [73]
学科主题
Energy & F... [1]
Environmen... [1]
Green & Su... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共73条,第1-10条
帮助
限定条件
发表日期:2020
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Risk perception and intelligent decision in complex social information network
期刊论文
INDUSTRIAL MANAGEMENT & DATA SYSTEMS, 2020, 页码: 12
作者:
Wu, Desheng
;
Song, Jingxiu
;
Bian, Yuan
;
Zheng, Xiaolong
;
Zhang, Zhu
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2021/03/08
Complex information network
Risk perception
Intelligent decision making
Integrated platform
内部人员异常行为检测分析及在金融领域的应用
学位论文
博士, 北京: 中国科学院大学, 2020
作者:
刘堃
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/01/05
内部威胁
规范建模
行为挖掘
异常检测
复杂事件
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
Long Live TIME: Improving Lifetime and Security for NVM-Based Training-in-Memory Systems
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4707-4720
作者:
Cai, Yi
;
Lin, Yujun
;
Xia, Lixue
;
Chen, Xiaoming
;
Han, Song
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/12/01
Gradient sparsification
lifetime
neural networks
training-in-memory
wear-leveling
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Quantitative reconfigurability evaluation method of actuator for quadrotor UAV
期刊论文
Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2020, 卷号: 46, 期号: 11, 页码: 2077-2086
作者:
Shen, Fuyuan
;
Li, Wei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2022/02/17
Actuators
Antennas
Linear systems
Nonlinear systems
Accurate estimation
Actuator saturations
Continuous improvements
Control strategies
Controlled objects
Mahalanobis distances
Quantitative evaluation methods
Strong nonlinearity
Energy Based Optimal Dynamic Stealth False Data Injection Attacks on the Smart Grid
会议论文
Guangzhou, China, 2020.11.13-15
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/06/29
smart grid, security, false data injection attack, optimal control
Multi-scenario simulation of desertification in North China for 2030
期刊论文
LAND DEGRADATION & DEVELOPMENT, 2020, 页码: 15
作者:
Xu, Duanyang
;
Zhang, Xiaoyu
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2021/03/16
2030
desertification
model
North China
system dynamics
Intelligent city intelligent medical sharing technology based on internet of things technology
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 卷号: 111, 页码: 226-233
作者:
Zhao, Xin
;
Xiao, Wei
;
Wu, Lu
;
Zhao, Zhigang
;
Huo, Jidong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Internet of things
Intelligent city
Intelligent medical sharing
Data encryption
Information security
©版权所有 ©2017 CSpace - Powered by
CSpace