×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [7]
山东大学 [4]
湖南大学 [4]
中国农业科学院 [3]
河南大学 [3]
兰州大学 [2]
更多...
内容类型
期刊论文 [30]
会议论文 [7]
会议 [1]
发表日期
2022 [3]
2021 [2]
2020 [2]
2019 [3]
2018 [3]
2017 [2]
更多...
学科主题
农作物 [2]
Neuroscien... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共38条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Expert consensus on the diagnosis and treatment of NTRK gene fusion solid tumors in China
期刊论文
THORACIC CANCER, 2022
作者:
Xu, Chunwei
;
Si, Lu
;
Wang, Wenxian
;
Li, Ziming
;
Song, Zhengbo
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2022/12/22
fusion
precision medicine
solid tumor
targeted therapy
tyrosine receptor kinase
Study of the fast electron behavior in electron cyclotron current driven plasma on J-TEXT
期刊论文
Plasma Science and Technology, 2022, 卷号: 24
作者:
ZHANG,Xiaobo
;
YAN,Wei
;
CHEN,Zhongyong
;
FANG,Jiangang
;
ZHANG,Junli
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/12/22
fast electron
tokamak
electron cyclotron current drive
power deposition location
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Secure Data Collaborative Computing Scheme Based on Blockchain
期刊论文
Security and Communication Networks, 2021, 卷号: 2021
作者:
Feng, Tao
;
Wang, Xusheng
;
Liu, Chunyan
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/03/02
Blockchain
Digital storage
Electronic voting
Privacy by design
Anti collusions
Bloom filters
Data informations
Data storage
Secret sharing
Secure multi-party computation
Security datum
Verifiability
Group signature with time-bound keys and unforgeability of expiry time for smart cities
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1
作者:
Fang, Junli
;
Feng, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/06/03
Group signatures
Unforgeability of expiry time
Time-bound keys
Internet of things
Smart cities
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model
会议论文
Hohhot, China, July 17, 2020 - July 20, 2020
作者:
Feng, Tao
;
Dou, Manfang
;
Xie, Pengshou
;
Fang, Junli
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Artificial intelligence
Big data
Feature extraction
Intrusion detection
Classification accuracy
Classification results
Data characteristics
Ensemble classifiers
Ensemble modeling
Network intrusion detection
Network intrusions
Stacking framework
A spatial moving target recognition algorithm based on full information vector
会议论文
Xi'an, China, 2018-12-05
作者:
Du, Yun
;
Wen, Desheng
;
Liu, Guizhong
;
Yi, Hongwei
;
Liu, Meiying
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2019/04/02
A spatial moving target recognition algorithm based on full information vector
会议论文
作者:
Du, Yun
;
Wen, Desheng
;
Liu, Guizhong
;
Yi, Hongwei
;
Liu, Meiying
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/11/15
moving target
full information vector
recognition
Gauss distribution
Secure Sharing Model Based on Block Chain in Medical Cloud (Short Paper)
会议论文
London, United kingdom, August 19, 2019 - August 22, 2019
作者:
Feng, Tao
;
Jiao, Ying
;
Fang, Junli
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/15
Blockchain
Digital storage
Network security
Distributed environments
Medical cloud (MC)
Medical institutions
Privacy preserving
Provable security
Proxy re encryptions
Random Oracle model
Security analysis
©版权所有 ©2017 CSpace - Powered by
CSpace