×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [5]
兰州理工大学 [3]
自动化研究所 [3]
深圳先进技术研究院 [1]
内容类型
会议论文 [12]
发表日期
2022 [2]
2019 [1]
2018 [1]
2015 [2]
2014 [2]
2013 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共12条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
IrisGuard: Image Forgery Detection for Iris Anti-spoofing
会议论文
Beijing, 2022.12.11-2022.12.13
作者:
Zhuo, Wenqi
;
Wang, Wei
;
Zhang, Hui
;
Dong, Jing
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/05/31
iris anti-spoofing
image forgery detection
privacy protection
DPNAS: Neural Architecture Search for Deep Learning with Differential Privacy
会议论文
线上, 2022-2
作者:
Cheng AD(程安达)
;
Wang JX(王家兴)
;
Zhang X(张希)
;
Chen Q(谌强)
;
Wang PS(王培松)
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2023/06/05
Distant Supervised Centroid Shift: A Simple and Efficient Approach to Visual Domain Adaptation
会议论文
USA, 2019
作者:
Jian Liang
;
Ran He
;
Zhenan Sun
;
Tieniu Tan
收藏
  |  
浏览/下载:109/0
  |  
提交时间:2019/06/10
Domain Adaptation
LBS privacy protection technology based on searchable encryption mechanism
会议论文
Beijing, China, May 25, 2018 - May 27, 2018
作者:
Feng, Tao
;
Wang, Xudong
;
Li, Xinghua
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2020/11/15
Cryptography
Global positioning system
Information services
Location
Manufacture
Search engines
Telecommunication services
Wireless sensor networks
Location privacy protection
Mobile communication networks
Mobile intelligent terminals
Positioning technologies
Privacy protection model
Search information
Searchable encryptions
Security properties
Secure Network Coding-Based Named Data Network Mutual Anonymity communication Protocol
会议论文
作者:
Feng Tao
;
Xing Fei
;
Lu Ye
;
Fang Jun Li
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2019/11/15
NDN
mutual anonymity
anonymous routing
network coding
authentication mechanism
Research on Cloud-Based LBS and Location Privacy Protection
会议论文
作者:
Yan, Yan
;
Wang, Wan Jun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/11/15
Mobile Cloud Computing
Location-Based Services
Location privacy
Confidentiality
Completeness
Cryptographic Implementation of RSA for Ion Fault Injection Attack
会议论文
IEEE 11th Consumer Communications and Networking Conference (CCNC), Las Vegas, NV
作者:
Shao Cuiping
;
Li Huiyun
;
Zhang Xiaolong
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2015/09/01
Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets
会议论文
19th Australasian Conference on Information Security and Privacy, ACISP 2014, Wollongong, NSW, Australia, July 7, 2014 - July 9, 2014
Zhong, Xiao (1)
;
Wang, Mingsheng (3)
;
Zhang, Bin (1)
;
Wu, Shengbao (1)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2014/12/16
fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures
会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Chen Cheng
;
Chen Jie
;
Lim Hoon Wei
;
Zhang Zhenfeng
;
Feng Dengguo
;
Ling San
;
Wang Huaxiong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2013/09/22
Concrete construction
Concretes
Network security
Cryptanalysis of Helix and Phelix revisited
会议论文
18th Australasian Conference on Information Security and Privacy, ACISP 2013, Brisbane, QLD, Australia, July 1, 2013 - July 3, 2013
Shi, Zhenqing (1)
;
Zhang, Bin (2)
;
Feng, Dengguo (1)
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2014/12/16
©版权所有 ©2017 CSpace - Powered by
CSpace