×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
沈阳自动化研究所 [50]
北京大学 [42]
清华大学 [39]
上海电子信息职业技... [37]
软件研究所 [32]
厦门大学 [27]
更多...
内容类型
期刊论文 [211]
会议论文 [119]
学位论文 [55]
其他 [40]
专利 [15]
会议 [1]
更多...
发表日期
2022 [6]
2021 [20]
2020 [9]
2019 [25]
2018 [33]
2017 [29]
更多...
学科主题
Computer S... [1]
Computer S... [1]
Computer S... [1]
Engineerin... [1]
Physics [1]
education;... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共442条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Quantization and Event-Triggered Policy Design for Encrypted Networked Control
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:
Yongxia Shi
;
Ehsan Nekouei
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/03/18
Cyber-security
encrypted control
event-triggered control (ETC)
networked control systems (NCSs)
semi-homomorphic encryption
Coordinated Heat and Power Cyber-Attacks With Time Window Matching Strategy
期刊论文
IEEE TRANSACTIONS ON SMART GRID, 2023, 卷号: 14, 期号: 4, 页码: 2747-2761
作者:
Gu, Wei
;
Ding, Shixing
;
Lu, Shuai
;
Zhao, Pengfei
;
Zou, Dehu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/11/17
Cyber-attack
CPS
false data injection attacks
heating system
integrated energy system
A survey on federated learning: challenges and applications
期刊论文
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2022, 页码: 23
作者:
Wen, Jie
;
Zhang, Zhixia
;
Lan, Yang
;
Cui, Zhihua
;
Cai, Jianghui
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/12/27
Federated learning
Machine learning
Privacy protection
Personalized federated learning
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement
期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:
Zhao, Pengfei
;
Li, Shuangqi
;
Hu, Paul Jen-Hwa
;
Cao, Zhidong
;
Gu, Chenghong
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/11/14
Transportation
Computer crime
Renewable energy sources
Smart cities
Vehicle-to-grid
Uncertainty
Turbines
Cyber-attack
cyber security
electric vehicle
false data injection attacks
multi-energy system
smart city manage-ment
social effort
A low-cost communication security scheme of UAV based on multi-round reverse auction model
期刊论文
Pervasive and Mobile Computing, 2022, 卷号: 85
作者:
Xue, Jianbin
;
Zhang, Han
;
Hu, Qingchun
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/08/09
Combinatorial optimization
Cost functions
Cost reduction
Jamming
Mobile edge computing
Security systems
Communications security
Data offloading
Jamming
Low-costs
Reverse auction
Security performance
UAV communication
User groups
Wireless communication links
Wireless communications
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Verifiable speech retrieval algorithm based on KNN secure hashing
期刊论文
Multimedia Tools and Applications, 2022
作者:
An, Li
;
Huang, Yi-bo
;
Zhang, Qiu-yu
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/09/22
Biometrics
Cryptography
Efficiency
Learning algorithms
Speech communication
Speech transmission
Biometric template
Compressed-Sensing
Encryption algorithms
Hyperchaotic
Hyperchaotic lorenz compressed sensing encryption algorithm
KNN secure hash
Secure hash
Security
Speech retrieval
Verifiable speech retrieval
Research on co-design of dual security control and communication for nonlinear CPS with actuator fault and FDI attacks
期刊论文
Measurement and Control (United Kingdom), 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, YaJie
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/09/22
Actuators
Cyber Physical System
Cybersecurity
Delay control systems
Design
Embedded systems
Network security
Active fault
Active fault-tolerance
Active-passive attack-tolerance
Active/passive
Attack tolerances
Co-designs
Cybe-physical systems
Cyber-physical systems
Dual security control
False data injection attacks
Nonlinear cybe-physical system
Passive attacks
Security controls
Deep Learning-Based Framework for the Detection of Cyberattack Using Feature Engineering
期刊论文
SECURITY AND COMMUNICATION NETWORKS, 2021, 卷号: 2021
作者:
Akhtar, Muhammad Shoaib
;
Feng, Tao
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/03/01
Advancing COVID-19 diagnosis with privacy-preserving collaboration in artificial intelligence
期刊论文
NATURE MACHINE INTELLIGENCE, 2021, 卷号: 3, 期号: 12, 页码: 1081-1089
作者:
Bai, Xiangd
;
Wang, Hanchen
;
Ma, Liya
;
Xu, Yongchao
;
Gan, Jiefeng
收藏
  |  
浏览/下载:51/0
  |  
提交时间:2022/01/18
©版权所有 ©2017 CSpace - Powered by
CSpace