×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [8]
自动化研究所 [6]
北京大学 [5]
厦门大学 [2]
集美大学 [2]
深圳先进技术研究院 [2]
更多...
内容类型
期刊论文 [32]
其他 [4]
会议论文 [2]
发表日期
2024 [1]
2023 [2]
2022 [1]
2021 [3]
2019 [1]
2018 [3]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共38条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Surveillance Face Anti-Spoofing
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 1535-1546
作者:
Fang, Hao
;
Liu, Ajian
;
Wan, Jun
;
Escalera, Sergio
;
Zhao, Chenxu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/02/22
Face anti-spoofing
dataset
surveillance scenes
R(2)Fed: Resilient Reinforcement Federated Learning for Industrial Applications
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 卷号: 19, 期号: 8, 页码: 8829-8840
作者:
Zhang, Weishan
;
Yu, Fa
;
Wang, Xiao
;
Zeng, Xingjie
;
Zhao, Hongwei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2023/11/17
Federated learning
non-independent identically distributed (non-IID) data
reinforcement learning
Deep Learning for Face Anti-Spoofing: A Survey
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 5, 页码: 5609-5631
作者:
Yu, Zitong
;
Qin, Yunxiao
;
Li, Xiaobai
;
Zhao, Chenxu
;
Lei, Zhen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2023/11/16
Face recognition
Deep learning
Cameras
Task analysis
Sensors
Protocols
Three-dimensional displays
Face anti-spoofing
presentation attack
deep learning
pixel-wise supervision
multi-modal
domain generalization
Robust Detection of Malicious URLs With Self-Paced Wide & Deep Learning
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 2, 页码: 717-730
作者:
Liang, Yunji
;
Wang, Qiushi
;
Xiong, Kang
;
Zheng, Xiaolong
;
Yu, Zhiwen
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/06
paced learning
temporal convolutional network
factorization machine
wide & deep
malicious URL detection
NAS-FAS: Static-Dynamic Central Difference Network Search for Face Anti-Spoofing
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2021, 卷号: 43, 期号: 9, 页码: 3005-3023
作者:
Yu, Zitong
;
Wan, Jun
;
Qin, Yunxiao
;
Li, Xiaobai
;
Li, Stan Z.
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2021/11/02
Task analysis
Face recognition
Convolution
Testing
Computer architecture
Protocols
Search problems
Face anti-spoofing
neural architecture search
convolution
pooling
static-dynamic
CASIA-SURF 3DMask
On the Robustness of 3D Human Pose Estimation
会议论文
Online, 2021.1.10-2021.1.15
作者:
Chen, Zerui
;
Huang, Yan
;
Wang, Liang
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/06/03
Deep Learning Anomaly Detection Based on Hierarchical Status-Connection Features in Networked Control Systems
期刊论文
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 卷号: 30, 期号: 1, 页码: 337-350
作者:
Zhao JM(赵剑明)
;
Zeng P(曾鹏)
;
Chen CY(陈春雨)
;
Dong, Zhiwei
;
Han, Jongho
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/08/12
Deep learning anomaly detection
networked control system
CNN
LSTM
Fast Screening of High-Risk Lines Under False Data Injection Attacks
期刊论文
IEEE Transactions on Smart Grid, 2019, 卷号: Vol.10 No.4, 页码: 4003-4014
作者:
Liang Che
;
Xuan Liu
;
Zuyi Li
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/13
Security
Tools
Indexes
Large-scale systems
Energy management
Real-time systems
State estimation
Cyber-security
false data injection attacks
overload
risk line screening
vulnerability assessment
The Cat and Mouse in Split Manufacturing
期刊论文
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 卷号: 26, 期号: 5, 页码: 805-817
作者:
Wang, Yujie
;
Chen, Pu
;
Hu, Jiang
;
Li, Guofeng
;
Rajendran, Jeyavijayan
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2019/12/10
Hardware security
placement perturbation
split manufacturing
Detecting False Data Injection Attacks Against Power System State Estimation with Fast Go- Decomposition (GoDec) Approach
期刊论文
IEEE Transactions on Industrial Informatics, 2018
作者:
Li, Boda
;
Ding, Tao
;
Huang, Can
;
Zhao, Junbo
;
Yang, Yongheng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/19
Bad data detections
Cyber security
Energy management systems (EMS)
False data injection attacks
Large-scale attacks
Matrix separation
Power system state estimation
Smart grid
©版权所有 ©2017 CSpace - Powered by
CSpace