×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [16]
沈阳自动化研究所 [10]
软件研究所 [9]
计算技术研究所 [6]
自动化研究所 [5]
清华大学 [3]
更多...
内容类型
期刊论文 [41]
其他 [10]
会议论文 [7]
专利 [6]
学位论文 [3]
发表日期
2023 [1]
2022 [2]
2021 [2]
2020 [4]
2019 [7]
2018 [11]
更多...
学科主题
Computer S... [1]
Telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共67条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Adversarial Heterogeneous Graph Neural Network for Robust Recommendation
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 页码: 12
作者:
Sang, Lei
;
Xu, Min
;
Qian, Shengsheng
;
Wu, Xindong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2023/11/22
Perturbation methods
Motion pictures
Training
Graph neural networks
Robustness
Semantics
Predictive models
Adversarial training (AT)
graph neural network (GNN)
heterogeneous graph
recommendation
Design of Updating Encryption Algorithm for Privacy Big Data Based on Consortium Blockchain Technology
期刊论文
JOURNAL OF MATHEMATICS, 2022, 卷号: 2022
作者:
Liu, Lei
;
Liu, Xue
;
Wan, Jiahua
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/12/23
Cyberbullying and Cyberviolence Detection: A Triangular User-Activity-Content View
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2022, 卷号: 9, 期号: 8, 页码: 1384-1405
作者:
Shuwen Wang
;
Xingquan Zhu
;
Weiping Ding
;
Amir Alipour Yengejeh
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/08/01
Classification
clustering
cyberbullying
natural language processing
social network
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
An encrypted speech authentication and tampering recovery method based on perceptual hashing
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 卷号: 80, 期号: 16, 页码: 24925-24948
作者:
Zhang, Qiu-yu
;
Zhang, Deng-hai
;
Xu, Fu-jiu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2021/06/03
Encrypted speech authentication
Perceptual hashing
Least square curve fitting
Tampering location
Tampering recovery
A Subject-Sensitive Perceptual Hash Based on MUM-Net for the Integrity Authentication of High Resolution Remote Sensing Images
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2020, 卷号: 9, 期号: 8, 页码: 28
作者:
Ding, Kaimeng
;
Liu, Yueming
;
Xu, Qin
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2021/03/18
perceptual hash
integrity authentication
subject-sensitive
HRRS image
deep learning
IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning
期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 卷号: 35, 期号: 2, 页码: 418-432
作者:
Zhao, Yang-Yang
;
Chen, Ming-Yu
;
Liu, Yu-Hang
;
Yang, Zong-Hao
;
Zhu, Xiao-Jing
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/12/10
in-process isolation
memory protection
out-of-bounds
user-level partitioning
Clustering Algorithm-Based Data Fusion Scheme for Robust Cooperative Spectrum Sensing
期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 5777-5786
作者:
Zhang, Shunchao
;
Wang, Yonghua
;
Wan, Pin
;
Zhuang, Jiawei
;
Zhang, Yongwei
收藏
  |  
浏览/下载:51/0
  |  
提交时间:2020/06/02
Cognitive radio
robust cooperative spectrum sensing
sensing data fusion
K-medoids clustering algorithm
Mean-shift clustering algorithm
GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids
期刊论文
IEEE Transactions on Network Science and Engineering, 2020, 卷号: 7, 期号: 2, 页码: 805-816
作者:
Xia XF(夏小芳)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Zheng M(郑萌)
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2018/07/31
Electricity theft
smart grid
smart meters
cyber attacks
security
A High-Reliability Multi-Faceted Reputation Evaluation Mechanism for Online Services
期刊论文
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 卷号: 12, 期号: 6, 页码: 836-850
作者:
Wang, Miao
;
Wang, Guiling
;
Zhang, Yujun
;
Li, Zhongcheng
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/12/10
Feedback
Measurement
Reliability
Security
Indexes
Reputation evaluation
incomplete user feedback
malicious ratings
index weights
©版权所有 ©2017 CSpace - Powered by
CSpace