×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [121]
北京大学 [60]
清华大学 [56]
兰州理工大学 [25]
武汉大学 [21]
华南理工大学 [19]
更多...
内容类型
期刊论文 [284]
会议论文 [140]
其他 [38]
学位论文 [22]
专著 [1]
专著章节/文集论文 [1]
更多...
发表日期
2022 [2]
2021 [6]
2020 [9]
2019 [15]
2018 [23]
2017 [13]
更多...
学科主题
Computer ... [16]
Informatio... [6]
Telecommun... [4]
Computer S... [2]
Engineerin... [2]
Engineerin... [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共486条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Cross-Scenario Unknown-Aware Face Anti-Spoofing with Evidential Semantic Consistency Learning
期刊论文
IEEE Transactions on Information Forensics and Security, 2024, 页码: 3093 - 3108
作者:
Jiang, Fangling
;
Liu, Yunfan
;
Si, Haolin
;
Meng, Jingjing
;
Li, Qi
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/02/23
Certified random-number generation from quantum steering
期刊论文
PHYSICAL REVIEW A, 2022, 卷号: 106, 期号: 5, 页码: 6
作者:
Joch, Dominick J.
;
Slussarenko, Sergei
;
Wang, Yuanlong
;
Pepper, Alex
;
Xie, Shouyi
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/02/07
Privacy-Preserving Publicly Verifiable Databases
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 3, 页码: 1639-1654
作者:
Wang Q(王强)
;
Zhou FC(周福才)
;
Zhou BY(周搏洋)
;
Xu J(徐剑)
;
Chen CY(陈春雨)
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/05/29
Cloud computing
Encryption
Protocols
Indexes
Verifiable databases
privacy-preserving
publicly verifiable
cloud computing
Formal modeling and security analysis method of security protocol based on CPN
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 9, 页码: 240-253
作者:
Gong, Xiang
;
Feng, Tao
;
Du, Jinze
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Analysis method
Attack path
Colored Petri Nets
Formal analysis
Formal modeling
Formal security
Modeling analyzes
Security analysis
Security protocols
State-space
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:
Zhang, Zhixia
;
Cao, Yang
;
Cui, Zhihua
;
Zhang, Wensheng
;
Chen, Jinjun
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/08/15
Intrusion detection
Security
6G mobile communication
Data models
Protocols
Optimization
Encryption
Controller area network (CAN)
intrusion detection
machine learning (ML)
many-objective optimization
vehicular networks security
BCP-based joint delegation learning model and protocol
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 5, 页码: 137-148
作者:
Gao, Sheng
;
Xiang, Kang
;
Tian, Youliang
;
Tan, Weijie
;
Feng, Tao
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Crime
Cryptography
Data mining
Decision trees
Privacy by design
Random forests
Data mining process
Decision tree modeling
Entropy algorithms
Ho-momorphic encryptions
Horizontal distribution
Model construction
Performance analysis
Privacy protection
CASIA-Face-Africa: A Large-Scale African Face Image Database
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2021, 卷号: 16, 页码: 3634-3646
作者:
Muhammad, Jawad
;
Wang, Yunlong
;
Wang, Caiyong
;
Zhang, Kunbo
;
Sun, Zhenan
收藏
  |  
浏览/下载:70/0
  |  
提交时间:2021/08/15
Face recognition
Image databases
Internet
Cameras
Image recognition
Skin
Face detection
African face recognition
racial bias
face image database
A Test Cases Generation Method for Industrial Control Protocol Test
期刊论文
Scientific Programming, 2021, 卷号: 2021, 页码: 1-9
作者:
Shang WL(尚文利)
;
Zhang GY(张冠宇)
;
Wang TY(王天宇)
;
Zhang R(张锐)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/04/13
Deep Learning Anomaly Detection Based on Hierarchical Status-Connection Features in Networked Control Systems
期刊论文
INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2021, 卷号: 30, 期号: 1, 页码: 337-350
作者:
Zhao JM(赵剑明)
;
Zeng P(曾鹏)
;
Chen CY(陈春雨)
;
Dong, Zhiwei
;
Han, Jongho
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/08/12
Deep learning anomaly detection
networked control system
CNN
LSTM
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
©版权所有 ©2017 CSpace - Powered by
CSpace