CORC

浏览/检索结果: 共34条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol 期刊论文
SENSORS, 2022, 卷号: 22, 期号: 17
作者:  Wu, Yi;  Feng, Tao
收藏  |  浏览/下载:19/0  |  提交时间:2022/09/22
A Zonotopic-Based Watermarking Design to Detect Replay Attacks 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2022, 卷号: 9, 期号: 11, 页码: 1924-1938
作者:  Carlos Trapiello;  Vicenç Puig
收藏  |  浏览/下载:5/0  |  提交时间:2022/10/09
Distributed Secure State Estimation for Cyber-Physical Systems Against Replay Attacks via Multisensor Method 期刊论文
IEEE SYSTEMS JOURNAL, 2021, 页码: 1-9
作者:  Su L(苏磊);   Ye D(叶丹);   Zhao XG(赵新刚)
收藏  |  浏览/下载:7/0  |  提交时间:2021/12/31
采用超复数小波生成对抗网络的活体人脸检测算法 期刊论文
西安交通大学学报, 2020
作者:  李策;  李兰;  宣树星;  杨静;  杜少毅
收藏  |  浏览/下载:2/0  |  提交时间:2020/12/18
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol 期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:  Feng, Tao;  Wang, Shuaishuai;  Gong, Xiang;  Fang, Junli
收藏  |  浏览/下载:12/0  |  提交时间:2020/12/18
Attention-Based Two-Stream Convolutional Networks for Face Spoofing Detection 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 578-593
作者:  Chen, Haonan;  Hu, Guosheng;  Lei, Zhen;  Chen, Yaowu;  Robertson, Neil M.
收藏  |  浏览/下载:19/0  |  提交时间:2020/03/30
基于 TPM 2.0 的协议设计与分析研究 学位论文
博士, 北京: 中国科学院研究生院, 2019
作者:  王微谨
收藏  |  浏览/下载:192/0  |  提交时间:2019/07/03
Replay attack detection based on distortion by loudspeaker for voice authentication 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 7, 页码: 8383-8396
作者:  Ren, Yanzhen;  Fang, Zhong;  Liu, Dengkai;  Chen, Changwen
收藏  |  浏览/下载:40/0  |  提交时间:2019/08/16
Replay attack detection based on distortion by loudspeaker for voice authentication 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 7
作者:  Ren, Yanzhen;  Fang, Zhong;  Liu, Dengkai;  Chen, Changwen
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
A note on "enhancing cloud storage security against a new replay attack with an efficient public auditing scheme" 会议论文
2nd International Conference on Big Data Technologies, ICBDT 2019, August 28, 2019 - August 30, 2019
作者:  Li, Xiaoran;  Hao, Rong
收藏  |  浏览/下载:6/0  |  提交时间:2019/12/31


©版权所有 ©2017 CSpace - Powered by CSpace