×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业... [853]
厦门大学 [101]
清华大学 [60]
武汉大学 [49]
华南理工大学 [43]
山东大学 [40]
更多...
内容类型
期刊论文 [886]
会议论文 [393]
学位论文 [127]
其他 [17]
会议 [2]
SCI/SSCI论文 [1]
更多...
发表日期
2021 [3]
2020 [6]
2019 [25]
2018 [63]
2017 [77]
2016 [92]
更多...
学科主题
Computer S... [1]
Computer S... [1]
Informatio... [1]
acoustic w... [1]
computer c... [1]
computer s... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共1426条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Content-adaptive image encryption with partial unwinding decomposition
期刊论文
SIGNAL PROCESSING, 2021, 卷号: 181, 页码: 14
作者:
Wu, Yongfei
;
Zhang, Liming
;
Qian, Tao
;
Liu, Xilin
;
Xie, Qiwei
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/03/29
Information security
Image encryption
Image-content-adaptive encryption
Partial unwinding decomposition
Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1913-1922
作者:
Sanjeev Kumar Dwivedi
;
Ruhul Amin
;
Satyanarayana Vollala
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/09/03
Authentication
blockchain
interplanetary file system (
IPFS
)
secure information sharing
security
Research on attribute-based encryption access control technology in edge computing environment
会议论文
Beijing, China, October 22-24, 2021
作者:
Jiang YH(蒋一恒)
;
Zhang Chen
;
Zhang BW(张博文)(2.3)
;
Yuan DC(袁德成)
;
Wang C(王晨)
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2022/04/23
access control
attribute-based encryption
edge computing
edge nodes
information security
Biohashing encrypted speech retrieval based on chaotic measurement matrix
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 卷号: 48, 期号: 12, 页码: 32-37
作者:
Huang, Yibo
;
Wang, Yong
;
Zhang, Qiuyu
;
Chen, Tengfei
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/02/17
Biometrics
Cryptography
Information retrieval
Privacy by design
Search engines
BioHashing
Biometric template
Chaotic measurements
Data leakage
Encrypted speech
Security and privacy
Speech features
Speech retrieval
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
Intelligent city intelligent medical sharing technology based on internet of things technology
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 卷号: 111, 页码: 226-233
作者:
Zhao, Xin
;
Xiao, Wei
;
Wu, Lu
;
Zhao, Zhigang
;
Huo, Jidong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Internet of things
Intelligent city
Intelligent medical sharing
Data encryption
Information security
Network intrusion detection model based on multivariate correlation analysis - long short-time memory network
期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 2, 页码: 166-174
作者:
Dong, Rui-Hong
;
Li, Xue-Yong
;
Zhang, Qiu-Yu
;
Yuan, Hui
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2020/03/30
support vector machines
neural nets
image classification
pattern classification
security of data
recurrent neural nets
learning (artificial intelligence)
network intrusion detection model
multivariate correlation analysis
short-time memory network
low detection performance
time correlation characteristics
intrusion detection datasets
multivariate correlations analysis
short-term memory network
information gain feature selection method
convolutional neural networks
recurrent neural network
classification detection performance
Security monitoring method for ICS based on information gain ratio and maximum entropy model
会议论文
Shanghai, China, November 6-8, 2020
作者:
Li SG(李声刚)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Lu, Yan
;
Dong, Zhiwei
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2021/03/14
Industrial control system
Information gain ratio
Maximum entropy model
Security monitoring
Research and Implementation of Secure Industrial Communication Protocols
会议论文
Dalian, China, March 20-22, 2020
作者:
Wang JR(王靖然)
;
Liu MZ(刘明哲)
;
Xu AD(徐皑冬)
;
Hu B(胡波)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/12/18
ICS information security
industrial communication protocols
identity authentication
data encryption
Modbus/TCP
A digital image encryption algorithm based on chaotic mapping
期刊论文
JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2019, 卷号: 13
作者:
Deng, Zhijuan
;
Zhong, Shaojun
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2019/08/22
Information security
digital image
chaos sequence
algorithm
encryption
decryption
©版权所有 ©2017 CSpace - Powered by
CSpace