×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京大学 [29]
软件研究所 [21]
兰州理工大学 [16]
自动化研究所 [10]
清华大学 [8]
厦门大学 [8]
更多...
内容类型
期刊论文 [82]
会议论文 [21]
其他 [18]
学位论文 [8]
专利 [2]
发表日期
2023 [2]
2022 [3]
2021 [7]
2020 [7]
2019 [12]
2018 [4]
更多...
学科主题
Computer S... [3]
计算机科学技术基础学... [2]
Computer S... [1]
Mathematic... [1]
Telecommun... [1]
计算机系统结构::计... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共131条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Digger: A Graph Contraction Algorithm for Patrolling Games
期刊论文
IEEE TRANSACTIONS ON RELIABILITY, 2023, 页码: 13
作者:
Han, Jinpeng
;
Wang, Zhen
;
Chen, Xiaoguang
;
Yang, Manzhi
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/02/22
Games
Security
Game theory
Resource management
Runtime
Roads
Cyberspace
Graph contraction
minimum vertex cut
patrolling game
security game
Stackelberg game
Coordinated Heat and Power Cyber-Attacks With Time Window Matching Strategy
期刊论文
IEEE TRANSACTIONS ON SMART GRID, 2023, 卷号: 14, 期号: 4, 页码: 2747-2761
作者:
Gu, Wei
;
Ding, Shixing
;
Lu, Shuai
;
Zhao, Pengfei
;
Zou, Dehu
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2023/11/17
Cyber-attack
CPS
false data injection attacks
heating system
integrated energy system
An Anonymous Authentication and Key Update Mechanism for IoT Devices Based on EnOcean Protocol
期刊论文
SENSORS, 2022, 卷号: 22, 期号: 17
作者:
Wu, Yi
;
Feng, Tao
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/09/22
smart lighting control
EnOcean protocol
colored Petri net
Dolev-Yao attacker model
Decision-based adversarial attack with frequency mixup
期刊论文
IEEE Trans. Information Forensics and Security (TIFS), 2022, 期号: 17, 页码: 1038-1052
作者:
Xiu-Chuan Li
;
Xu-Yao Zhang
;
Fei Yin
;
Cheng-Lin Liu
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/04/07
Decision-based attack , detection , frequency domain
Survey of 3D Printer Security Offensive and Defensive
会议论文
Haikou, China, December 17, 2021 - December 19, 2021
作者:
Zhang, Jiayuan
;
Feng, Mengyue
;
Huang, Yuhang
;
Feng, Tao
;
Wang, Wenjie
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/04/21
Crime
Industrial research
Printing presses
3
D printing
3D
printing
AM security
Classifieds
Investigation and analysis
Related works
Security application
Security issues
Security research
Technical data
A differential game view of antagonistic dynamics for cybersecurity
期刊论文
COMPUTER NETWORKS, 2021, 卷号: 200, 页码: 11
作者:
Wang, Shengling
;
Pu, Yu
;
Shi, Hongwei
;
Huang, Jianhui
;
Xiao, Yinhao
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2021/12/01
Antagonistic dynamics
Cybersecurity
Differential game
Saddle point
Formal modeling and security analysis method of security protocol based on CPN
期刊论文
Tongxin Xuebao/Journal on Communications, 2021, 卷号: 42, 期号: 9, 页码: 240-253
作者:
Gong, Xiang
;
Feng, Tao
;
Du, Jinze
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2022/02/17
Analysis method
Attack path
Colored Petri Nets
Formal analysis
Formal modeling
Formal security
Modeling analyzes
Security analysis
Security protocols
State-space
System Identification With Binary-Valued Observations Under Data Tampering Attacks
期刊论文
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 卷号: 66, 期号: 8, 页码: 3825-3832
作者:
Guo, Jin
;
Wang, Xuebin
;
Xue, Wenchao
;
Zhao, Yanlong
收藏
  |  
浏览/下载:79/0
  |  
提交时间:2021/10/26
Estimation
Sensor systems
Security
Communication networks
Automation
Production
Binary-valued observations
compensation-oriented defense scheme
data tampering attack
system identification
Are You Confident That You Have Successfully Generated Adversarial Examples?
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:
Wang, Bo
;
Zhao, Mengnan
;
Wang, Wei
;
Wei, Fei
;
Qin, Zhan
收藏
  |  
浏览/下载:69/0
  |  
提交时间:2021/08/15
Perturbation methods
Iterative methods
Computational modeling
Neural networks
Security
Training
Robustness
Deep neural networks
adversarial examples
structural black box
buffer
Autonomous Control Strategy of a Swarm System Under Attack Based on Projected View and Light Transmittance
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 3, 页码: 648-655
作者:
Xuejing Lan
;
Wenbiao Xu
;
Zhijia Zhao
;
Guiyun Liu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2021/04/09
Autonomous control
light transmittance
projected view
swarm system
©版权所有 ©2017 CSpace - Powered by
CSpace