CORC

浏览/检索结果: 共73条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Speech BioHashing security authentication algorithm based on CNN hyperchaotic map 期刊论文
Multimedia Tools and Applications, 2022
作者:  Huang, Yi-bo;  Yuan-Zhang;  Chen, Teng-Fei;  Yan, Shao-Hui;  Zhang, Qiu-yu
收藏  |  浏览/下载:20/0  |  提交时间:2022/07/20
Detection Methods in Smart Meters for Electricity Thefts: A Survey 期刊论文
PROCEEDINGS OF THE IEEE, 2022, 页码: 1-47
作者:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜);  Cui JT(崔江涛)
收藏  |  浏览/下载:17/0  |  提交时间:2022/02/04
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:  Zhang, Zhixia;  Cao, Yang;  Cui, Zhihua;  Zhang, Wensheng;  Chen, Jinjun
收藏  |  浏览/下载:30/0  |  提交时间:2021/08/15
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
作者:  Liang W(梁炜);  Xia XF(夏小芳);  Xiao Y(肖杨)
收藏  |  浏览/下载:168/0  |  提交时间:2019/10/10
GTHI: A Heuristic Algorithm to Detect Malicious Users in Smart Grids 期刊论文
IEEE Transactions on Network Science and Engineering, 2020, 卷号: 7, 期号: 2, 页码: 805-816
作者:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜);  Zheng M(郑萌)
收藏  |  浏览/下载:5/0  |  提交时间:2018/07/31
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
作者:  Xia XF(夏小芳);  Xiao Y(肖杨);  Liang W(梁炜)
收藏  |  浏览/下载:39/0  |  提交时间:2019/10/10
A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System 期刊论文
MATHEMATICS, 2019, 卷号: 7, 期号: 10, 页码: 17
作者:  Li, Yewen;  Song, Wei;  Zhao, Xiaobing;  Wang, Juan;  Zhao, Lizhi
收藏  |  浏览/下载:9/0  |  提交时间:2020/12/10
Detection and localization of image tamper with scalable granularity 会议论文
作者:  Xie, Yi;  Ding, Wenjia;  Wang, Yulin
收藏  |  浏览/下载:5/0  |  提交时间:2019/12/05
Detection and Localization of Image Tamper with Scalable Granularity 其他
2019-01-01
作者:  Xie, Yi;  Ding, Wenjia;  Wang, Yulin
收藏  |  浏览/下载:7/0  |  提交时间:2019/12/05
Video tamper detection based on multi-scale mutual information 期刊论文
2019, 卷号: 78, 页码: 27109-27126
作者:  Wei, Wei;  Fan, Xunli;  Song, Houbing;  Wang, Huihui
收藏  |  浏览/下载:9/0  |  提交时间:2019/12/20


©版权所有 ©2017 CSpace - Powered by CSpace