×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [59]
华南理工大学 [46]
兰州理工大学 [37]
西安交通大学 [37]
上海大学 [32]
复旦大学上海医学院 [26]
更多...
内容类型
会议论文 [488]
发表日期
2020 [5]
2019 [21]
2018 [23]
2017 [23]
2016 [44]
2015 [34]
更多...
学科主题
Steam Turb... [2]
Gesture Re... [1]
Interferom... [1]
geology; i... [1]
光学与环境监测遥感技... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共488条,第1-10条
帮助
限定条件
内容类型:会议论文
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Survey of 3D Printer Security Offensive and Defensive
会议论文
Haikou, China, December 17, 2021 - December 19, 2021
作者:
Zhang, Jiayuan
;
Feng, Mengyue
;
Huang, Yuhang
;
Feng, Tao
;
Wang, Wenjie
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/04/21
Crime
Industrial research
Printing presses
3
D printing
3D
printing
AM security
Classifieds
Investigation and analysis
Related works
Security application
Security issues
Security research
Technical data
Anaerobic fermentation of hybridPennisetummixed with fruit and vegetable wastes to produce volatile fatty acids
会议论文
作者:
Xing, Tao
;
Yu, Shutai
;
Zhen, Feng
;
Kong, Xiaoying
;
Sun, Yongming
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2020/12/18
Fermentation
Fruits
VegetablesAlkaline conditions
Anaerobic fermentation
Anaerobic fermentation process
Fruit and vegetable waste
Initial conditions
Maximum selectivity
Neutral conditions
Volatile fatty acids (VFAs)
One-Stop Efficient PKI Authentication Service Model Based on Blockchain
会议论文
Chengdu, China, October 11, 2019 - October 13, 2019
作者:
Feng, Tao
;
Chen, Wuyang
;
Zhang, Di
;
Liu, Chunyan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/11/15
Blockchain
Public key cryptography
Authentication services
Batch update
Dynamic accumulators
Identity authentication
Public key infrastructure technologies
Storage overhead
Third-party service providers
User authentication
Location Privacy Protection Algorithm Based on the Division Method of Voronoi in the Internet of Vehicles
会议论文
Hohhot, China, July 17, 2020 - July 20, 2020
作者:
Xie, Peng-shou
;
Han, Xue-ming
;
Feng, Tao
;
Yan, Yan
;
Ma, Guo-qiang
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2020/11/15
Artificial intelligence
Data privacy
Fuzzy sets
Road vehicles
Roads and streets
Vehicle to vehicle communications
Fuzzy algorithms
K-Anonymity
L diversities
Location privacy protection
Protection algorithms
Road network
Time complexity
Voronoi diagrams
Network Intrusion Detection Based on Data Feature Dynamic Ensemble Model
会议论文
Hohhot, China, July 17, 2020 - July 20, 2020
作者:
Feng, Tao
;
Dou, Manfang
;
Xie, Pengshou
;
Fang, Junli
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Artificial intelligence
Big data
Feature extraction
Intrusion detection
Classification accuracy
Classification results
Data characteristics
Ensemble classifiers
Ensemble modeling
Network intrusion detection
Network intrusions
Stacking framework
Research on the privacy security puzzle scheme of blockchain
会议论文
Hong Kong, Hong kong, June 15, 2019 - June 17, 2019
作者:
Feng, Tao
;
Hao, Wentao
;
Du, Jinze
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/15
Bitcoin
Blockchain
Data transaction
Decentralization
Essential features
Non-interactive zero-knowledge proofs
Power calculation
Privacy problems
Security problems
Transaction data
Research on Large Caliber FSM Digital Control System Based on Voice Coil Motor
会议论文
Chengdu, China, 2019-12-20
作者:
Cao, Yu
;
Wang, Haitao
;
Lv, Tao
;
Wang, Rui
;
Jing, Feng
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/03/23
large-scale network
Fast-steering Mirror Control
Displacement Coordinate Transformation
Digital Notch Filter
Closed-loop Control
Establishment and Application Demonstration of Standards for Agricultural Biogas Slurry Returning to Field in Citrus Orchard
会议论文
Dalian, China, September 28, 2019 - September 29, 2019
作者:
Lan,Tao
;
Xiong,Diwen
;
Chu,Qiao
;
Feng,Yang
;
Kou,Linling
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2020/02/18
The Security Assessment on Programmable Logic Controller based on Attack Tree Model and FAHP
会议论文
Shenyang, China, July 12, 2019 - July 14, 2019
作者:
Feng, Tao
;
Shi, Yanxia
;
Gong, Renbin
;
Zhao, Qianchuan
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2020/11/15
Analytic hierarchy process
Computation theory
Computer circuits
Controllers
Data acquisition
Decision making
Forestry
Intelligent computing
Probability
Programmable logic controllers
Programmed control systems
Security of data
Attack tree
Fuzzy analytic hierarchy process
Industrial control systems
Programmable logic controllers (PLC)
Protective measures
Security attributes
Shapiro-Wilk tests
Supervisory control and data acquisition
Modeling and optimization of actively Q-switched 2.8 μm Er3+-doped ZBLAN fiber laser
会议论文
Changsha, China, 2018-11-11
作者:
Shen, Yanlong
;
Wang, Yishan
;
Tao, Mengmeng
;
Luan, Kunpeng
;
Zhu, Feng
收藏
  |  
浏览/下载:60/0
  |  
提交时间:2019/07/01
modeling
mid-infrared fiber laser
Er:ZBLAN
actively Q-switched
©版权所有 ©2017 CSpace - Powered by
CSpace