×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [5]
计算技术研究所 [2]
沈阳自动化研究所 [2]
数学与系统科学研究院 [1]
自动化研究所 [1]
内容类型
期刊论文 [10]
会议论文 [1]
发表日期
2021 [11]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共11条,第1-10条
帮助
限定条件
发表日期:2021
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
A blockchain-assisted framework for secure and reliable data sharing in distributed systems
期刊论文
EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 卷号: 2021, 期号: 1, 页码: 19
作者:
Guo, Yu
;
Wang, Shenling
;
Huang, Jianhui
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/12/01
Dynamic searchable encryption
Distributed data storage
Forward security
Smart contract
Blockchain
System Identification With Binary-Valued Observations Under Data Tampering Attacks
期刊论文
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 卷号: 66, 期号: 8, 页码: 3825-3832
作者:
Guo, Jin
;
Wang, Xuebin
;
Xue, Wenchao
;
Zhao, Yanlong
收藏
  |  
浏览/下载:81/0
  |  
提交时间:2021/10/26
Estimation
Sensor systems
Security
Communication networks
Automation
Production
Binary-valued observations
compensation-oriented defense scheme
data tampering attack
system identification
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:
Zhang, Zhixia
;
Cao, Yang
;
Cui, Zhihua
;
Zhang, Wensheng
;
Chen, Jinjun
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2021/08/15
Intrusion detection
Security
6G mobile communication
Data models
Protocols
Optimization
Encryption
Controller area network (CAN)
intrusion detection
machine learning (ML)
many-objective optimization
vehicular networks security
Integrated security control method for industrial cyber-physical system with attack and fault
期刊论文
Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2021, 卷号: 55, 期号: 6, 页码: 1185-1198
作者:
Li, Wei
;
Zhang, Jian-Jun
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/02/17
Actuators
Computation theory
Cyber Physical System
Design
Embedded systems
Fault tolerance
Network security
Numerical methods
Communication resources
Communication schemes
Computing resource
Conservative technologies
Estimation results
False data injection
Integrated security control
Lyapunov stability theory
Multi-image encryption algorithm based on image hash, bit-plane decomposition and dynamic DNA coding
期刊论文
IET Image Processing, 2021, 卷号: 15, 期号: 4, 页码: 885-896
作者:
Zhang, Qiuyu
;
Han, Jitian
;
Ye, Yutong
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2021/06/03
Bioinformatics
Chaotic systems
Cryptography
DNA
Image enhancement
Transmissions
Bit plane decompositions
Content security
Differential attacks
Hyper-chaotic systems
Internet transmission
Large data volumes
Strong securities
Transmission rates
Research on Enterprise Information Security and Privacy Protection in Big Data Environment
会议论文
ELECTR NETWORK, DEC 03-05, 2021
作者:
Du, Juan
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2022/07/19
Data security
privacy protection
big data platform
A Deviation-based Detection Method against False Data Injection Attacks in Smart Grid
期刊论文
IEEE Access, 2021, 卷号: 9, 页码: 15499-15509
作者:
Pei C(裴超)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
;
Han XJ(韩晓佳)
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2021/01/30
State estimation
false data injection attacks
smart grid
cyber security
Kalman filter
cyber physical system
Secure Data Collaborative Computing Scheme Based on Blockchain
期刊论文
Security and Communication Networks, 2021, 卷号: 2021
作者:
Feng, Tao
;
Wang, Xusheng
;
Liu, Chunyan
;
Fang, Junli
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2021/03/02
Blockchain
Digital storage
Electronic voting
Privacy by design
Anti collusions
Bloom filters
Data informations
Data storage
Secret sharing
Secure multi-party computation
Security datum
Verifiability
A weighted intrusion detection model of dynamic selection
期刊论文
APPLIED INTELLIGENCE, 2021, 卷号: 51, 期号: 7, 页码: -
作者:
Feng, Tao
;
Dou, Manfang
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2021/03/12
BIG DATA
ALGORITHM
SECURITY
SYSTEM
ENSEMBLE
©版权所有 ©2017 CSpace - Powered by
CSpace