×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [5]
清华大学 [4]
北京大学 [4]
兰州理工大学 [2]
北京航空航天大学 [2]
数学与系统科学研究院 [2]
更多...
内容类型
期刊论文 [26]
会议论文 [9]
其他 [2]
发表日期
2024 [2]
2022 [1]
2021 [2]
2020 [1]
2019 [3]
2018 [3]
更多...
学科主题
Computer S... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共37条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Cross-Scenario Unknown-Aware Face Anti-Spoofing with Evidential Semantic Consistency Learning
期刊论文
IEEE Transactions on Information Forensics and Security, 2024, 页码: 3093 - 3108
作者:
Jiang, Fangling
;
Liu, Yunfan
;
Si, Haolin
;
Meng, Jingjing
;
Li, Qi
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/02/23
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 851-865
作者:
Jing Zhou
;
Jun Shang
;
Tongwen Chen
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/03/18
Cyber-attacks
Kalman filtering
remote state estimation
unreliable transmission channels
Decision-based adversarial attack with frequency mixup
期刊论文
IEEE Trans. Information Forensics and Security (TIFS), 2022, 期号: 17, 页码: 1038-1052
作者:
Xiu-Chuan Li
;
Xu-Yao Zhang
;
Fei Yin
;
Cheng-Lin Liu
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/04/07
Decision-based attack , detection , frequency domain
Stealthy false data injection attacks against extended Kalman filter detection in power grids
会议论文
Beijing, China, 2021.12.10-12
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/06/28
False data injection, state estimation, extended Kalman filter, attack sequence
The Trust Evaluation and Anomaly Detection Model of Industrial Control Equipment Based on Multiservice and Multi-attribute
会议论文
Chengdu, China, December 10-13, 2021
作者:
Chen X(陈鑫)
;
Liu XD(刘贤达)
;
Jiang YH(蒋一恒)
;
Wang C(王晨)
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/03/15
ICS
trust model
anomaly detection
multi-service
multi-attribute
support algorithm
vector similarity algorithm
Malicious Attack Detection Algorithm of Internet of Vehicles based on CW-KNN
期刊论文
International Journal of Network Security, 2020, 卷号: 22, 期号: 6, 页码: 1004-1014
作者:
Peng-Shou Xie
;
Cheng Fu
;
Tao Feng
;
Yan Yan
;
Liang-Lu Li
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2020/11/15
Combined Weight
CW-KNN
Internet of Vehicles
Malicious Attack Detection
Malware
Replay attack detection based on distortion by loudspeaker for voice authentication
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 7, 页码: 8383-8396
作者:
Ren, Yanzhen
;
Fang, Zhong
;
Liu, Dengkai
;
Chen, Changwen
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2019/08/16
Automatic Speaker Verification (ASV)
Replay Attack Detection (RAD)
Loudspeaker
Low-frequency attenuation
Spoofing attack
Malicious data deception attacks against power systems: A new case and its detection method
期刊论文
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 卷号: 41, 页码: 1590-1599
作者:
Du, Dajun[1]
;
Chen, Rui[2]
;
Li, Xue[3]
;
Wu, Lei[4]
;
Zhou, Peng[5]
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2019/04/22
Smart grid
bad data detection (BDD)
malicious data deception attack
optimal power flow
line overload risk
detection strategy
Malicious Domain Names Detection Algorithm Based on N-Gram
期刊论文
Journal of Computer Networks and Communications, 2019, 卷号: 2019
作者:
Zhao, Hong
;
Chang, Zhaobin
;
Bao, Guangbin
;
Zeng, Xiangyan
;
Chaeikar, Saman S.
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2022/02/18
Network security
Signal detection
HEMD: a highly efficient random forest-based malware detection framework for Android
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2018, 卷号: 30, 期号: 11, 页码: 3353-3361
作者:
Zhu, HJ (Zhu, Hui-Juan)[ 1,2,3 ]
;
Jiang, TH (Jiang, Tong-Hai)[ 1,3 ]
;
Ma, B (Ma, Bo)[ 1,3 ]
;
You, ZH (You, Zhu-Hong)[ 1,3 ]
;
Shi, WL (Shi, Wei-Lei)[ 1 ]
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2019/07/10
Random forest
Malware detection
Android
Support vector machine
Requested permissions
©版权所有 ©2017 CSpace - Powered by
CSpace