CORC

浏览/检索结果: 共37条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Cross-Scenario Unknown-Aware Face Anti-Spoofing with Evidential Semantic Consistency Learning 期刊论文
IEEE Transactions on Information Forensics and Security, 2024, 页码: 3093 - 3108
作者:  Jiang, Fangling;  Liu, Yunfan;  Si, Haolin;  Meng, Jingjing;  Li, Qi
收藏  |  浏览/下载:1/0  |  提交时间:2024/02/23
Cybersecurity Landscape on Remote State Estimation: A Comprehensive Review 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 851-865
作者:  Jing Zhou;  Jun Shang;  Tongwen Chen
收藏  |  浏览/下载:2/0  |  提交时间:2024/03/18
Decision-based adversarial attack with frequency mixup 期刊论文
IEEE Trans. Information Forensics and Security (TIFS), 2022, 期号: 17, 页码: 1038-1052
作者:  Xiu-Chuan Li;  Xu-Yao Zhang;  Fei Yin;  Cheng-Lin Liu
收藏  |  浏览/下载:22/0  |  提交时间:2022/04/07
Stealthy false data injection attacks against extended Kalman filter detection in power grids 会议论文
Beijing, China, 2021.12.10-12
作者:  Liu, Yifa;  Cheng, Long
收藏  |  浏览/下载:0/0  |  提交时间:2023/06/28
The Trust Evaluation and Anomaly Detection Model of Industrial Control Equipment Based on Multiservice and Multi-attribute 会议论文
Chengdu, China, December 10-13, 2021
作者:  Chen X(陈鑫);  Liu XD(刘贤达);  Jiang YH(蒋一恒);  Wang C(王晨)
收藏  |  浏览/下载:10/0  |  提交时间:2022/03/15
Malicious Attack Detection Algorithm of Internet of Vehicles based on CW-KNN 期刊论文
International Journal of Network Security, 2020, 卷号: 22, 期号: 6, 页码: 1004-1014
作者:  Peng-Shou Xie;  Cheng Fu;  Tao Feng;  Yan Yan;  Liang-Lu Li
收藏  |  浏览/下载:16/0  |  提交时间:2020/11/15
Replay attack detection based on distortion by loudspeaker for voice authentication 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 7, 页码: 8383-8396
作者:  Ren, Yanzhen;  Fang, Zhong;  Liu, Dengkai;  Chen, Changwen
收藏  |  浏览/下载:42/0  |  提交时间:2019/08/16
Malicious data deception attacks against power systems: A new case and its detection method 期刊论文
TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2019, 卷号: 41, 页码: 1590-1599
作者:  Du, Dajun[1];  Chen, Rui[2];  Li, Xue[3];  Wu, Lei[4];  Zhou, Peng[5]
收藏  |  浏览/下载:33/0  |  提交时间:2019/04/22
Malicious Domain Names Detection Algorithm Based on N-Gram 期刊论文
Journal of Computer Networks and Communications, 2019, 卷号: 2019
作者:  Zhao, Hong;  Chang, Zhaobin;  Bao, Guangbin;  Zeng, Xiangyan;  Chaeikar, Saman S.
收藏  |  浏览/下载:3/0  |  提交时间:2022/02/18
HEMD: a highly efficient random forest-based malware detection framework for Android 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2018, 卷号: 30, 期号: 11, 页码: 3353-3361
作者:  Zhu, HJ (Zhu, Hui-Juan)[ 1,2,3 ];  Jiang, TH (Jiang, Tong-Hai)[ 1,3 ];  Ma, B (Ma, Bo)[ 1,3 ];  You, ZH (You, Zhu-Hong)[ 1,3 ];  Shi, WL (Shi, Wei-Lei)[ 1 ]
收藏  |  浏览/下载:45/0  |  提交时间:2019/07/10


©版权所有 ©2017 CSpace - Powered by CSpace