×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [3]
北京航空航天大学 [1]
山东师范大学 [1]
湖南大学 [1]
合肥物质科学研究院 [1]
软件研究所 [1]
更多...
内容类型
期刊论文 [5]
会议论文 [3]
发表日期
2022 [1]
2019 [1]
2017 [1]
2016 [1]
2015 [2]
2014 [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共8条,第1-8条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Adaptive robust control for the corner balancing Cubli system with uncertainties
期刊论文
TRANSACTION OF THE CANADIAN SOCIETY FOR MECHANICAL ENGINEERING, 2022
作者:
Huang, Kang
;
Li, Jiandong
;
Zhu, Zicheng
;
Yu, Biao
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2022/12/23
Cubli system
underactuated mechanical system
constraints
adaptive robust control
uncertainties
A stochastic method in simulating particles transport and deposition in wall-bounded turbulent flow
期刊论文
Annals of Nuclear Energy, 2019, 卷号: Vol.127, 页码: 12-18
作者:
Weiguo Gu
;
Dezhong Wang
;
Yu Li
;
Jinpeng He
;
Yuxiang He
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/13
Aerosol
Lagrangian
particle
tracking
Stochastic
method
Particle
deposition
Wall-bounded
turbulent
flow
Coolant
leakage
monitor
Anonymous hierarchical identity-based encryption with bounded leakage resilience and its application
期刊论文
International Journal of High Performance Computing and Networking, 2017, 卷号: 10, 期号: 3, 页码: 226-239
作者:
Hu, Chengyu
;
Liu, Pengtao
;
Guo, Shanqing
;
Xu, Qiuliang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/12
AHIBE
Anonymous hierarchical identity-based encryption
Leakage-resilient
Multi-keyword ranked search
Side-channel attacks
Effects of bounded and unbounded leakage time-varying delays in memristor-based recurrent neural networks with different memductance functionsSCI被引量:SCI原文链接
期刊论文
2016, 卷号: 202, 页码: 67-83
作者:
Chandrasekar, A.[1]
;
Rakkiyappan, R.[1]
;
Li, Xiaodi[2]
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/28
Anonymous Identity-Based Encryption with Bounded Leakage Resilience
期刊论文
Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2015, 2015, 页码: 287-292
作者:
Liu, Pengtao
;
Hu, Chengyu
;
Guo, Shanqing
;
Wang, Yilei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/17
anonymous
bounded leakage
identity-based encryption
Anonymous Identity-Based Encryption with Bounded Leakage Resilience
会议论文
IEEE 29th International Conference on Advanced Information Networking and Applications Workshops WAINA 2015, MAR 25-27, 2015
作者:
Liu, Pengtao
;
Hu, Chengyu
;
Guo, Shanqing
;
Wang, Yilei
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/31
identity-based encryption
anonymous
bounded leakage
A provably secure ring signature scheme with bounded leakage resilience
会议论文
10th International Conference on Information Security Practice and Experience, ISPEC 2014, Fuzhou, China, 2014-05-05
作者:
Wang, Huaqun
;
Wu, Qianhong
;
Qin, Bo
;
Zhang, Futai
;
Domingo-Ferrer, Josep
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/01/06
efficient public key cryptosystem resilient to key leakage chosen ciphertext attacks
会议论文
Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, San Francisco, CA, United states, February 25, 2013 - March 1, 2013
Liu Shengli
;
Weng Jian
;
Zhao Yunlei
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2013/09/22
Artificial intelligence
©版权所有 ©2017 CSpace - Powered by
CSpace