×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业... [169]
清华大学 [133]
北京航空航天大学 [75]
华南理工大学 [52]
山东大学 [49]
西安交通大学 [48]
更多...
内容类型
期刊论文 [579]
会议论文 [250]
学位论文 [48]
其他 [27]
会议 [9]
发表日期
2021 [9]
2020 [6]
2019 [30]
2018 [50]
2017 [38]
2016 [58]
更多...
学科主题
Computer S... [3]
Engineerin... [2]
Computer S... [1]
Electrical... [1]
computer s... [1]
industrial... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共913条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges
期刊论文
Machine Intelligence Research, 2024, 卷号: 21, 期号: 2, 页码: 294-317
作者:
Yang Cao
;
Shiva Raj Pokhrel
;
Ye Zhu
;
Robin Doss
;
Gang Li
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/04/23
Zero trust architecture, cyber security, artificial intelligence, access control, authentication
Cost optimization of UAV-MEC network calculation offloading: A multi-agent reinforcement learning method
期刊论文
Ad Hoc Networks, 2022, 卷号: 136
作者:
Xue, Jianbin
;
Wu, Qingqing
;
Zhang, Haijun
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/09/22
Antennas
computation offloading
Convex optimization
Cost effectiveness
Deep learning
Energy utilization
Learning algorithms
Learning systems
Markov processes
Mobile edge computing
Multi agent systems
Power control
Reinforcement learning
Unmanned aerial vehicles (UAV)
Aerial vehicle
Computation offloading
Costs Optimization
Deep reinforcement learning
Edge computing
Multi-access edge computing
Multiaccess
Reinforcement learnings
Unmanned aerial vehicle
User equipments
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates
期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:
Li, Yuxing
;
Pang, Liaojun
;
Zhao, Heng
;
Cao, Zhicheng
;
Liu, Eryun
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2022/03/17
Biometrics (access control)
Transforms
Cryptography
Privacy
Hash functions
Feature extraction
Life sciences
Biometrics template protection
cancelable fingerprint template
fixed-length fingerprint representation
Indexing-Min-Max (IMM) hashing
security-performance tradeoff
Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage
期刊论文
Security and Communication Networks, 2022, 卷号: 2022
作者:
Zhang, Qiuyu
;
Fu, Minrui
;
Huang, Yibo
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/20
Access control
Cryptography
Digital storage
Long short-term memory
Semantics
Ciphertext-policy attribute-based encryptions
Cloud storages
Encrypted speech
Memory network
Multiusers
Privacy protection
Searchable encryptions
Speech data
Speech encryption
Speech retrieval
Distributed storage scheme for encryption speech data based on blockchain and IPFS
期刊论文
Journal of Supercomputing, 2022
作者:
Zhang, Qiuyu
;
Zhao, Zhenyu
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/08/09
Access control
Blockchain
Cloud storage
Computer operating systems
Cryptography
Ethereum
File organization
Quality control
Sensitive data
Speech
Attribute-based encryptions
Block-chain
Ciphertext policies
Ciphertext policy hierarchical attribute-based encryption
Distributed storage
Filesystem
Hierarchical attributes
Interplanetary file system
Speech data
Storage schemes
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
Flexible Iris Matching Based on Spatial Feature Reconstruction
期刊论文
IEEE Transactions on Biometrics, Behavior, and Identity Science, 2021, 页码: Early Access
作者:
Yan ZH(闫紫徽)
;
He LX(何凌霄)
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2023/06/05
Iris recognition,Image reconstruction, Feature extraction,Strain, Biometrics (access control) , Image recognition, Pupils
Blockchain Data Sharing Scheme Based on Searchable Agent Re-encryption
期刊论文
International Journal of Network Security, 2021, 卷号: 23, 期号: 3, 页码: 535-544
作者:
Feng, Tao
;
Pei, Hongmei
;
Xie, Pengshoou
;
Feng, Xiaoqing
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/02/17
Access control
Blockchain
Data privacy
Data Sharing
Digital storage
Query processing
External database
Privacy disclosures
Proxy encryptions
Proxy re encryptions
Searchable encryptions
Searchable proxy re encryptions
Sharing schemes
Transaction information
Resource Allocation Based on User Pairing and Subcarrier Matching for Downlink Non-Orthogonal Multiple Access Networks
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 3, 页码: 679-689
作者:
Zhixin Liu
;
Changjian Liang
;
Yazhou Yuan
;
Kit Yan Chan
;
Xinping Guan
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2021/04/09
Non-orthogonal multiple access (NOMA)
power control
rate maximization
subcarrier matching
user pairing
Enforcing Access Control in Information-Centric Edge Networking
期刊论文
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 卷号: 69, 期号: 1, 页码: 353-364
作者:
Wu, Danye
;
Xu, Zhiwei
;
Chen, Bo
;
Zhang, Yujun
;
Han, Zhu
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/12/01
Edge computing
in-network caching
access control
confidentiality-enhanced network coding
©版权所有 ©2017 CSpace - Powered by
CSpace