×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
兰州理工大学 [3]
西安交通大学 [3]
清华大学 [2]
大连理工大学 [2]
北京航空航天大学 [1]
四川大学 [1]
更多...
内容类型
期刊论文 [11]
会议论文 [3]
发表日期
2022 [2]
2019 [1]
2017 [1]
2016 [3]
2014 [1]
2012 [2]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共14条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Research on co-design of dual security control and communication for nonlinear CPS with actuator fault and FDI attacks
期刊论文
Measurement and Control (United Kingdom), 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, YaJie
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2022/09/22
Actuators
Cyber Physical System
Cybersecurity
Delay control systems
Design
Embedded systems
Network security
Active fault
Active fault-tolerance
Active-passive attack-tolerance
Active/passive
Attack tolerances
Co-designs
Cybe-physical systems
Cyber-physical systems
Dual security control
False data injection attacks
Nonlinear cybe-physical system
Passive attacks
Security controls
Research on Dual Security Control for a Non-Linear CPS with Multi-Objective Constraints under DoS Attack and Actuator Fault: An Active-Passive Attack-Tolerant Approach
期刊论文
Journal of Control Science and Engineering, 2022, 卷号: 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, Yajie
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2022/04/21
Actuators
Delay control systems
Denial-of-service attack
Fault tolerance
Active/passive
Actuator fault
Attack tolerances
Codesign method
Cyber-physical systems
Denialof- service attacks
Multi objective
Non linear
Passive attacks
Security controls
Key reuse attack on newhope key exchange protocol
期刊论文
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2019, 卷号: 11396 LNCS, 页码: 163-176
作者:
Liu, Chao
;
Zheng, Zhongxiang
;
Zou, Guangnan
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/12/11
Active attack
Key exchange
Key reuse
Post quantum
RLWE
Random-Training-Assisted Pilot Spoofing Detection and Security Enhancement
期刊论文
IEEE ACCESS, 2017, 卷号: 5, 页码: 27384-27399
作者:
Tian, Xiaowen
;
Li, Ming
;
Liu, Qian
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/03
Pilot spoofing attack
physical layer security
active eavesdropping
iterative least-squares
random training
A Hybrid Channel Estimation Strategy Against Pilot Spoofing Attack in MISO System
会议论文
作者:
Bai, Fengyi
;
Ren, Pinyi
;
Du, Qinghe
;
Sun, Li
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/02
pilot spoofing attack
active eavesdropper
channel estimation
assistant random sequence
Random-Training-Aided Pilot Spoofing Detection
会议论文
8th International Conference on Wireless Communications & Signal Processing (WCSP), Yangzhou, PEOPLES R CHINA, 2016-10-13
作者:
Tian, Xiaowen
;
Li, Ming
;
Ti, Guangyu
;
Liu, Wenfei
;
Liu, Qian
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/09
Active eavesdropping
iterative least-squares
physical layer security
pilot spoofing attack
random training
A dynamic active shield against shield rerouting attack
期刊论文
International Journal of High Performance Computing and Networking, 2016, 卷号: Vol.9 No.5-6, 页码: 462-469
作者:
Ting Feng
;
Kenli Li
;
Yunchuan Qin
;
Siyang Yu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/31
dynamic active shield
physical attacks
invasive attacks
top layer sensor mesh
hardware security
shield rerouting attack
circuit security.
An active attack on chaotic based text zero-watermarking
会议论文
作者:
He, Lu
;
Gui, Xiao-Lin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/03
Active attack
Attack methods
Attack target
Birthday attacks
Text watermarking
Watermark algorithms
Zero watermarks
Zero-watermarking
Understanding pollution dynamics in large-scale peer-to-peer IPTV system
期刊论文
中南大学学报(英文版), 2012, 卷号: No.8
-
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/03/01
peer-to-peer
technology
internet
protocol
television
active
measurement
distributed
crawler
pollution
attack
PPLive
Analyzing and evaluating the robustness of natural language watermarking
期刊论文
Jisuanji Xuebao/Chinese Journal of Computers, 2012, 卷号: 35, 期号: [db:dc_citation_issue], 页码: 1971-1982
作者:
He, Lu
;
Gui, Xiao-Lin
;
Tian, Feng
;
Wu, Rei-Feng
;
Fang, Ding-Yi
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/10
Active attack
Adversary modeling
Attacking watermarking
Natural language information hidings
Natural language watermarking
Natural languages
Robust analysis
Theoretical modeling
©版权所有 ©2017 CSpace - Powered by
CSpace