×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
上海电子信息职业... [254]
清华大学 [132]
软件研究所 [112]
华南理工大学 [103]
武汉大学 [42]
兰州理工大学 [40]
更多...
内容类型
期刊论文 [547]
会议论文 [338]
学位论文 [36]
其他 [19]
会议 [14]
EI期刊论文 [2]
更多...
发表日期
2022 [8]
2021 [11]
2020 [17]
2019 [36]
2018 [51]
2017 [52]
更多...
学科主题
Computer S... [2]
computer s... [2]
Computer S... [1]
Computer S... [1]
Engineerin... [1]
Engineerin... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共959条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Blockchain-Based Crypto Management for Reliable Real-Time Decision-Making
期刊论文
IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 卷号: 10, 期号: 6, 页码: 3333-3342
作者:
Wang, Ge
;
Li, Juanjuan
;
Wang, Xiao
;
Li, Junqing
;
Yuan, Yong
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/07/03
Blockchains
Decision making
Reliability
Security
Encryption
Smart contracts
Data models
Blockchain
crypto management
decentralized autonomous organizations (DAOs)
federated data
non-fungible token (NFT)
smart contract
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement
期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:
Zhao, Pengfei
;
Li, Shuangqi
;
Hu, Paul Jen-Hwa
;
Cao, Zhidong
;
Gu, Chenghong
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2022/11/14
Transportation
Computer crime
Renewable energy sources
Smart cities
Vehicle-to-grid
Uncertainty
Turbines
Cyber-attack
cyber security
electric vehicle
false data injection attacks
multi-energy system
smart city manage-ment
social effort
A low-cost communication security scheme of UAV based on multi-round reverse auction model
期刊论文
Pervasive and Mobile Computing, 2022, 卷号: 85
作者:
Xue, Jianbin
;
Zhang, Han
;
Hu, Qingchun
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/08/09
Combinatorial optimization
Cost functions
Cost reduction
Jamming
Mobile edge computing
Security systems
Communications security
Data offloading
Jamming
Low-costs
Reverse auction
Security performance
UAV communication
User groups
Wireless communication links
Wireless communications
Relentless False Data Injection Attacks Against Kalman-Filter-Based Detection in Smart Grid
期刊论文
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2022, 卷号: 9, 期号: 3, 页码: 1238-1250
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/11/14
Attack sequence
false data injection
Kalman filter
smart grid security
state estimation
A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
期刊论文
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022
作者:
Kanwal, Saima
;
Tao, Feng
;
Almogren, Ahmad
;
Rehman, Ateeq Ur
;
Taj, Rizwan
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2022/07/19
Medical images security
data hiding
LSB matching
hiding capacity
imperceptibility
Reversible Watermarking Method with Low Distortion for the Secure Transmission of Medical Images
期刊论文
CMES-COMPUTER MODELING IN ENGINEERING & SCIENCES, 2022, 卷号: 130, 期号: 3, 页码: 1309-1324
作者:
Taj, Rizwan
;
Tao, Feng
;
Khurram, Shahzada
;
Rehman, Ateeq Ur
;
Haider, Syed Kamran
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2022/03/01
LSB
reversible watermarking
medical images security
data distortion
Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof
期刊论文
Wireless Communications and Mobile Computing, 2022, 卷号: 2022
作者:
Feng, Tao
;
Yang, Pu
;
Liu, Chunyan
;
Fang, Junli
;
Ma, Rong
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/04/21
Cloud security
Data privacy
Industrial research
Network security
Block-chain
Cloud service providers
Data availability
Data privacy protections
Data Sharing
Privacy protection
Protection schemes
Semitrusted
Sharing schemes
Zero-knowledge proofs
Survey of 3D Printer Security Offensive and Defensive
会议论文
Haikou, China, December 17, 2021 - December 19, 2021
作者:
Zhang, Jiayuan
;
Feng, Mengyue
;
Huang, Yuhang
;
Feng, Tao
;
Wang, Wenjie
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2022/04/21
Crime
Industrial research
Printing presses
3
D printing
3D
printing
AM security
Classifieds
Investigation and analysis
Related works
Security application
Security issues
Security research
Technical data
Research on co-design of dual security control and communication for nonlinear CPS with actuator fault and FDI attacks
期刊论文
Measurement and Control (United Kingdom), 2022
作者:
Zhao, Li
;
Li, Wei
;
Li, YaJie
收藏
  |  
浏览/下载:28/0
  |  
提交时间:2022/09/22
Actuators
Cyber Physical System
Cybersecurity
Delay control systems
Design
Embedded systems
Network security
Active fault
Active fault-tolerance
Active-passive attack-tolerance
Active/passive
Attack tolerances
Co-designs
Cybe-physical systems
Cyber-physical systems
Dual security control
False data injection attacks
Nonlinear cybe-physical system
Passive attacks
Security controls
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
©版权所有 ©2017 CSpace - Powered by
CSpace