×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
山东大学 [15]
武汉大学 [9]
软件研究所 [7]
厦门大学 [5]
中国科学院大学 [4]
北京航空航天大学 [3]
更多...
内容类型
期刊论文 [36]
会议论文 [16]
学位论文 [4]
其他 [2]
发表日期
2019 [2]
2017 [4]
2016 [2]
2015 [1]
2013 [6]
2012 [3]
更多...
学科主题
Engineerin... [1]
telecommun... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共58条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Feature Aggregation With Reinforcement Learning for Video-Based Person Re-Identification
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 卷号: 30, 期号: 12, 页码: 3847-3852
作者:
Zhang, Wei
;
He, Xuanyu
;
Lu, Weizhi
;
Qiao, Hong
;
Li, Yibin
收藏
  |  
浏览/下载:113/0
  |  
提交时间:2020/03/30
Feature extraction
Task analysis
Cameras
Noise measurement
Learning systems
Reinforcement learning
Feature aggregation
reinforcement learning (RL)
sequential decision making
video-based person re-identification (re-id)
Unbalancing Pairing-Free Identity-Based Authenticated Key Exchange Protocols for Disaster Scenarios
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2019, 卷号: 6, 页码: 878-890
作者:
Zhang, Jie
;
Huang, Xin
;
Wang, Wei
;
Yue, Yong
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2019/11/19
Authenticated key exchange (AKE)
unbalanced computational requirements
identity-based (ID-based) cryptography
disaster scenarios
pairing-free
Learning deep features with adaptive triplet loss for person reidentification
其他
2017-01-01
作者:
Li, Zhiqiang
;
Sang, Nong
;
Chen, Kezhou
;
Gao, Changxin
;
Wang, Ruolin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/05
Deep learning
part-based
person reidentification (re-id)
An Efficient and Secure Identity-Based Authentication and Key Agreement Protocol with User Anonymity for Mobile Devices
期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2017, 卷号: 94, 期号: 4
作者:
Wu, Libing
;
Alelaiw, Abdulhameed
;
Xie, Yong
;
Zhang, Yubo
;
Shen, Jian
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/05
Authentication and key agreement
ID-based authentication
Anonymity
Elliptic curve cryptosystem
Privacy-preserving
Analysis and Improvement of a Privacy-Aware Handover Authentication Scheme for Wireless Network
期刊论文
WIRELESS PERSONAL COMMUNICATIONS, 2017, 卷号: 93, 期号: 2
作者:
Kumar, Neeraj
;
Wu, Libing
;
Shen, Jian
;
Xie, Yong
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/05
Handover
Authentication scheme
ID-based authentication
Anonymity
Learning deep features with adaptive triplet loss for person reidentification
其他
2017-01-01
作者:
Li, Zhiqiang
;
Sang, Nong
;
Chen, Kezhou
;
Gao, Changxin
;
Wang, Ruolin
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/05
Deep learning
part-based
person reidentification (re-id)
ID-based Data Integrity Auditing Scheme from RSA with Resisting Key Exposure
会议论文
10th International Conference on Provable Security (ProvSec), Nanjing, PEOPLES R CHINA, 2016-11-10
作者:
Zhang, Jianhong
;
Li, Pengyan
;
Sun, Zhibin
;
Mao, Jian
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/30
ID-based auditing protocol
The RSA problem
Security proof
Efficiency analysis
Key exposure
Forward security
IPad: ID-based public auditing for the outsourced data in the standard model
期刊论文
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 卷号: 19, 页码: 127-138
作者:
Zhang, Jianhong
;
Li, Pengyan
;
Mao, Jian
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
ID-based auditing
Standard security model
The CDH problem
Simulation
Data integrity checking
An Id-Based Server-Aided Designcryption Signcryption Scheme
会议论文
8th International Symposium on Computational Intelligence and Design (ISCID), Hangzhou, PEOPLES R CHINA, 2015-01-01
作者:
Lan, Caihui
;
Li, Haifeng
;
Wang, Caifen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/09
Signcryption
Id-Based Cryptography
Server-Aided Designcryption
the Random Oracle
标准模型下基于身份的入侵容忍签名
学位论文
2013, 2013
蔡建霞
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2016/01/13
入侵容忍安全
基于身份的签名
标准模型
intrusion-resilient security
ID-based signature
without random oracles
©版权所有 ©2017 CSpace - Powered by
CSpace