×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
清华大学 [6]
沈阳自动化研究所 [3]
西安交通大学 [1]
北京航空航天大学 [1]
兰州大学 [1]
自动化研究所 [1]
更多...
内容类型
期刊论文 [12]
会议论文 [5]
发表日期
2022 [1]
2020 [2]
2018 [1]
2016 [2]
2012 [1]
2011 [3]
更多...
学科主题
business &... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
提交时间升序
提交时间降序
题名升序
题名降序
Detecting Overlapped Objects in X-Ray Security Imagery by a Label-Aware Mechanism
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 卷号: 17, 页码: 998-1009
作者:
Zhao, Cairong
;
Zhu, Liang
;
Dou, Shuguang
;
Deng, Weihong
;
Wang, Liang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2022/06/06
X-ray imaging
Security
Object detection
Visualization
Liquids
Containers
Inspection
Object detection
X-ray dataset
overlap
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
作者:
Liang W(梁炜)
;
Xia XF(夏小芳)
;
Xiao Y(肖杨)
收藏
  |  
浏览/下载:171/0
  |  
提交时间:2019/10/10
Smart grid
electricity theft
suspicion assessment
malicious meter inspection
security
SAI: A Suspicion Assessment-Based Inspection Algorithm to Detect Malicious Users in Smart Grid
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 卷号: 15, 页码: 361-374
作者:
Xia XF(夏小芳)
;
Xiao Y(肖杨)
;
Liang W(梁炜)
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2019/10/10
Smart grid
electricity theft
suspicion assessment
malicious meter inspection
security
Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid
期刊论文
Computers and Security, 2018, 卷号: 77, 页码: 547-564
作者:
Zheng M(郑萌)
;
Liang W(梁炜)
;
Xiao Y(肖杨)
;
Xia XF(夏小芳)
;
Fu XY(付兴银)
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2018/06/17
Smart grid
Malicious meter inspection
Theft of electricity
Grouping
Intrusion detection
Security
碎石料应力路径大型三轴试验的离散元模拟研究
期刊论文
2016, 2016
姜浩
;
徐明
;
JIANG Hao
;
XU Ming
收藏
  |  
浏览/下载:7/0
Design and research of home security patrol robots
会议论文
6th International Conference on Manufacturing Science and Engineering (ICMSE), Guangzhou, PEOPLES R CHINA, 2016-01-01
作者:
Gai Kerong
;
Zhou Fengying
;
Zhao Linshan
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2019/12/30
security inspection
robot
omnidirectional movement
remote monitoring
Research on Service Platform of Three Gorges Lockage Maritime Security
会议论文
11th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), Guilin, PEOPLES R CHINA, OCT 19-22, 2012
作者:
Zhang Jian*
;
Cheng Yan-fen
;
Yin Qi-zhi
;
Chu Xiu-min
;
Zhou Chen
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/04
security inspection
ships selection
Web GIS
Modeling Security-Check Queues
期刊论文
MANAGEMENT SCIENCE, 2011, 卷号: 57, 期号: 11, 页码: 1979-1995
作者:
Zhang, ZG
;
Luh, HP
;
Wang, CH
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2015/04/28
security inspection level
service capacity
two-stage queue
renewal process approximation
Coxian distribution
quasi-birth-and-death process
Memory efficient deep packet inspection for application detection in mobile internet
期刊论文
Journal of Harbin Institute of Technology (New Series), 2011, 卷号: 18, 期号: [db:dc_citation_issue], 页码: 398-402
作者:
Zhou, Ya-Chao
;
Wang, Xiao-Jun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/10
Behavior detection
Deep packet inspection
DFA
Key component
Market potential
Memory efficient
Memory reduction
Mobile carriers
Mobile DPI
Mobile Internet
Monitor and control
Regular expressions
Security threats
Service Quality
Smart phones
State machine
Video traffic
An index-split Bloom filter for deep packet inspection
期刊论文
Science in China. Series F: Information Sciences, 2011, 卷号: Vol.54 No.1, 页码: 23-37
作者:
Huang, Kun
;
Zhang, DaFang
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2020/01/05
network
security
packet
processing
deep
packet
inspection
hash
table
Bloom
filter
©版权所有 ©2017 CSpace - Powered by
CSpace