×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [84]
内容类型
会议论文 [84]
发表日期
2019 [5]
2018 [21]
2017 [12]
2016 [10]
2015 [8]
2014 [7]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共84条,第1-10条
帮助
限定条件
内容类型:会议论文
专题:北京航空航天大学
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
A Privacy-Aware PKI System Based on Permissioned Blockchains
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, R.
;
He, J.
;
Liu, C.
;
Li, Q.
;
Tsai, W.-T.
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2019/12/30
Blockchain
Distributed computer systems
Efficiency
Public key cryptography
Software engineering
component
Digital certificates
permissioned blockchains
Privacy awareness
Public key infrastructure
security
Network security
An Architectural-Enhanced Secure Design in Embedded System
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Zhang, Z.
;
Zhang, X.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/30
Cryptography
Hardware security
Intrusion detection
Software engineering
Architectural enhancement
Buffer overflows
Cryptographic algorithms
execution behavior
Memory authentication
Performance loss
Security solutions
Software and hardwares
Embedded systems
Security-aware Localized Topology Control Algorithm for Mobile Ad-hoc Networks
会议论文
2019 4th Annual International Conference on Information System and Artificial Intelligence, ISAI 2019, Changsha, Hunan, China, 2019-05-17
作者:
Wang, Wenjian
;
Feng, Renjian
;
Zhu, Min
;
Wu, Yinfeng
;
Liu, Yadong
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2019/12/30
A web based security monitoring and information management system for nursing homes
会议论文
12th International Conference on Intelligent Robotics and Applications, ICIRA 2019, Shenyang, China, 2019-08-08
作者:
Li, Ying
;
Xu, Ying
;
Lv, Yi
;
Wang, Junchen
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
A Flexible Instant Payment System Based on Blockchain
会议论文
24th Australasian Conference on Information Security and Privacy, ACISP 2019, Christchurch, New zealand, 2019-07-03
作者:
Zhong, Lin
;
Wang, Huili
;
Xie, Jan
;
Qin, Bo
;
Liu, Joseph K.
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/12/30
A Hazy Image Database with Amplitude Spectra Analysis
会议论文
Advances in Mass Data Analysis of Images and Signals with Applications in Medicine, r/g/b Biotechnology, Food Industries and Dietetics, Biometry and Security, Agriculture, Drug Discover, and System Biology - 12th International Conference, MDA 2017, Proce
作者:
Wang, S.
;
Tian, Y.
;
Pu, T.
;
Wang, P.
;
Perner, P.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Agriculture
Biotechnology
Data handling
Database systems
Information analysis
Nutrition
Signal analysis
Amplitude spectra
Haze removal
Image database
Outdoor images
Outdoor scenes
Image analysis
An Intrusion Detection System Based on Machine Learning for CAN-Bus
会议论文
INDUSTRIAL NETWORKS AND INTELLIGENT SYSTEMS, INISCOM 2017, 2018-01-01
作者:
Tian, Daxin
;
Li, Yuzhou
;
Wang, Yunpeng
;
Duan, Xuting
;
Wang, Congyu
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2019/12/30
CAN-Bus
Information security
IDS
Machine learning
GBDT
Entropy
Detection performance
Towards comprehensive threat modeling for intelligent vehicle cyber security
会议论文
CICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
作者:
Ji, H.
;
Yu, G.
;
Wang, Y.
;
Zhang, Z.
;
Qin, H.
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2019/12/30
Advanced driver assistance systems
Automobile drivers
Automotive industry
Intelligent vehicle highway systems
Network security
Vehicles
Wireless telecommunication systems
Advanced driver assistant systems
Autonomous Vehicles
Connected vehicles
Network communications
Security challenges
Telematics system
Vehicular communications
Vulnerability analysis
Vehicle to vehicle communications
A multimodal detection and tracking system based on deep-learning for traffic monitoring
会议论文
CICTP 2017: Transportation Reform and Change - Equity, Inclusiveness, Sharing, and Innovation - Proceedings of the 17th COTA International Conference of Transportation Professionals
作者:
Li, X.
;
Yu, G.
;
Wand, Y.
;
Wu, X.
;
Ma, Y.
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2019/12/30
Motor transportation
Object detection
Object recognition
Security systems
Tracking (position)
Detection framework
Illumination variation
Multimodal detection
Multimodal detection and tracking
Multiple object tracking
Traffic monitoring
Traffic surveillance
Transportation research
Deep learning
RFID/NFC device with embedded fingerprint authentication system
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS
作者:
Deelaka Ranasinghe, R.M.N.
;
Yu, G.Z.
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2019/12/30
Application programs
Authentication
Computer crime
Crime
Cryptography
Digital storage
Malware
Personal computing
Radio frequency identification (RFID)
Security of data
Data corruption
Data encryption
Fingerprint authentication
Fingerprint authentication system
Identification cards
Isolated systems
Personal information
Security threats
Near field communication
©版权所有 ©2017 CSpace - Powered by
CSpace