×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
地理科学与资源研究... [18]
兰州理工大学 [13]
计算技术研究所 [10]
沈阳自动化研究所 [10]
数学与系统科学研究院 [4]
自动化研究所 [4]
更多...
内容类型
期刊论文 [62]
会议论文 [6]
专著章节文集论文 [1]
发表日期
2020 [69]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共69条,第1-10条
帮助
限定条件
发表日期:2020
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Biohashing encrypted speech retrieval based on chaotic measurement matrix
期刊论文
Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 卷号: 48, 期号: 12, 页码: 32-37
作者:
Huang, Yibo
;
Wang, Yong
;
Zhang, Qiuyu
;
Chen, Tengfei
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/02/17
Biometrics
Cryptography
Information retrieval
Privacy by design
Search engines
BioHashing
Biometric template
Chaotic measurements
Data leakage
Encrypted speech
Security and privacy
Speech features
Speech retrieval
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Energy Based Optimal Dynamic Stealth False Data Injection Attacks on the Smart Grid
会议论文
Guangzhou, China, 2020.11.13-15
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/06/29
smart grid, security, false data injection attack, optimal control
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0
期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:
Zhang, Qianying
;
Zhao, Shijun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/12/10
Security analysis
Authenticated key exchange
TPM 2.0
Intelligent city intelligent medical sharing technology based on internet of things technology
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 卷号: 111, 页码: 226-233
作者:
Zhao, Xin
;
Xiao, Wei
;
Wu, Lu
;
Zhao, Zhigang
;
Huo, Jidong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Internet of things
Intelligent city
Intelligent medical sharing
Data encryption
Information security
Changes in Climate Extremes in Central Asia under 1.5 and 2 degrees C Global Warming and their Impacts on Agricultural Productions
期刊论文
ATMOSPHERE, 2020, 卷号: 11, 期号: 10, 页码: 19
作者:
Liu, Yang
;
Geng, Xiu
;
Hao, Zhixin
;
Zheng, Jingyun
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2021/03/16
climate change
Central Asia
climate extreme indices
agricultural production
food security
agricultural adaptation strategies
Evolution process and obstacle factors of ecological security in western China, a case study of Qinghai province
期刊论文
ECOLOGICAL INDICATORS, 2020, 卷号: 117, 页码: 8
作者:
Fan, Yupeng
;
Fang, Chuanglin
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2021/03/18
Ecological security
PSR model
Obstacle degree model
Systems ecology theory
Policy recommendation
Qinghai
Multi-format speech BioHashing based on spectrogram
期刊论文
Multimedia Tools and Applications, 2020, 卷号: 79, 期号: 33-34, 页码: 24889-24909
作者:
Huang, Yi-bo
;
Wang, Yong
;
Zhang, Qiu-yu
;
Zhang, Wei-zhao
;
Fan, Man-hong
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2020/11/14
Authentication
Chaotic systems
Discrete cosine transforms
Eigenvalues and eigenfunctions
Factorization
Spectrographs
Authentication algorithm
Nonnegative matrix factorization
Real time performance
Security problems
Speech perception
Strong robustness
Two dimensional discrete cosine transform
Unidirectionality
©版权所有 ©2017 CSpace - Powered by
CSpace