×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
软件研究所 [15]
北京大学 [7]
兰州理工大学 [5]
厦门大学 [4]
计算技术研究所 [3]
自动化研究所 [3]
更多...
内容类型
期刊论文 [27]
会议论文 [9]
学位论文 [4]
其他 [3]
发表日期
2021 [1]
2020 [3]
2018 [2]
2017 [1]
2016 [2]
2015 [1]
更多...
学科主题
Computer S... [2]
Computer S... [1]
Mathematic... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共43条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Resilience Against Replay Attacks: A Distributed Model Predictive Control Scheme for Networked Multi-Agent Systems
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 3, 页码: 628-640
作者:
Giuseppe Franzè
;
Francesco Tedesco
;
Domenico Famularo
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/04/09
Distributed model predictive control
leader-follower networks
multi-agent systems
replay attacks
resilient control
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 卷号: 16, 期号: 5, 页码: 3322-3329
作者:
Sangaiah, Arun Kumar
;
Medhane, Darshan Vishwasrao
;
Bian, Gui-Bin
;
Ghoneim, Ahmed
;
Alrashoud, Mubarak
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/06/02
Cyber physical system (CPS)
energy efficiency
information confidentiality
opacity
position-based services
position confidentiality
On the Optimality of Tape Merge of Two Lists with Similar Size
期刊论文
ALGORITHMICA, 2020, 页码: 26
作者:
Li, Qian
;
Sun, Xiaoming
;
Zhang, Jialin
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2020/12/10
Comparison-based model
Tape merge
Optimal merge
Adversary method
Fully Dynamic Broadcasting under SINR
会议论文
2018
作者:
Dongxiao Yu
;
Longlong Lin
;
Yong Zhang
;
Jiguo Yu
;
Yifei Zou
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2019/01/31
Towards Query Efficient Black-box Attacks:An Input-free Perspective
会议论文
2018
作者:
Yali Du
;
Meng Fang, Jinfeng Yi, Jun Cheng and Dacheng Tao
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2019/01/31
Near optimal algorithms for online weighted bipartite matching in adversary model
期刊论文
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2017, 卷号: 34, 期号: 3, 页码: 689-705
作者:
Sun, Xiaoming
;
Zhang, Jia
;
Zhang, Jialin
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2019/12/12
Online matching
Weighted bipartite graph
Adversary model
Near optimal algorithm
Autonomous Maneuvering Decision Research of UAV Based on Experience Knowledge Representation
会议论文
宁夏银川, 2016/5/28-2016/5/30
作者:
He XM(贺雪梅)
;
Zu W(祖伟)
;
Chang HX(常红星)
;
Gao Y(高阳)
;
He XM(贺雪梅)
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2016/06/27
Experiential Knowledge
Bayes
Nash Equilibrium
Air Combat
Two birds with one stone: Two-factor authentication with security beyond conventional bound
期刊论文
IEEE Transactions on Dependable and Secure Computing, 2016
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/04
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards
其他
2015-01-01
Wang, Ding
;
Wang, Ping
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2017/12/03
Password authentication
Offline dictionary attack
Smart card
Common memory device
Non-tamper resistant
USER AUTHENTICATION
KEY EXCHANGE
SECURITY ENHANCEMENT
EFFICIENT
ROBUST
IMPROVEMENTS
PROTOCOL
©版权所有 ©2017 CSpace - Powered by
CSpace