×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
厦门大学 [14]
大连理工大学 [14]
湖南大学 [14]
西安交通大学 [12]
山东大学 [12]
北京大学 [11]
更多...
内容类型
期刊论文 [84]
会议论文 [45]
学位论文 [9]
其他 [8]
发表日期
2023 [2]
2022 [1]
2021 [1]
2020 [2]
2019 [5]
2018 [12]
更多...
学科主题
地理学::地图学与地... [1]
系统生态学::系统生... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共146条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
作者升序
作者降序
Digger: A Graph Contraction Algorithm for Patrolling Games
期刊论文
IEEE TRANSACTIONS ON RELIABILITY, 2023, 页码: 13
作者:
Han, Jinpeng
;
Wang, Zhen
;
Chen, Xiaoguang
;
Yang, Manzhi
;
Wang, Fei-Yue
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/02/22
Games
Security
Game theory
Resource management
Runtime
Roads
Cyberspace
Graph contraction
minimum vertex cut
patrolling game
security game
Stackelberg game
Adversarial learning domain-invariant conditional features for robust face anti-spoofing
期刊论文
International Journal of Computer Vision, 2023, 卷号: 131, 页码: 1680–1703,
作者:
Jiang, Fangling
;
Li, Qi
;
Liu, Pengcheng
;
Zhou, Xiangdong
;
Sun, Zhenan
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2024/02/23
Fuzzy-Based Privacy-Preserving Scheme of Low Consumption and High Effectiveness for IoTs: A Repeated Game Model
期刊论文
Sensors, 2022, 卷号: 22, 期号: 15
作者:
Cao, Laicheng
;
Zhu, Min
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2022/09/22
Energy efficiency
Pollution
Privacy-preserving techniques
Camouflage attack
Effective trust cluster formulation scheme
Fuzzy trusts
Game models
Low consumption
Low-high
Optimal cluster
Pollution attack
Privacy preserving
Repeated games
Discouraging pool block withholding attacks in Bitcoin
期刊论文
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2021, 页码: 16
作者:
Chen, Zhihuai
;
Li, Bo
;
Shan, Xiaohan
;
Sun, Xiaoming
;
Zhang, Jialin
收藏
  |  
浏览/下载:42/0
  |  
提交时间:2021/12/01
Bitcoin
Mining pool
Block withholding attack
Nash equilibrium
Securing Parked Vehicle Assisted Fog Computing With Blockchain and Optimal Smart Contract Design
期刊论文
IEEE/CAA Journal of Automatica Sinica, 2020, 卷号: 7, 期号: 2, 页码: 426-441
作者:
Xumin Huang
;
Dongdong Ye
;
Rong Yu
;
Lei Shu
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2021/03/11
Blockchain
parked vehicle
smart contract
Stackelberg game
vehicular fog computing (VFC)
Learning implicit information in Bayesian games with knowledge transfer
期刊论文
Control Theory and Technology, 2020, 卷号: 18, 期号: 3, 页码: 315-323
作者:
Chen Guanpu
;
Cao Kai
;
Hong Yiguang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2021/01/14
Bayesian game
repeated game
knowledge transfer
security
Tradeoff gain and loss optimization against man-in-the-middle attacks based on game theoretic model
期刊论文
Future Generation Computer Systems, 2019, 卷号: 101, 页码: 169-179
作者:
Jie, Yingmo
;
Choo, Kim-Kwang Raymond
;
Li, Mingchu
;
Chen, Ling
;
Guo, Cheng
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2019/12/02
Artificial intelligence
Losses
Network security
Pareto principle, Cyber security
Effective approaches
Game-theoretic model
Man in the middle attacks
Man-In-The-Middle (MITM) Attack
Pareto theory
Pareto-optimal
Stackelberg Games, Game theory
On the Security-Privacy Tradeoff in Collaborative Security: A Quantitative Information Flow Game Perspective
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 期号: 12
作者:
Jin, Richeng
;
He, Xiaofan
;
Dai, Huaiyu
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2019/12/05
Quantitative information flow
game theory
collaborative security
privacy
Decentralization is Vulnerable Under the Gap Game
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 90999-91008
作者:
Liu, Yiran
;
Ke, Junming
;
Xu, Qiuliang
;
Jiang, Han
;
Wang, Hao
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2019/12/11
Blockchain security
decentralization
reward
gap game
mining
Modeling a Multi-target Attacker-defender Game with Multiple Attack Types
期刊论文
Reliability Engineering & System Safety, 2019
作者:
Jing Zhang
;
Jun Zhuang
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/13
Homeland
security
Attacker-defender
Game
Attacker
types
Game
Theory
©版权所有 ©2017 CSpace - Powered by
CSpace