CSpace

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Contrast Metric for Fraud Detection in Rich Graphs 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 卷号: 31, 期号: 12, 页码: 2235-2248
作者:  Liu, Shenghua;  Hooi, Bryan;  Faloutsos, Christos
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
Image edge detection  Topology  Measurement  Robustness  Time series analysis  Tensile stress  Manuals  Graph mining  time series  fraud detection  contrast suspiciousness  
Dynamic Packet Forwarding Verification in SDN 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 期号: 6, 页码: 915-929
作者:  Li, Qi;  Zou, Xiaoyue;  Huang, Qun;  Zheng, Jing;  Lee, Patrick P. C.
收藏  |  浏览/下载:45/0  |  提交时间:2020/12/10
Control systems  Cryptography  Protocols  IP networks  Software  Prototypes  Delays  Software-defined networking  attacks  forwarding verification  
A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System 期刊论文
MATHEMATICS, 2019, 卷号: 7, 期号: 10, 页码: 17
作者:  Li, Yewen;  Song, Wei;  Zhao, Xiaobing;  Wang, Juan;  Zhao, Lizhi
收藏  |  浏览/下载:48/0  |  提交时间:2020/12/10
image authentication  image recovery  smooth function  chaotic system  hierarchical tamper detection  
Low powered blockchain consensus protocols based on consistent hash 期刊论文
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 卷号: 20, 期号: 10, 页码: 1361-1377
作者:  Yu, Lei;  Zhao, Xiao-fang;  Jin, Yan;  Cai, Heng-yi;  Wei, Bo;  Hu, Bin
收藏  |  浏览/下载:38/0  |  提交时间:2020/12/10
Blockchain  Consensus protocol  Consistent hash  Low energy consumption  Decentralization  TP301  
Context aware intrusion detection for building automation systems 期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:  Pan, Zhiwen;  Hariri, Salim;  Pacheco, Jesus
收藏  |  浏览/下载:76/0  |  提交时间:2019/12/10
Internet of Things  Network security  Context awareness  Supervised learning  Data mining  Intrusion detection  
Edge Computing for Autonomous Driving: Opportunities and Challenges 期刊论文
PROCEEDINGS OF THE IEEE, 2019, 卷号: 107, 期号: 8, 页码: 1697-1716
作者:  Liu, Shaoshan;  Liu, Liangkai;  Tang, Jie;  Yu, Bo;  Wang, Yifan;  Shi, Weisong
收藏  |  浏览/下载:43/0  |  提交时间:2020/12/10
Connected and autonomous vehicles (CAVs)  edge computing  heterogeneous computing  security  vehicle-to-everything (V2X)  vehicular operating system  
Replay attack detection based on distortion by loudspeaker for voice authentication 期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 7, 页码: 8383-8396
作者:  Ren, Yanzhen;  Fang, Zhong;  Liu, Dengkai;  Chen, Changwen
收藏  |  浏览/下载:75/0  |  提交时间:2019/08/16
Automatic Speaker Verification (ASV)  Replay Attack Detection (RAD)  Loudspeaker  Low-frequency attenuation  Spoofing attack  
Scan Chain Based Attacks and Countermeasures: A Survey 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 85055-85065
作者:  Li, Xiaowei;  Li, Wenjie;  Ye, Jing;  Li, Huawei;  Hu, Yu
收藏  |  浏览/下载:56/0  |  提交时间:2019/12/10
Scan chain based attacks  test mode  mode switch  signature  secure scan chain  secret key  physical unclonable function  
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks 期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 卷号: 15, 期号: 4, 页码: 21
作者:  Zhang, Jun;  Hou, Rui;  Song, Wei;  Mckee, Sally A.;  Jia, Zhen;  Zheng, Chen;  Chen, Mingyu;  Zhang, Lixin;  Meng, Dan
收藏  |  浏览/下载:77/0  |  提交时间:2019/04/03
Code-reuse attacks  return-oriented programming attacks  message authentication code  AES-128  key management  PUF  
PUFPass: A password management mechanism based on software/hardware codesign 期刊论文
INTEGRATION-THE VLSI JOURNAL, 2019, 卷号: 64, 页码: 173-183
作者:  Guo, Qingli;  Ye, Jing;  Li, Bing;  Hu, Yu;  Li, Xiaowei;  Lan, Yazhu;  Zhang, Guohe
收藏  |  浏览/下载:69/0  |  提交时间:2019/04/03
Password  Password management mechanism  PUF  Security  Usability