×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [10]
作者
Hu, Yu [2]
Li, Xiaowe... [2]
Song, Wei [2]
Ye, Jing [2]
Cai, Heng-... [1]
Chen, Chan... [1]
更多...
文献类型
期刊论文 [10]
发表日期
2019 [10]
语种
英语 [10]
出处
ACM TRANSA... [1]
COMPUTERS ... [1]
FRONTIERS ... [1]
IEEE ACCES... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
更多...
资助项目
National N... [3]
China Scho... [2]
National N... [2]
National N... [2]
National N... [2]
Army Resea... [1]
更多...
收录类别
SCI [10]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
发表日期:2019
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
A Contrast Metric for Fraud Detection in Rich Graphs
期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2019, 卷号: 31, 期号: 12, 页码: 2235-2248
作者:
Liu, Shenghua
;
Hooi, Bryan
;
Faloutsos, Christos
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2020/12/10
Image edge detection
Topology
Measurement
Robustness
Time series analysis
Tensile stress
Manuals
Graph mining
time series
fraud detection
contrast suspiciousness
Dynamic Packet Forwarding Verification in SDN
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 期号: 6, 页码: 915-929
作者:
Li, Qi
;
Zou, Xiaoyue
;
Huang, Qun
;
Zheng, Jing
;
Lee, Patrick P. C.
收藏
  |  
浏览/下载:45/0
  |  
提交时间:2020/12/10
Control systems
Cryptography
Protocols
IP networks
Software
Prototypes
Delays
Software-defined networking
attacks
forwarding verification
A Novel Image Tamper Detection and Self-Recovery Algorithm Based on Watermarking and Chaotic System
期刊论文
MATHEMATICS, 2019, 卷号: 7, 期号: 10, 页码: 17
作者:
Li, Yewen
;
Song, Wei
;
Zhao, Xiaobing
;
Wang, Juan
;
Zhao, Lizhi
收藏
  |  
浏览/下载:48/0
  |  
提交时间:2020/12/10
image authentication
image recovery
smooth function
chaotic system
hierarchical tamper detection
Low powered blockchain consensus protocols based on consistent hash
期刊论文
FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2019, 卷号: 20, 期号: 10, 页码: 1361-1377
作者:
Yu, Lei
;
Zhao, Xiao-fang
;
Jin, Yan
;
Cai, Heng-yi
;
Wei, Bo
;
Hu, Bin
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2020/12/10
Blockchain
Consensus protocol
Consistent hash
Low energy consumption
Decentralization
TP301
Context aware intrusion detection for building automation systems
期刊论文
COMPUTERS & SECURITY, 2019, 卷号: 85, 页码: 181-201
作者:
Pan, Zhiwen
;
Hariri, Salim
;
Pacheco, Jesus
收藏
  |  
浏览/下载:76/0
  |  
提交时间:2019/12/10
Internet of Things
Network security
Context awareness
Supervised learning
Data mining
Intrusion detection
Edge Computing for Autonomous Driving: Opportunities and Challenges
期刊论文
PROCEEDINGS OF THE IEEE, 2019, 卷号: 107, 期号: 8, 页码: 1697-1716
作者:
Liu, Shaoshan
;
Liu, Liangkai
;
Tang, Jie
;
Yu, Bo
;
Wang, Yifan
;
Shi, Weisong
收藏
  |  
浏览/下载:43/0
  |  
提交时间:2020/12/10
Connected and autonomous vehicles (CAVs)
edge computing
heterogeneous computing
security
vehicle-to-everything (V2X)
vehicular operating system
Replay attack detection based on distortion by loudspeaker for voice authentication
期刊论文
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 卷号: 78, 期号: 7, 页码: 8383-8396
作者:
Ren, Yanzhen
;
Fang, Zhong
;
Liu, Dengkai
;
Chen, Changwen
收藏
  |  
浏览/下载:75/0
  |  
提交时间:2019/08/16
Automatic Speaker Verification (ASV)
Replay Attack Detection (RAD)
Loudspeaker
Low-frequency attenuation
Spoofing attack
Scan Chain Based Attacks and Countermeasures: A Survey
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 85055-85065
作者:
Li, Xiaowei
;
Li, Wenjie
;
Ye, Jing
;
Li, Huawei
;
Hu, Yu
收藏
  |  
浏览/下载:56/0
  |  
提交时间:2019/12/10
Scan chain based attacks
test mode
mode switch
signature
secure scan chain
secret key
physical unclonable function
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks
期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 卷号: 15, 期号: 4, 页码: 21
作者:
Zhang, Jun
;
Hou, Rui
;
Song, Wei
;
Mckee, Sally A.
;
Jia, Zhen
;
Zheng, Chen
;
Chen, Mingyu
;
Zhang, Lixin
;
Meng, Dan
收藏
  |  
浏览/下载:77/0
  |  
提交时间:2019/04/03
Code-reuse attacks
return-oriented programming attacks
message authentication code
AES-128
key management
PUF
PUFPass: A password management mechanism based on software/hardware codesign
期刊论文
INTEGRATION-THE VLSI JOURNAL, 2019, 卷号: 64, 页码: 173-183
作者:
Guo, Qingli
;
Ye, Jing
;
Li, Bing
;
Hu, Yu
;
Li, Xiaowei
;
Lan, Yazhu
;
Zhang, Guohe
收藏
  |  
浏览/下载:69/0
  |  
提交时间:2019/04/03
Password
Password management mechanism
PUF
Security
Usability