×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [61]
作者
Zhang, Yuj... [4]
Fang, Binx... [3]
Li, Yang [3]
Tan, Liang [3]
Yu, Keping [3]
Cai, Yi [2]
更多...
文献类型
期刊论文 [61]
发表日期
2023 [4]
2022 [7]
2021 [8]
2020 [10]
2019 [6]
2018 [2]
更多...
语种
英语 [61]
出处
COMPUTERS ... [4]
IEEE NETWO... [4]
IEEE TRANS... [4]
COMPUTER C... [3]
IEEE TRANS... [3]
JOURNAL OF... [3]
更多...
资助项目
National N... [3]
Sichuan Pr... [3]
Sichuan Pr... [3]
Beijing In... [2]
China Post... [2]
China Post... [2]
更多...
收录类别
SCI [60]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共61条,第1-10条
帮助
限定条件
专题:英文
第一作者的第一单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
BoAu: Malicious traffic detection with noise labels based on boundary augmentation
期刊论文
COMPUTERS & SECURITY, 2023, 卷号: 131, 页码: 13
作者:
Yuan, Qingjun
;
Liu, Chang
;
Yu, Wentao
;
Zhu, Yuefei
;
Xiong, Gang
;
Wang, Yongjuan
;
Gou, Gaopeng
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Malicious traffic detection
Deep learning
Learning with noise labels
Decision boundaries
Encrypted traffic
Swarm Intelligence-Based Task Scheduling for Enhancing Security for IoT Devices
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 6, 页码: 1756-1769
作者:
Zhou, Junlong
;
Shen, Yufan
;
Li, Liying
;
Zhuo, Cheng
;
Chen, Mingsong
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Security
Internet of Things
Task analysis
Logic gates
Servers
Particle swarm optimization
Optimization
Energy efficiency
fund
Index Terms
Internet of Things (IoT)
mixed-integer linear programming (MILP)
security
swarm intelligence
task scheduling
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:
Lv, Hao
;
Li, Bing
;
Zhang, Lei
;
Liu, Cheng
;
Wang, Ying
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Security
Hardware
Neuromorphic engineering
Computational modeling
Circuit faults
Resistance
Immune system
Adversarial attack
fault injection attack
neuromorphic computing system (NCS)
processing in memory
reliability
resistive memory
Website-Aware Protocol Confusion Network for Emergent HTTP/3 Website Fingerprinting
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 卷号: 18, 页码: 2427-2439
作者:
Zhan, Mengqi
;
Li, Yang
;
Zhu, Yongchun
;
Yu, Guangxi
;
Zhang, Yan
;
Li, Bo
;
Wang, Weiping
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/12/04
Protocols
Feature extraction
Monitoring
Training
Servers
Metadata
Web sites
Website fingerprinting
HTTP/3
QUIC
traffic analysis
A Bilayer Scalable Nakamoto Consensus Protocol for Blockchain Systems
期刊论文
IEEE NETWORK, 2022, 卷号: 36, 期号: 3, 页码: 174-182
作者:
Jiao, Zhenzhen
;
Tian, Rui
;
Shang, Dezhong
;
Ding, Hui
;
Zhang, Baoxian
;
Li, Cheng
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2022/12/07
Measurement
Leadership
Voting
Scalability
Throughput
Consensus protocol
Security
Characterising Usage Patterns and Privacy Risks of a Home Security Camera Service
期刊论文
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 卷号: 21, 期号: 7, 页码: 2344-2357
作者:
Li, Jinyang
;
Li, Zhenyu
;
Tyson, Gareth
;
Xie, Gaogang
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/12/07
Cameras
Privacy
Streaming media
Servers
Motion detection
Mobile computing
Feeds
Home security camera
IoT
privacy
usage pattern
Quantum Network: Security Assessment and Key Management
期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 卷号: 30, 期号: 3, 页码: 1328-1339
作者:
Zhou, Hongyi
;
Lv, Kefan
;
Huang, Longbo
;
Ma, Xiongfeng
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/12/07
Security
Quantum networks
Computer hacking
Data communication
Task analysis
Routing
Quantum channels
Quantum key distribution
Lyapunov analysis
queueing
Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness
期刊论文
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 卷号: 11, 期号: 3, 页码: 69-78
作者:
Tan, Liang
;
Yu, Keping
;
Ming, Fangpeng
;
Cheng, Xiaofan
;
Srivastava, Gautam
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/12/07
LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV
期刊论文
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 页码: 16
作者:
Zhang, Mingyue
;
Zhou, Junlong
;
Cong, Peijin
;
Zhang, Gongxuan
;
Zhuo, Cheng
;
Hu, Shiyan
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2022/12/07
Forensics
Authentication
Security
Privacy
Computer architecture
Cameras
Message authentication
Anonymous authentication
forensic service
lightweight
incentive
Internet of Vehicles
security
Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach
期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 卷号: 9, 期号: 1, 页码: 271-281
作者:
Tan, Liang
;
Yu, Keping
;
Shi, Na
;
Yang, Caixia
;
Wei, Wei
;
Lu, Huimin
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2022/12/07
COVID-19
Blockchains
Encryption
Privacy
Hospitals
Outsourcing
Authorization
Blockchain
security and privacy protection
traceable and revocation
COVID-19
electronic medical records