CASIA OpenIR

浏览/检索结果: 共66条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges 期刊论文
Machine Intelligence Research, 2024, 卷号: 21, 期号: 2, 页码: 294-317
作者:  Yang Cao;  Shiva Raj Pokhrel;  Ye Zhu;  Robin Doss;  Gang Li
Adobe PDF(1391Kb)  |  收藏  |  浏览/下载:30/6  |  提交时间:2024/04/23
Zero trust architecture, cyber security, artificial intelligence, access control, authentication  
OTB-morph: One-time Biometrics via Morphing 期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 6, 页码: 855-871
作者:  Mahdi Ghafourian;  Julian Fierrez;  Ruben Vera-Rodriguez;  Aythami Morales;  Ignacio Serna
Adobe PDF(6296Kb)  |  收藏  |  浏览/下载:4/1  |  提交时间:2024/04/23
Biometrics, face recognition, template protection, morphing, security  
Federated Learning with Privacy-preserving and Model IP-right-protection 期刊论文
Machine Intelligence Research, 2023, 卷号: 20, 期号: 1, 页码: 19-37
作者:  Qiang Yang;  Anbu Huang;  Lixin Fan;  Chee Seng Chan;  Jian Han Lim;  Kam Woh Ng;  Ding Sheng Ong;  Bowen Li
Adobe PDF(2634Kb)  |  收藏  |  浏览/下载:18/5  |  提交时间:2024/04/23
Federated learning  privacy-preserving machine learning  security  decentralized learning  intellectual property protection  
Blockchain Intelligence: Intelligent Blockchains for Web 3.0 and Beyond 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 页码: 10
作者:  Li, Juanjuan;  Qin, Rui;  Guan, Sangtian;  Hou, Jiachen;  Wang, Fei-Yue
收藏  |  浏览/下载:40/0  |  提交时间:2024/03/27
Blockchains  Artificial intelligence  Semantic Web  Smart contracts  Security  Technological innovation  Behavioral sciences  Blockchain intelligence  foundation intelligence intelligent blockchain  intelligent contracts  Web 3.0  
Quantization and Event-Triggered Policy Design for Encrypted Networked Control 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:  Yongxia Shi;  Ehsan Nekouei
Adobe PDF(1715Kb)  |  收藏  |  浏览/下载:30/8  |  提交时间:2024/03/18
Cyber-security  encrypted control  event-triggered control (ETC)  networked control systems (NCSs)  semi-homomorphic encryption  
Novel methods for locating and matching IC cells based on standard cell libraries 期刊论文
MICROELECTRONIC ENGINEERING, 2024, 卷号: 283, 页码: 12
作者:  Liu, Can;  Wang, Kaige;  Li, Qing;  Zhao, Fazhan;  Zhao, Kun;  Ma, Hongtu
收藏  |  浏览/下载:60/0  |  提交时间:2024/02/22
Reverse engineering  Integrated circuits  Scanning electron microscopy  Image processing  Hardware security  
Digger: A Graph Contraction Algorithm for Patrolling Games 期刊论文
IEEE TRANSACTIONS ON RELIABILITY, 2023, 页码: 13
作者:  Han, Jinpeng;  Wang, Zhen;  Chen, Xiaoguang;  Yang, Manzhi;  Wang, Fei-Yue
收藏  |  浏览/下载:49/0  |  提交时间:2024/02/22
Games  Security  Game theory  Resource management  Runtime  Roads  Cyberspace  Graph contraction  minimum vertex cut  patrolling game  security game  Stackelberg game  
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:  Qingsong Zhao;  Lei Shu;  Kailiang Li;  Mohamed Amine Ferrag;  Ximeng Liu;  Yanbin Li
Adobe PDF(3374Kb)  |  收藏  |  浏览/下载:239/170  |  提交时间:2024/01/02
Challenges  Internet of Things (IoT)  privacy and security  security requirements  solar insecticidal lamps (SIL)  
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples 期刊论文
NEUROCOMPUTING, 2023, 卷号: 551, 页码: 11
作者:  Zhao, Mengnan;  Wang, Bo;  Guo, Weikuo;  Wang, Wei
收藏  |  浏览/下载:76/0  |  提交时间:2023/11/17
Security  Cross-modal  Image captioning  Adversarial attacks  
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:111/24  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay