CASIA OpenIR

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Optimal Resource Allocation and Feasible Hexagonal Topology for Cyber-Physical Systems 期刊论文
Journal of Systems Science and Complexity, 2023, 页码: 1-26
作者:  Liu, Yifa;  Cheng, Long
Adobe PDF(1696Kb)  |  收藏  |  浏览/下载:190/91  |  提交时间:2023/06/29
Completely Stealthy FDI Attack Against State Estimation in Networked Control Systems 期刊论文
IEEE Transactions on Circuits and Systems II: Express Briefs, 2023, 卷号: 70, 期号: 3, 页码: 1114-1118
作者:  Liu, Yifa;  Long, Cheng
Adobe PDF(405Kb)  |  收藏  |  浏览/下载:114/43  |  提交时间:2023/06/28
False data injection attack, estimation, complete stealthiness, detection, networked control systems  
Optimal defense resource allocation and geographically feasible hexagonal topology construction for power grid security 会议论文
Communications in Computer and Information Science, Hangzhou, China, 2021 22-24 October
作者:  Liu, Yifa;  Cheng, Long
Adobe PDF(756Kb)  |  收藏  |  浏览/下载:103/39  |  提交时间:2023/06/28
Adaptive model-based dynamic event-triggered output feedback control of a robotic manipulator with disturbance 期刊论文
ISATransactions, 2021, 页码: 64-78
作者:  Gao jie;  Kang Erlong;  He Wei;  Qiao hong
Adobe PDF(2719Kb)  |  收藏  |  浏览/下载:239/90  |  提交时间:2022/06/14
Universal adversarial perturbations against object detection 期刊论文
PATTERN RECOGNITION, 2021, 卷号: 110, 期号: 无, 页码: 107584
作者:  Li, Debang;  Zhang, Junge;  Huang, Kaiqi
Adobe PDF(4553Kb)  |  收藏  |  浏览/下载:292/35  |  提交时间:2021/01/06
Adversarial examples  Object detection  Universal adversarial perturbation  
Reorganization of rich-clubs in functional brain networks during propofol-induced unconsciousness and natural sleep 期刊论文
NEUROIMAGE-CLINICAL, 2020, 期号: 25, 页码: 18
作者:  Wang Shengpei;  Yun, Li;  Shuang, Qiu;  Zhang Chuncheng;  Wang Guyan;  Xian Junfang;  Li, Tianzuo;  He Huiguang
浏览  |  Adobe PDF(4758Kb)  |  收藏  |  浏览/下载:306/55  |  提交时间:2020/06/02
Resting-state functional magnetic resonance images (rs-fMRI)  Brain network  Rich-club organization  Propofol-induced sedation  Natural sleep  
Evolutionary dynamics of cryptocurrency transaction networks: An empirical study 期刊论文
PLOS ONE, 2018, 卷号: 13, 期号: 8, 页码: 1-18
作者:  Jiaqi, Liang;  Linjing, Li;  Daniel, Zeng
浏览  |  Adobe PDF(4131Kb)  |  收藏  |  浏览/下载:341/56  |  提交时间:2018/10/10
cryptocurrency  blockchain  bitcoin  transaction networks  network analysis  
Associated Activation-Driven Enrichment: Understanding Implicit Information from a Cognitive Perspective 期刊论文
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2017, 卷号: 29, 期号: 12, 页码: 2655-2668
作者:  Bai, Jie;  Li, Linjing;  Zeng, Daniel;  Li, Qiudan
浏览  |  Adobe PDF(3183Kb)  |  收藏  |  浏览/下载:389/78  |  提交时间:2018/01/04
Text Analysis  Knowledge Representation  Cognitive Simulation  Association Rules  
A Security and Privacy Review of VANETs 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 卷号: 16, 期号: 6, 页码: 2985-2996
作者:  Qu, Fengzhong;  Wu, Zhihui;  Wang, Fei-Yue;  Cho, Woong
浏览  |  Adobe PDF(1031Kb)  |  收藏  |  浏览/下载:536/232  |  提交时间:2016/01/18
Vanets  Security  Privacy  Survey  
Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection 期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2014, 卷号: 44, 期号: 1, 页码: 66-82
作者:  Hu, Weiming;  Gao, Jun;  Wang, Yanguo;  Wu, Ou;  Maybank, Stephen;  Weiming Hu
浏览  |  Adobe PDF(2100Kb)  |  收藏  |  浏览/下载:393/156  |  提交时间:2015/08/12
Dynamic Distributed Detection  Network Intrusions  Online Adaboost Learning  Parameterized Model