CASIA OpenIR

浏览/检索结果: 共11条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Blockchain Intelligence: Intelligent Blockchains for Web 3.0 and Beyond 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 页码: 10
作者:  Li, Juanjuan;  Qin, Rui;  Guan, Sangtian;  Hou, Jiachen;  Wang, Fei-Yue
收藏  |  浏览/下载:10/0  |  提交时间:2024/03/27
Blockchains  Artificial intelligence  Semantic Web  Smart contracts  Security  Technological innovation  Behavioral sciences  Blockchain intelligence  foundation intelligence intelligent blockchain  intelligent contracts  Web 3.0  
A Survey on Attack Detection and Resilience for Connected and Automated Vehicles: From Vehicle Dynamics and Control Perspective 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2022, 卷号: 7, 期号: 4, 页码: 815-837
作者:  Ju, Zhiyang;  Zhang, Hui;  Li, Xiang;  Chen, Xiaoguang;  Han, Jinpeng;  Yang, Manzhi
收藏  |  浏览/下载:71/0  |  提交时间:2023/03/20
Connected vehicles  Anomaly detection  Connected and automated vehicles  attack  anomaly detection  resilience strategy  safety and security  
Crowdsensing Intelligence by Decentralized Autonomous Vehicles Organizations and Operations 期刊论文
IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, 2022, 卷号: 7, 期号: 4, 页码: 804-808
作者:  Zhu, Zhengqiu;  Wang, Xiao;  Zhao, Yong;  Qiu, Sihang;  Liu, Zhong;  Chen, Bin;  Wang, Fei-Yue
收藏  |  浏览/下载:62/0  |  提交时间:2023/03/20
Blockchains  Autonomous vehicles  Smart contracts  Privacy  Crowdsensing  Security  Data privacy  Connected vehicles  Connected and autonomous vehicles  vehicular crowdsensing  blockchain technology  
Coordinated Cyber Security Enhancement for Grid-Transportation Systems With Social Engagement 期刊论文
IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2022, 页码: 15
作者:  Zhao, Pengfei;  Li, Shuangqi;  Hu, Paul Jen-Hwa;  Cao, Zhidong;  Gu, Chenghong;  Xie, Da;  Zeng, Daniel Dajun
收藏  |  浏览/下载:180/0  |  提交时间:2022/11/14
Transportation  Computer crime  Renewable energy sources  Smart cities  Vehicle-to-grid  Uncertainty  Turbines  Cyber-attack  cyber security  electric vehicle  false data injection attacks  multi-energy system  smart city manage-ment  social effort  
Switching Event-Triggered Adaptive Resilient Dynamic Surface Control for Stochastic Nonlinear CPSs With Unknown Deception Attacks 期刊论文
IEEE TRANSACTIONS ON CYBERNETICS, 2022, 页码: 9
作者:  Niu, Ben;  Chen, Wendi;  Su, Wei;  Wang, Huanqing;  Wang, Ding;  Zhao, Xudong
收藏  |  浏览/下载:171/0  |  提交时间:2022/11/14
Switches  Stochastic processes  Security  Heuristic algorithms  Actuators  Nonlinear systems  Control design  Dynamic surface control (DSC)  stochastic nonlinear cyber-physical systems (CPSs)  switching threshold event-triggered control  unknown deception attacks  
Relentless False Data Injection Attacks Against Kalman-Filter-Based Detection in Smart Grid 期刊论文
IEEE Transactions on Control of Network Systems, 2022, 卷号: 9, 期号: 3, 页码: 1238-1250
作者:  Liu, Yifa;  Cheng, Long
Adobe PDF(792Kb)  |  收藏  |  浏览/下载:166/28  |  提交时间:2022/11/14
Attack sequence  false data injection  Kalman filter  smart grid security  state estimation  
Indexing-Min-Max Hashing: Relaxing the Security-Performance Tradeoff for Cancelable Fingerprint Templates 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2022, 页码: 12
作者:  Li, Yuxing;  Pang, Liaojun;  Zhao, Heng;  Cao, Zhicheng;  Liu, Eryun;  Tian, Jie
收藏  |  浏览/下载:190/0  |  提交时间:2022/03/17
Biometrics (access control)  Transforms  Cryptography  Privacy  Hash functions  Feature extraction  Life sciences  Biometrics template protection  cancelable fingerprint template  fixed-length fingerprint representation  Indexing-Min-Max (IMM) hashing  security-performance tradeoff  
Are You Confident That You Have Successfully Generated Adversarial Examples? 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2021, 卷号: 31, 期号: 6, 页码: 2089-2099
作者:  Wang, Bo;  Zhao, Mengnan;  Wang, Wei;  Wei, Fei;  Qin, Zhan;  Ren, Kui
Adobe PDF(2235Kb)  |  收藏  |  浏览/下载:293/31  |  提交时间:2021/08/15
Perturbation methods  Iterative methods  Computational modeling  Neural networks  Security  Training  Robustness  Deep neural networks  adversarial examples  structural black box  buffer  
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:  Zhang, Zhixia;  Cao, Yang;  Cui, Zhihua;  Zhang, Wensheng;  Chen, Jinjun
收藏  |  浏览/下载:182/0  |  提交时间:2021/08/15
Intrusion detection  Security  6G mobile communication  Data models  Protocols  Optimization  Encryption  Controller area network (CAN)  intrusion detection  machine learning (ML)  many-objective optimization  vehicular networks security  
Content-adaptive image encryption with partial unwinding decomposition 期刊论文
SIGNAL PROCESSING, 2021, 卷号: 181, 页码: 14
作者:  Wu, Yongfei;  Zhang, Liming;  Qian, Tao;  Liu, Xilin;  Xie, Qiwei
收藏  |  浏览/下载:143/0  |  提交时间:2021/03/29
Information security  Image encryption  Image-content-adaptive encryption  Partial unwinding decomposition