CASIA OpenIR

浏览/检索结果: 共48条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Blockchain Intelligence: Intelligent Blockchains for Web 3.0 and Beyond 期刊论文
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 页码: 10
作者:  Li, Juanjuan;  Qin, Rui;  Guan, Sangtian;  Hou, Jiachen;  Wang, Fei-Yue
收藏  |  浏览/下载:12/0  |  提交时间:2024/03/27
Blockchains  Artificial intelligence  Semantic Web  Smart contracts  Security  Technological innovation  Behavioral sciences  Blockchain intelligence  foundation intelligence intelligent blockchain  intelligent contracts  Web 3.0  
Security and Privacy in Solar Insecticidal Lamps Internet of Things: Requirements and Challenges 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 1, 页码: 58-73
作者:  Qingsong Zhao;  Lei Shu;  Kailiang Li;  Mohamed Amine Ferrag;  Ximeng Liu;  Yanbin Li
Adobe PDF(3374Kb)  |  收藏  |  浏览/下载:203/151  |  提交时间:2024/01/02
Challenges  Internet of Things (IoT)  privacy and security  security requirements  solar insecticidal lamps (SIL)  
Quantization and Event-Triggered Policy Design for Encrypted Networked Control 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2024, 卷号: 11, 期号: 4, 页码: 946-955
作者:  Yongxia Shi;  Ehsan Nekouei
Adobe PDF(1715Kb)  |  收藏  |  浏览/下载:19/6  |  提交时间:2024/03/18
Cyber-security  encrypted control  event-triggered control (ETC)  networked control systems (NCSs)  semi-homomorphic encryption  
Automation and Orchestration of Zero Trust Architecture: Potential Solutions and Challenges 期刊论文
Machine Intelligence Research, 2024, 卷号: 21, 期号: 2, 页码: 294-317
作者:  Yang Cao;  Shiva Raj Pokhrel;  Ye Zhu;  Robin Doss;  Gang Li
Adobe PDF(1391Kb)  |  收藏  |  浏览/下载:3/1  |  提交时间:2024/04/23
Zero trust architecture, cyber security, artificial intelligence, access control, authentication  
Novel methods for locating and matching IC cells based on standard cell libraries 期刊论文
MICROELECTRONIC ENGINEERING, 2024, 卷号: 283, 页码: 12
作者:  Liu, Can;  Wang, Kaige;  Li, Qing;  Zhao, Fazhan;  Zhao, Kun;  Ma, Hongtu
收藏  |  浏览/下载:42/0  |  提交时间:2024/02/22
Reverse engineering  Integrated circuits  Scanning electron microscopy  Image processing  Hardware security  
Digger: A Graph Contraction Algorithm for Patrolling Games 期刊论文
IEEE TRANSACTIONS ON RELIABILITY, 2023, 页码: 13
作者:  Han, Jinpeng;  Wang, Zhen;  Chen, Xiaoguang;  Yang, Manzhi;  Wang, Fei-Yue
收藏  |  浏览/下载:32/0  |  提交时间:2024/02/22
Games  Security  Game theory  Resource management  Runtime  Roads  Cyberspace  Graph contraction  minimum vertex cut  patrolling game  security game  Stackelberg game  
Protecting by attacking: A personal information protecting method with cross-modal adversarial examples 期刊论文
NEUROCOMPUTING, 2023, 卷号: 551, 页码: 11
作者:  Zhao, Mengnan;  Wang, Bo;  Guo, Weikuo;  Wang, Wei
收藏  |  浏览/下载:59/0  |  提交时间:2023/11/17
Security  Cross-modal  Image captioning  Adversarial attacks  
Trustworthy Localization With EM-Based Federated Control Scheme for IIoTs 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 卷号: 19, 期号: 1, 页码: 1069-1079
作者:  Wang, Zhaoyang;  Wang, Song;  Zhao, Zhiyao;  Sun, Muyi
收藏  |  浏览/下载:136/0  |  提交时间:2023/03/20
Location awareness  Industrial Internet of Things  Collaboration  Security  Cloud computing  Encryption  Privacy  Collaborative Cloud-Edge-End  expectation maximization (EM)  federated control  industrial Internet of Things (IIoT)  trustworthy localization  
Detecting Vulnerability on IoT Device Firmware: A Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 1, 页码: 25-41
作者:  Xiaotao Feng;  Xiaogang Zhu;  Qing-Long Han;  Wei Zhou;  Sheng Wen;  Yang Xiang
Adobe PDF(3134Kb)  |  收藏  |  浏览/下载:492/326  |  提交时间:2023/01/03
Firmware emulation  internet of things (IoT) firmware  network fuzzing  security  static analysis  
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey 期刊论文
IEEE/CAA Journal of Automatica Sinica, 2023, 卷号: 10, 期号: 8, 页码: 1647-1667
作者:  Li Duan;  Yangyang Sun;  Wei Ni;  Weiping Ding;  Jiqiang Liu;  Wei Wang
Adobe PDF(2148Kb)  |  收藏  |  浏览/下载:96/23  |  提交时间:2023/07/20
Blockchain  cross-chain  defense  distributed private key control  hash-locking  notary  security threats  sidechain/relay