中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [10]
计算技术研究所 [2]
数学与系统科学研究院 [2]
自动化研究所 [2]
长春光学精密机械与物... [1]
武汉物理与数学研究所 [1]
更多
采集方式
OAI收割 [19]
内容类型
期刊论文 [10]
会议论文 [8]
学位论文 [1]
发表日期
2022 [2]
2021 [2]
2020 [2]
2010 [1]
2009 [1]
2008 [2]
更多
学科主题
Engineerin... [2]
筛选
浏览/检索结果:
共19条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Secure Dual-Functional Radar-Communication Transmission: Exploiting Interference for Resilience Against Target Eavesdropping
期刊论文
OAI收割
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2022, 卷号: 21, 期号: 9, 页码: 7238-7252
作者:
Su, Nanchi
;
Liu, Fan
;
Wei, Zhongxiang
;
Liu, Ya-Feng
;
Masouros, Christos
  |  
收藏
  |  
浏览/下载:33/0
  |  
提交时间:2023/02/07
Radar
Signal to noise ratio
Wireless communication
Copper
Security
Radar detection
Precoding
Dual-functional radar-communication system
millimeter-wave
physical layer security
direction modulation
constructive interference
fractional programming
Quantum Network: Security Assessment and Key Management
期刊论文
OAI收割
IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 卷号: 30, 期号: 3, 页码: 1328-1339
作者:
Zhou, Hongyi
;
Lv, Kefan
;
Huang, Longbo
;
Ma, Xiongfeng
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/12/07
Security
Quantum networks
Computer hacking
Data communication
Task analysis
Routing
Quantum channels
Quantum key distribution
Lyapunov analysis
queueing
System Identification With Binary-Valued Observations Under Data Tampering Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 卷号: 66, 期号: 8, 页码: 3825-3832
作者:
Guo, Jin
;
Wang, Xuebin
;
Xue, Wenchao
;
Zhao, Yanlong
  |  
收藏
  |  
浏览/下载:112/0
  |  
提交时间:2021/10/26
Estimation
Sensor systems
Security
Communication networks
Automation
Production
Binary-valued observations
compensation-oriented defense scheme
data tampering attack
system identification
A Many-Objective Optimization Based Intelligent Intrusion Detection Algorithm for Enhancing Security of Vehicular Networks in 6G
期刊论文
OAI收割
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 卷号: 70, 期号: 6, 页码: 5234-5243
作者:
Zhang, Zhixia
;
Cao, Yang
;
Cui, Zhihua
;
Zhang, Wensheng
;
Chen, Jinjun
  |  
收藏
  |  
浏览/下载:59/0
  |  
提交时间:2021/08/15
Intrusion detection
Security
6G mobile communication
Data models
Protocols
Optimization
Encryption
Controller area network (CAN)
intrusion detection
machine learning (ML)
many-objective optimization
vehicular networks security
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
OAI收割
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
  |  
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
Research and Implementation of Secure Industrial Communication Protocols
会议论文
OAI收割
Dalian, China, March 20-22, 2020
作者:
Wang JR(王靖然)
;
Liu MZ(刘明哲)
;
Xu AD(徐皑冬)
;
Hu B(胡波)
;
Han XJ(韩晓佳)
  |  
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2020/12/18
ICS information security
industrial communication protocols
identity authentication
data encryption
Modbus/TCP
adaptive voice stream multicast over low-power wireless networks
会议论文
OAI收割
31st IEEE Real-Time Systems Symposium, RTSS 2010, San Diego, CA, 40850
Liqun Li
;
Guoliang Xing
;
Qi Han
;
Limin Sun
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2011/03/31
ad hoc voice communication
adaptive voice stream multicast
coding redundancy ratio
coordination rules
disaster response
distributed admission control algorithm
forward error correction
forwarder selection
low-power wireless networks
security surveillance
tree-based opportunistic routing protocol
voice quality
ad hoc networks
audio streaming
forward error correction
multicast communication
routing protocols
telecommunication congestion control
voice communication
qvs: quality-aware voice streaming for wireless sensor networks
会议论文
OAI收割
29th IEEE International Conference on Distributed Computing Systems, Montreal, CANADA, JUN 22-26,
Li Liqun
;
Xing Guoliang
;
Sun Limin
;
Liu Yan
  |  
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2011/03/20
disaster management
duplication adaptation
dynamic voice compression
quality-aware voice streaming
security surveillance
voice quality evaluation
wireless audio communication
wireless sensor networks
audio streaming
wireless sensor networks
A new authentication protocol for wireless communication network based on IEEE802.16 (EI CONFERENCE)
会议论文
OAI收割
2008 International Symposium on Parallel and Distributed Processing with Applications, ISPA 2008, December 10, 2008 - December 12, 2008, Sydney, NSW, Australia
Li R.
;
Fang Z.
;
Cao W.
;
Yin Y.
;
Xu P.
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2013/03/25
After analyzing the specific security requirements of the wireless communication network based on IEEE802.16
a series of key issues about security methods and techniques were researched. A new authentication protocol for wireless mobile environment was proposed and designed. Then
its security was analyzed from the angle of technical realization and formal analysis to verify whether the original safety goals were achieved. Especially
formal analysis was mostly done. Finally
system testing was also carried out and the results were analyzed to verify function and performance of the new protocol. 2008 IEEE.
analysis of an authenticated identity-based multicast scheme
期刊论文
OAI收割
IET COMMUNICATIONS, 2008, 卷号: 2, 期号: 7, 页码: 935-937
Lin X. -J.
;
Wu C. -K
;
Liu F.
  |  
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2011/06/10
authenticated identity-based multicast scheme
bilinear pairing
ciphertext
message authentication
multicast communication
telecommunication security