中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [20]
自动化研究所 [13]
中国科学院大学 [7]
计算技术研究所 [3]
遥感与数字地球研究所 [3]
沈阳自动化研究所 [3]
更多
采集方式
OAI收割 [50]
iSwitch采集 [7]
内容类型
期刊论文 [36]
会议论文 [14]
学位论文 [6]
SCI/SSCI论文 [1]
发表日期
2024 [1]
2022 [1]
2021 [3]
2020 [4]
2019 [1]
2018 [2]
更多
学科主题
Computer S... [1]
Computer S... [1]
Informatio... [1]
筛选
浏览/检索结果:
共57条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Integrating an abandoned farmland simulation model (AFSM) using system dynamics and CLUE-S for sustainable agriculture
期刊论文
OAI收割
AGRICULTURAL SYSTEMS, 2024, 卷号: 219, 页码: 104063
作者:
Song, Wei
;
Yang, Dazhi
;
Wang, Yanwei
  |  
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2024/08/22
Abandoned farmland
Scenario simulation
Food security
Land use
Spatio-temporal information
Mechanism explanation
Making Information Hiding Effective Again
期刊论文
OAI收割
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:
Wang, Zhe
;
Wu, Chenggang
;
Zhang, Yinqian
;
Tang, Bowen
;
Yew, Pen-Chung
  |  
收藏
  |  
浏览/下载:31/0
  |  
提交时间:2022/12/07
Instruction sets
Registers
Computer crashes
Entropy
Kernel
Security
Probes
Side channel attacks
information hiding
intra-process memory isolation
TLB misses
Content-adaptive image encryption with partial unwinding decomposition
期刊论文
OAI收割
SIGNAL PROCESSING, 2021, 卷号: 181, 页码: 14
作者:
Wu, Yongfei
;
Zhang, Liming
;
Qian, Tao
;
Liu, Xilin
;
Xie, Qiwei
  |  
收藏
  |  
浏览/下载:55/0
  |  
提交时间:2021/03/29
Information security
Image encryption
Image-content-adaptive encryption
Partial unwinding decomposition
Blockchain-Based Secured IPFS-Enable Event Storage Technique With Authentication Protocol in VANET
期刊论文
OAI收割
IEEE/CAA Journal of Automatica Sinica, 2021, 卷号: 8, 期号: 12, 页码: 1913-1922
作者:
Sanjeev Kumar Dwivedi
;
Ruhul Amin
;
Satyanarayana Vollala
  |  
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/09/03
Authentication
blockchain
interplanetary file system (
IPFS
)
secure information sharing
security
Research on attribute-based encryption access control technology in edge computing environment
会议论文
OAI收割
Beijing, China, October 22-24, 2021
作者:
Jiang YH(蒋一恒)
;
Zhang Chen
;
Zhang BW(张博文)(2.3)
;
Yuan DC(袁德成)
;
Wang C(王晨)
  |  
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/04/23
access control
attribute-based encryption
edge computing
edge nodes
information security
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
OAI收割
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
  |  
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
Intelligent city intelligent medical sharing technology based on internet of things technology
期刊论文
OAI收割
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 卷号: 111, 页码: 226-233
作者:
Zhao, Xin
;
Xiao, Wei
;
Wu, Lu
;
Zhao, Zhigang
;
Huo, Jidong
  |  
收藏
  |  
浏览/下载:40/0
  |  
提交时间:2020/12/10
Internet of things
Intelligent city
Intelligent medical sharing
Data encryption
Information security
Research and Implementation of Secure Industrial Communication Protocols
会议论文
OAI收割
Dalian, China, March 20-22, 2020
作者:
Wang JR(王靖然)
;
Liu MZ(刘明哲)
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2020/12/18
ICS information security
industrial communication protocols
identity authentication
data encryption
Modbus/TCP
Security monitoring method for ICS based on information gain ratio and maximum entropy model
会议论文
OAI收割
Shanghai, China, November 6-8, 2020
作者:
Li SG(李声刚)
;
Shang WL(尚文利)
;
Chen CY(陈春雨)
;
Lu, Yan
;
Dong, Zhiwei
  |  
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/03/14
Industrial control system
Information gain ratio
Maximum entropy model
Security monitoring
Attention-based Convolutional Approach for Misinformation Identification from Massive and Noisy Microblog Posts
期刊论文
OAI收割
computers & security, 2019, 期号: 83, 页码: 106-121
作者:
Yu, Feng
;
Liu, Qiang
;
Wu, Shu
;
Wang, Liang
;
Tan, Tieniu
  |  
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2020/06/08
information security
social network
misinformation identification
early detection
convolutional neural network