×
验证码:
换一张
忘记密码?
记住我
×
统一认证登录
登录
中文版
|
English
上海科技大学知识管理系统
ShanghaiTech University Knowledge Management System
统一认证登录
登录
注册
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
DOI
出处
存缴日期
收录类别
出版者
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
知识整合
学习讨论厅
在结果中检索
研究单元&专题
信息科学与技术学院 [6]
书院 [1]
科道书院 [1]
作者
张良峰 [2]
石远明 [1]
柯鹏震 [1]
周勇 [1]
王子鑫 [1]
郭晨 [1]
更多...
文献类型
期刊论文 [4]
会议论文 [2]
发表日期
2024 [1]
2023 [2]
2022 [2]
2021 [1]
出处
IEEE INTER... [2]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE WIREL... [1]
LECTURE NO... [1]
语种
英语 [6]
资助项目
Keysight T... [1]
National N... [1]
National N... [1]
Natural Sc... [1]
Natural Sc... [1]
Shanghai R... [1]
更多...
资助机构
收录类别
EI [6]
CPCI-S [2]
SCI [2]
CPCI [1]
SCIE [1]
SCOPUS [1]
更多...
状态
已发表 [6]
×
知识图谱
KMS
反馈留言
浏览/检索结果:
共6条,第1-6条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
发表日期升序
发表日期降序
作者升序
作者降序
题名升序
题名降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
期刊影响因子升序
期刊影响因子降序
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: PP, 期号: 99, 页码: 8172-8187
作者:
Stanislav Kruglik
;
Son Hoang Dau
;
Han Mao Kiah
;
Huaxiong Wang
;
Liang Feng Zhang
Adobe PDF(7286Kb)
|
收藏
|
浏览/下载:302/1
|
提交时间:2024/09/18
Data privacy
Communication cost
Data-base servers
Doublings
File sizes
Privacy
Private information retrieval
Private information retrieval protocols
Security
Unified framework
Verifiability
Private Information Retrieval with Result Verification for More Servers
会议论文
LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), Kyoto, Japan, June 19, 2023 - June 22, 2023
作者:
Ke, Pengzhen
;
Zhang, Liang Feng
Adobe PDF(599Kb)
|
收藏
|
浏览/下载:189/0
|
提交时间:2024/04/26
Computational complexity
Database systems
Information retrieval
Information theory
Cloud servers
Communication complexity
Data-base servers
Malicious server
Multiservers
Private information retrieval
Private information retrieval protocols
Result verifications
Security
Sublinear
Trustworthy Federated Learning via Blockchain
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2023, 卷号: 10, 期号: 1, 页码: 1-1
作者:
Yang, Zhanpeng
;
Shi, Yuanming
;
Zhou, Yong
;
Wang, Zixin
;
Yang, Kai
Adobe PDF(1581Kb)
|
收藏
|
浏览/下载:919/173
|
提交时间:2022/09/23
Blockchain
Deep learning
Energy utilization
Fault tolerance
Internet protocols
Learning algorithms
Markov processes
Network architecture
Network security
Reinforcement learning
Resource allocation
Safety engineering
Block-chain
Computational modelling
Consensus protocols
Federated learning
Long-term latency minimization
Minimisation
Resource management
Resources allocation
Trustworthy artificial intelligence
Wireless communications
Defending Cyber-physical Systems through Reverse Engineering Based Memory Sanity Check
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 10, 期号: 10, 页码: 1-1
作者:
Yangyang Geng
;
Yuqi Chen
;
Rongkuan Ma
;
Qiang Wei
;
Jie Pan
Adobe PDF(2006Kb)
|
收藏
|
浏览/下载:375/1
|
提交时间:2022/09/23
Cyber Physical System
Cybersecurity
Embedded systems
Internet of things
Internet protocols
Network security
Programmable logic controllers
Reverse engineering
Semantics
Analysis solution
Code
Cybe-physical systems
Cyber-physical systems
Memory attack
Password
Proprietary protocols
Real-world
Sanity check
Telecommunications traffic
GREYHOUND: Directed Greybox Wi-Fi Fuzzing
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 2, 页码: 1
作者:
Matheus E. Garbelini
;
Chundong Wang
;
Sudipta Chattopadhyay
Adobe PDF(2553Kb)
|
收藏
|
浏览/下载:392/9
|
提交时间:2020/09/01
Wireless Confidentiality
Protocols
Wireless communication
Communication system security
Fuzzing
Authentication
Tools
A Quantitative Study of Energy Consumption for Embedded Security
会议论文
IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, Nanjing, China, 39 March - 1 April 2021
作者:
Chen Guo
;
Yang Yang
;
Yanglin Zhou
;
Kuan Zhang
;
Song Ci
Adobe PDF(243Kb)
|
收藏
|
浏览/下载:664/3
|
提交时间:2021/04/27
Internet of Things
Embedded security
Energy consumption
Security algorithm
Energy efficiency
Internet of things
Network security
Program debugging
Static analysis
Energy characteristics
Energy efficient algorithms
Energy sensitive
Energy
consumption
Quantitative study
Security protocols
Security services
Static analysis method
首页
上一页
1
下一页
末页