CSpace

Browse/Search Results:  1-10 of 78 Help

Selected(0)Clear Items/Page:    Sort:
System Identification With Binary-Valued Observations Under Data Tampering Attacks 期刊论文
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 卷号: 66, 期号: 8, 页码: 3825-3832
Authors:  Guo, Jin;  Wang, Xuebin;  Xue, Wenchao;  Zhao, Yanlong
Favorite  |  View/Download:8/0  |  Submit date:2021/10/26
Estimation  Sensor systems  Security  Communication networks  Automation  Production  Binary-valued observations  compensation-oriented defense scheme  data tampering attack  system identification  
Privacy security in control systems 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2021, 卷号: 64, 期号: 7, 页码: 3
Authors:  Zhang, Jifeng;  Tan, Jianwei;  Wang, Jimin
Favorite  |  View/Download:19/0  |  Submit date:2021/06/01
A ROC-based test for evaluating the group difference with an application to neonatal audiology screening 期刊论文
STATISTICS IN MEDICINE, 2021, 页码: 12
Authors:  Tang, Larry L.;  Meng, Zhen;  Li, Qizhai
Favorite  |  View/Download:2/0  |  Submit date:2021/10/26
ROC curve  sensitivity  specificity  two‐  sample comparison  
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2021, 页码: 18
Authors:  Li, Haoyu;  Liu, Renzhang;  Liu, Zhen;  Pan, Yanbin;  Xie, Tianyuan
Favorite  |  View/Download:9/0  |  Submit date:2021/06/01
Ciphertext-only attack  Compact-LWE  NIST  post-quantum cryptography  
Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project 期刊论文
IET INFORMATION SECURITY, 2020, 卷号: 14, 期号: 3, 页码: 313-320
Authors:  Liu, Zhen;  Pan, Yanbin;  Xie, Tianyuan
Favorite  |  View/Download:20/0  |  Submit date:2020/10/12
decoding  public key cryptography  quantum cryptography  computational complexity  optimisation  cyclic codes  IND-CPA security  NIST PQC project  hamming quasicyclic cryptosystem  code-based key encapsulation mechanism  NIST standardisation process  public-key encryption scheme  IND-CCA2 secure KEM  revised scheme HQC- beta  HQC cryptosystem  s-DQCSD problem  s-decision quasi-cyclic syndrome decoding  plaintext attack  
Framework and algorithms for identifying honest blocks in blockchain 期刊论文
PLOS ONE, 2020, 卷号: 15, 期号: 1, 页码: 14
Authors:  Wang, Xu;  Gan, Guohua;  Wu, Ling-Yun
Favorite  |  View/Download:44/0  |  Submit date:2020/06/30
HAPE: A programmable big knowledge graph platform 期刊论文
INFORMATION SCIENCES, 2020, 卷号: 509, 页码: 87-103
Authors:  Lu, Ruqian;  Fei, Chaoqun;  Wang, Chuanqing;  Gao, Shunfeng;  Qiu, Han;  Zhang, Songmao;  Cao, Cungen
Favorite  |  View/Download:35/0  |  Submit date:2020/05/24
Big knowledge  Big knowledge system  Big knowledge graph  Knowledge graph browser  Knowledge graph operating system  Knowledge scripting language  Big knowledge security  
区块链性能的量化分析研究 期刊论文
计算机工程与应用, 2020, 卷号: 56, 期号: 3, 页码: 55-60
Authors:  王旭;  甘国华;  吴凌云
Favorite  |  View/Download:65/0  |  Submit date:2020/06/30
Blockchain  performance  security  Transactions Per Second(TPS)  区块链  性能  安全性  每秒交易处理量  
Learning implicit information in Bayesian games with knowledge transfer 期刊论文
Control Theory and Technology, 2020, 卷号: 18, 期号: 3, 页码: 315-323
Authors:  Chen Guanpu;  Cao Kai;  Hong Yiguang
Favorite  |  View/Download:67/0  |  Submit date:2021/01/14
Bayesian game  repeated game  knowledge transfer  security  
Sustainable supply chain evaluation: A dynamic double frontier network DEA model with interval type-2 fuzzy data 期刊论文
INFORMATION SCIENCES, 2019, 卷号: 504, 页码: 394-421
Authors:  Zhou, Xiaoyang;  Wang, Ying;  Chai, Jian;  Wang, Liqin;  Wang, Shouyang;  Lev, Benjamin
Favorite  |  View/Download:56/0  |  Submit date:2020/01/10
Sustainable supply chain  Dynamic network DEA  Double frontiers  Interval type-2 fuzzy sets