全部 |
  • 全部
  • 题名
  • 关键词
  • NSTL主题词
  • 摘要
  • 论文-出处
  • 论文-作者
  • 论文-机构
  • 论文-DOI
  • 期刊-出版者
  • 期刊-出版地
  • 期刊-主编
  • ISSN
  • EISSN
  • ISBN
  • EISBN
检索 搜索期刊 二次检索 AI检索
外文文献 中文文献
筛选条件:

1. Handwritten Signature Verification via Multimodal Consistency Learning NSTL国家科技图书文献中心

Zhaosen Shi |  Fagen Li... -  《IEEE transactions on information forensics and security》 - 2025,20 - 3995~4007 - 共13页

摘要:Multimodal handwritten signatures usually involve offline images and online sequences. Since in real-world scenarios, different modalities of the same signature are generated simultaneously, most rese...
关键词: Videos |  Feature extraction |  Forgery |  Hands |  Visualization |  Three-dimensional displays |  Brain modeling |  Analytical models |  Long short term memory |  Deep learning

2. Blockchain-based conditional privacy-preserving authentication scheme using PUF for vehicular ad hoc networks NSTL国家科技图书文献中心

Ling Xiong |  Qiang Li... -  《Future generations computer systems》 - 2025,163(Feb.) - 107530.1~107530.13 - 共13页

摘要:Vehicular ad hoc networks (VANET) have been the key indispensable module of the future intelligent transportation system. Security and privacy are two essential attributes that protect the safe drivin...
关键词: Authentication |  Vehicular ad hoc networks |  Unlinkability |  Privacy-preserving

3. A Synthetic Data-Assisted Satellite Terrestrial Integrated Network Intrusion Detection Framework NSTL国家科技图书文献中心

Junpeng He |  Xiong Li... -  《IEEE transactions on information forensics and security》 - 2025,20 - 1739~1754 - 共16页

摘要:The Satellite-Terrestrial Integrated Network (STIN) is an emerging paradigm offering seamless network services across geographical boundaries, yet it faces significant security challenges, including l...
关键词: Training |  Data models |  Satellites |  Data augmentation |  Synthetic data |  Space-air-ground integrated networks |  Federated learning |  Diffusion models |  Mathematical models |  Image edge detection

4. Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing NSTL国家科技图书文献中心

Nabeil Eltayieb |  Rashad Elhabob... -  《Future generations computer systems》 - 2025,162(Jan.) - 107478.1~107478.14 - 共14页

摘要:Cloud computing has enabled data-sharing to be more convenient than ever before. However, data security is a major concern that prevents cloud computing from being widely adopted. A potential solution...
关键词: Cloud computing |  Certificateless |  Cryptographic reverse firewalls |  Data sharing |  Revocation

5. A Survey of DDoS Attack and Defense Technologies in Multiaccess Edge Computing NSTL国家科技图书文献中心

Yong Ma |  Long Liu... -  《IEEE internet of things journal》 - 2025,12(2) - 1428~1452 - 共25页

摘要:Multiaccess edge computing (MEC) is a novel service paradigm located at the networks edge, where servers with computation and storage capabilities are placed in proximity to network endpoints to meet ...
关键词: Computer crime |  Servers |  Cloud computing |  Security |  Denial-of-service attack |  Internet of Things |  Electronic mail |  Computer architecture |  Botnet |  Surveys

6. Computer vision based distributed denial of service attack detection for resource-limited devices NSTL国家科技图书文献中心

Hayelom Gebrye |  Yong Wang... -  《Computers and Electrical Engineering》 - 2024,120(Pt.A) - 109716~ - 共17页

摘要:The growing adoption of Internet of Things (IoT) has rendered them a desirable target for cyber-attacks. One of the biggest threats to these systems is the distributed denial of service (DDoS) attack,...
关键词: Computer vision |  Distributed denial of service attack detection |  Resource-limited devices |  Transfer learning

7. Versatile Remote Data Checking Scheme for Cloud-Assisted Internet of Things NSTL国家科技图书文献中心

Ying Xie |  Ke Huang... -  《IEEE internet of things journal》 - 2024,11(7) - 12346~12361 - 共16页

摘要:Internet of Things (IoT) revolutionizes data collection, especially in e-healthcare, where patients data from wearables and sensors improves medical services. However, IoT’s limitations in computing a...
关键词: Internet of Things |  Cloud computing |  Authentication |  Cryptography |  Servers |  Encryption |  Data privacy

8. Bell state?based semi?quantum signature scheme with arbitrator NSTL国家科技图书文献中心

Tianyuan Zhang |  Xiangjun Xin... -  《Optical and quantum electronics》 - 2024,56(1) - 131.1~131.16 - 共16页 - 被引量:2

摘要:Semi-quantum signature is an important research topic in quantum cryptography. Basedon the Bell states, a semi-quantum signature scheme with arbitrator is proposed. In ourscheme, the quantum signer si...
关键词: Quantum signature |  Semi-quantum signature |  Unforgeability

9. Model-agnostic generation-enhanced technology for few-shot intrusion detection NSTL国家科技图书文献中心

Junpeng He |  Lingfeng Yao... -  《Applied Intelligence: The International Journal of Artificial Intelligence, Neural Networks, and Complex Problem-Solving Technologies》 - 2024,54(4) - 3181~3204 - 共24页 - 被引量:1

摘要:Malicious traffic on the Internet has become an increasingly serious problem, and several artificial intelligence (AI)-based malicious traffic detection methods have been proposed. Generally, AI-based...
关键词: Intrusion detection |  Model-agnostic meta-learning |  Generative adversarial network |  Few-shot attacks |  Imbalanced dataset

10. Attribute-Based Hierarchical Keyword Auditing With Batch Fault Localization Assisted by Smart Contracts NSTL国家科技图书文献中心

Jingting Xue |  Shuqin Luo... -  《IEEE transactions on cloud computing》 - 2024,12(4) - 1232~1247 - 共16页

摘要:Keyword-based auditing (KA) provides a means for users to verify the integrity of only the outsourced data they are interested in. Existing KA schemes employ relation authentication labels to conduct ...
关键词: Location awareness |  Cloud computing |  Servers |  Smart contracts |  Security |  Blockchains |  Government
检索条件作者:Fagen Li

NSTL主题词

  • NSTL学科导航