UM

Browse/Search Results:  1-10 of 43 Help

Selected(0)Clear Items/Page:    Sort:
A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification 一种采用双层校验的RFID离线匿名群证明协议 Journal article
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2018,Volume: 55,Issue: 12,Page: 2674-2684
Authors:  Zhou Z.;  Wang G.;  Liu Q.;  Jia W.
Favorite  |  View/Download:1/0  |  Submit date:2019/04/04
Anonymous  Elliptic curve cryptography  Grouping-proof  Privacy  RFID security  
Medical cyber-physical systems: A survey Journal article
JOURNAL OF MEDICAL SYSTEMS, 2018,Volume: 42,Issue: 4
Authors:  Dey, Nilanjan;  Ashour, Amira S.;  Shi, Fuqian;  Fong, Simon James;  Tavares, Joao Manuel R. S.
Favorite  |  View/Download:6/0  |  Submit date:2018/10/30
Networked medical device systems  Wireless sensor networks  Medical internet of things  Body area networks  Security assurance  Patient monitoring  
Image Splicing Localization via Semi-Global Network and Fully Connected Conditional Random Fields Conference paper
Proceedings of European Conference on Computer Vision (ECCV) Workshops, 2018., Munich, Germany, 2018-9-8
Authors:  Xiaodong Cun;  Chi-Man Pun
Favorite  |  View/Download:1/0  |  Submit date:2019/05/21
Image Splicing Localization  Image Forgery Localization  Multimedia Security  
Human body and face detection based anti-shoulder attack system on atm Conference paper
ACM International Conference Proceeding Series
Authors:  Li C.;  Liang M.;  Xiao K.;  Fong S.;  Wang Q.;  Song W.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/13
ATM security  Face detection  Human body detection  
General precautions against security threats for computer networks in SMEs: From the perspective of big data and IOT Conference paper
ACM International Conference Proceeding Series
Authors:  Wu Y.;  Fong S.;  Zhuang Y.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Computer network security  Security threats  SME  
Big data mining algorithms for fog computing Conference paper
ACM International Conference Proceeding Series
Authors:  Fong S.
Favorite  |  View/Download:1/0  |  Submit date:2019/02/13
Computer network security  Security threats  SME  
DeMalC: A feature-rich machine learning framework for malicious call detection Conference paper
International Conference on Information and Knowledge Management, Proceedings
Authors:  Li Y.;  Hou D.;  Pan A.;  Gong Z.
Favorite  |  View/Download:2/0  |  Submit date:2019/02/12
Antifraud APP  Data mining for social security  Malicious call detection  
Fog-based evaluation approach for trustworthy communication in sensor-cloud system Journal article
IEEE Communications Letters, 2017,Volume: 21,Issue: 11,Page: 2532-2535
Authors:  Wang T.;  Li Y.;  Chen Y.;  Tian H.;  Cai Y.;  Jia W.;  Wang B.
Favorite  |  View/Download:0/0  |  Submit date:2019/02/11
least squares  multiple linear regression  security  Sensor-cloud system  trust  
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications Journal article
IEEE INTERNET OF THINGS JOURNAL, 2017,Volume: 4,Issue: 5,Page: 1125-1142
Authors:  Lin, Jie;  Yu, Wei;  Zhang, Nan;  Yang, Xinyu;  Zhang, Hanlin;  Zhao, Wei
Favorite  |  View/Download:8/0  |  Submit date:2018/10/30
Applications  enabling technologies  fog/edge computing  Internet of Things (IoT)  security and privacy  
Security Evaluation of the Cyber Networks Under Advanced Persistent Threats Journal article
IEEE Access, 2017,Volume: 5,Page: 20111-20123
Authors:  Yang, Lu-Xing;  Li, Pengdeng;  Yang, Xiaofan;  Tang, Yuan Yan
Favorite  |  View/Download:7/0  |  Submit date:2018/10/30
Cyberspace  Security  Measurement  Nonlinear Dynamical Systems  Stability