作者: Liu, Tong1,2;Shi, Gang1,2;Chen, Liwei1,2;Zhang, Fei1,2;Yang, Yaxuan1,2;Zhang, Jihu3
出处: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom) / 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE) New York, NY 2018
会议录: 545-550
摘要: Memory corruption vulnerabilities are main causes of quite a few modern software attacks. Classical Dataflow integrity, which is originally implemente ...
作者: Zheng, F. Q.1;Lou, W. Z.1;Wang, F. F.2;Wang, D. K.3
出处: 20th Annual Conference of the Chinese-Society-of-Micro/Nano-Technology (CSMNT) / 9th International Conference of Chinese-Society-of-Micro/Nano-Technology (CSMNT) Zhengzhou, PEOPLES R CHINA 2018
会议录: Vol.1209 -
摘要: At present, MEMS safety systems have the disadvantages of complex structure and easy to be affected by the electromagnetic environment of the battlefi ...
作者: Gai, Keke1;Qiu, Meikang2,3;Liu, Meiqin4
出处: 4th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity) / 4th IEEE International Conference on High Performance and Smart Computing (HPSC) / 3rd IEEE International Conference on Intelligent Data and Security (IDS) Omaha, NE 2018
会议录: 126-132
摘要: The broad implementation of cloud computing and Internet-of-Things (IoT) is driving current networking control system towards an advanced level. Mobil ...
作者: Sun Jiajia1;Gao Jinbao1;Tan Yu-an1;Zhang Yu2,3;Yu Xiao4
出处: 18th International Conference on Algorithms and Architectures for Parallel Processing (ICA3PP) Guangzhou, PEOPLES R CHINA 2018
会议录: Vol.11337 260-269
摘要: As Android operating system and applications on the device play important roles, the security requirements of Android applications increased as well. ...
作者: Li, Mingzhu1,2;Zhang, Weimin1,2;Shi, Yongliang1,2;Yao, Zhuo1,2;Liang, Zhenshuo1,2;Huang, Qiang1,2
出处: IEEE International Conference on Robotics and Biomimetics (ROBIO) Kuala Lumpur, MALAYSIA 2018
会议录: 1607-1612
摘要: Simultaneous localization and mapping (SLAM) is the key function for most mobile robots to achieve autonomous navigation. The traditional visual SLAM ...
作者: Shu, Yu1;Shi, Yemin1;Wang, Yaowei2;Zou, Yixiong1;Yuan, Qingsheng3;Tian, Yonghong1
出处: IEEE International Conference on Multimedia and Expo (IEEE ICME) San Diego, CA 2018
会议录: -
摘要: In recent years, the performance of action recognition has been significantly improved with the help of deep neural networks. Most of the existing act ...
作者: Jia, Dayu1;Xin, Junchang1,2;Wang, Zhiqiong3;Guo, Wei4;Wang, Guoren5
出处: 2nd International Joint Conference on Asia-Pacific Web (APWeb) / Web-Age Information Management (WAIM) PEOPLES R CHINA 2018
会议录: Vol.10988 440-454
摘要: Blockchains are secure by design and they have been widely used in digital asses, trade finance, information security and many other fields. However, ...
作者: Song, Yu1;Guo, Shuxiang2,3;Zhang, Linshuai1
出处: IEEE International Conference on Robotics and Biomimetics (ROBIO) Kuala Lumpur, MALAYSIA 2018
会议录: 1964-1968
摘要: During conventional endovascular procedures, the interventionalists are able to adjust the catheter motion based on the tactile sensation by their han ...
作者: Ge, Dantong1,2;Ornik, Melkior3;Topcu, Ufuk2,3
出处: AAS/AIAA Astrodynamics Specialist Conference Snowbird, UT 2018
会议录: Vol.167 3057-3072
摘要: Control of systems operating in unexplored environments is challenging due to lack of complete model knowledge. Additionally, under measurement noises ...
作者: Zou, Yixiong1;Shi, Yemin1;Wang, Yaowei2;Shu, Yu1;Yuan, Qingsheng3;Tian, Yonghong1
出处: IEEE International Conference on Multimedia and Expo (IEEE ICME) San Diego, CA 2018
会议录: -
摘要: One-shot action recognition is one of the most challenging tasks due to the very limited training samples. For one-shot video action recognition, rand ...
已保存题录(0)