[PDF][PDF] Security Testing of Visual Perception Module in Autonomous Driving System

W Hao, W Hao, S Xing, L Minghao… - Journal of Computer …, 2021 - suxnju.github.io
… the security of the visual perception module of autonomous driving, we design and implement
a scene-driven security testing … Multi-layer projection OBB. 图2 多图层投影OBB. 2.3.2 …

TrustChain: 具有可信执行环境的隐私保护智能合约模型⋆

F Wu, A Ye, Y Diao, Y Zhang, J Chen… - Available at SSRN … - papers.ssrn.com
… ∙ Privacy and security: We propose a trustworthy smart … Therefore, a multi-layered security
mechanism should be employed, … We also conduct an experimental analysis on end-to-end

EdgeKeeper: 一种适应泛在电力物联网的可信边缘计算框架

W Yang, W Liu, X Wei, Z Guo, K Yang… - Frontiers of Information …, 2021 - Springer
… It provides a secure and confidential space for the privacy data and for … The hardware layer
and OS layer ensure the safety of the … , we will carry out end-to-end business verification from …

[HTML][HTML] 基于云或区块链的物联网: 比较调查和前进道路

RA Memon - 信息与电子工程前沿(英文), 2022 - fitee.zjujournals.com
… Blockchain for IoT security and privacy: the case study of a smart home. . IEEE Int Conf on
Pervasive Computing and Communi- cations Workshops (PerCom Workshops), , 2017b. . p.…

[PDF][PDF] ISTANBUL TECHNICAL UNIVERSITY 击GRADUATE SCHOOL

E AYDIN - 2022 - polen.itu.edu.tr
… Providing the confidentiality of communication in a … secure transmission of aggregated
data is accomplished by blockchain in the study [23]. The sensing layer of the internet of things

6G 移动通信网络数据服务与数据面

严学强, 程冠杰, 邓水光, 吴建军, 陆璐, 赵明宇, 习燕… - 物联网学报 - infocomm-journal.com
… 数据服务,部署弹性,是否支持第三方数据共享,用 例灵活性,端到端(E2E, end-to-end)数据管理6
个… physical-layer security[J]. Physical Communication, 2022 (55): 101896. [4] SHUVO MM H. …

[PDF][PDF] 本科毕业设计论文

专业名称, 计算机科学与技术, 学生姓名, 卡立母… - researchgate.net
… The data link layer header indicates the type of data link layer … draft that expressed concerns
about the use of these privacy … negate total security provided by the end-to-end encryption. …

[HTML][HTML] 智能网联汽车安全防护技术研究综述

周建华, 侯英哲, 吕臣臣, 刘冬, 孙娅苹… - 武汉大学学报(理学版 …, 2023 - xblx.whu.edu.cn
layer message authentication scheme with prefect security[J]. … Privacy-preserving authentication
scheme for connected … An identity-based security system for user privacy in vehicular …

[HTML][HTML] 能源关键基础设施网络安全威胁与防御技术综述

李建华 - 电子与信息学报, 2020 - jeit.ac.cn
… A game theoretical analysis of data confidentiality attacks on smart-… Resilient end-to-end
message protection for cyber-physical … A cross-layer QoS-aware communication framework in …

陌生人对机会路由性能的影响

袁培燕, 马华东, 段鹏瑞 - 计算机科学技术学报, 2013 - jcst.ict.ac.cn
… (DTNs) is that an end-to-end path between the source and … as time-varying topology,
privacy protection or selfishness of … of a three-tier architecture for sparse sensor networks. Ad …