咨询与建议

限定检索结果

文献类型

  • 11 篇 期刊文献
  • 1 篇 会议

馆藏范围

  • 12 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 7 篇 计算机科学与技术...
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 材料科学与工程(可...
    • 2 篇 电气工程
    • 2 篇 网络空间安全
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 仪器科学与技术
    • 1 篇 冶金工程
    • 1 篇 化学工程与技术
    • 1 篇 兵器科学与技术
    • 1 篇 软件工程
  • 5 篇 理学
    • 2 篇 物理学
    • 2 篇 系统科学
    • 1 篇 数学
    • 1 篇 化学
    • 1 篇 天文学
    • 1 篇 生物学
  • 2 篇 管理学
    • 2 篇 图书情报与档案管...
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 12 篇 eavesdropping
  • 2 篇 electromagnetic ...
  • 1 篇 jamming
  • 1 篇 4qd
  • 1 篇 artificial noise
  • 1 篇 multi-conductor ...
  • 1 篇 throughput
  • 1 篇 artificial-noise...
  • 1 篇 all-or-nothing t...
  • 1 篇 conducted emissi...
  • 1 篇 taper
  • 1 篇 wireless powered...
  • 1 篇 energy-to-peak s...
  • 1 篇 secure communica...
  • 1 篇 meter
  • 1 篇 secure network c...
  • 1 篇 physical layer s...
  • 1 篇 rsa
  • 1 篇 energy accumulat...
  • 1 篇 distributed fusi...

机构

  • 2 篇 school of teleco...
  • 1 篇 heilongjiang pro...
  • 1 篇 faculty of engin...
  • 1 篇 sanya offshore o...
  • 1 篇 key laboratory o...
  • 1 篇 department of co...
  • 1 篇 wireless communi...
  • 1 篇 school of electr...
  • 1 篇 college of elect...
  • 1 篇 college of infor...
  • 1 篇 ministry of educ...
  • 1 篇 college of infor...
  • 1 篇 engineering rese...
  • 1 篇 information secu...
  • 1 篇 intelligence ene...
  • 1 篇 school of scienc...
  • 1 篇 college of elect...
  • 1 篇 beifing radiatio...
  • 1 篇 department of el...
  • 1 篇 the key laborato...

作者

  • 2 篇 zhang jin-ling
  • 2 篇 du yu-lei
  • 1 篇 李熙涵
  • 1 篇 lu ying-hua
  • 1 篇 daxing xu
  • 1 篇 yan zhu
  • 1 篇 lü ying-hua
  • 1 篇 weiwei dong
  • 1 篇 zidong wang
  • 1 篇 ziqi zhang
  • 1 篇 canchao yang
  • 1 篇 bo chen
  • 1 篇 ding xu
  • 1 篇 邓富国
  • 1 篇 xiangyang chen
  • 1 篇 周萍
  • 1 篇 yuxin jiang
  • 1 篇 3national engine...
  • 1 篇 li yu
  • 1 篇 lei zou

语言

  • 11 篇 英文
  • 1 篇 中文
检索条件"主题词=eavesdropping"
12 条 记 录,以下是1-10 订阅
排序:
Encrypted Finite-Horizon Energy-to-Peak State Estimation for Time-Varying Systems Under eavesdropping Attacks: Tackling Secrecy Capacity
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第4期10卷 985-996页
作者: Lei Zou Zidong Wang Bo Shen Hongli Dong Guoping Lu College of Information Science and Technology Donghua UniversityShanghai 201620 Engineering Research Center of Digitalized Textile and Fashion Technology Ministry of EducationShanghai 201620China College of Electrical Engineering and Automation Shandong University of Science and TechnologyQingdao 266590China Department of Computer Science Brunel University LondonUxbridgeMiddlesex UB83PHUK Intelligence Energy Research Institute Northeast Petroleum UniversityDaqing 163318 Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control Northeast Petroleum UniversityDaqing 163318 Sanya Offshore Oil&Gas Research Institute Northeast Petroleum UniversitySanya 572024China School of Electrical Engineering Nantong UniversityNantong 226019China
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measu... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
eavesdropping the display image from conducted emission on network cable of a PC
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第3期20卷 78-84页
作者: DU Yu-lei LU Ying-hua ZHANG Jin-ling School of Telecommunication Engineering Beijing University of Posts and Telecommunications
The display image of a PC can be reconstructed by using the conducted emission on the PC's network cable. The relevant signals which be used to reconstruct the original image are coupling from the radiation of the sw... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Parent-offspring and inter-offspring responses to conspecific versus heterospecific distress calls in 2 sympatric birds
收藏 引用
Current Zoology 2022年 第6期68卷 700-707页
作者: Yuxin JIANG Jingru HAN Ziqi ZHANG Xiangyang CHEN Canchao YANG Ministry of Education Key Laboratory for Ecology of Tropical Islands College of Life SciencesHainan Normal UniversityHaikou 571158China
Distress calls,as a type of alarm call,play important roles in expressing bodily condition and conveying information concerning predation threats.In this study,we examined the communication via distress calls in paren... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A two-stage amplifier of laser eavesdropping model based on waveguide fiber taper
收藏 引用
Defence Technology(防务技术) 2019年 第1期15卷 95-97页
作者: Mei-ting Wang Yan Zhu Yi-ning Mu School of Science Changchun University of Science and Technology
In order to improve ability of amplification about optical arrival angle in laser eavesdropping system, and enhance receiving field of view (FOV) of laser eavesdropping system, this paper presents a new multistage amp... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Method for determining the best frequency band for eavesdropping the display image of a PC
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2013年 第4期20卷 93-98页
作者: DU Yu-lei Lü Ying-hua ZHANG Jin-ling ZHANG Nan School of Telecommunication Engineering Beijing University of Posts and Telecommunications
The display image of the video display unit (VDU) can be reconstructed by receiving and analyzing the unexpected electromagnetic noise emanated from a personal computer system. This fact is one of the information le... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
eavesdropping on the'ping-pong' quantum communication protocol freely in a noise channel
收藏 引用
Chinese Physics B 2007年 第2期16卷 277-281页
作者: 邓富国 李熙涵 李春燕 周萍 周宏余 The Key Laboratory of Beam Technology and MateriaJ Modification of Ministry of Education Beijing Normal University Beijing 100875 China Institute of Low Energy Nuclear Physics and Department of Material Science and Engineering Beijing Normal University Beijing 100875 China Beifing Radiation Center Beijing 100875 China
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A Spectrum Sharing Model that Counters eavesdropping:An Energy Efficiency View
收藏 引用
Journal of Harbin Institute of Technology(New Series) 2021年 第2期28卷 47-54页
作者: Yee-Loo Foo Faculty of Engineering Multimedia UniversityCyberjaya 63100Malaysia
Wireless transmission is subject to eavesdropping.When wireless transmission ceases,the assigned frequency channel is unused,wasting the spectral opportunity given.In this study,a spectrum sharing model that reduces s... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Secure communication in wireless powered communication networks with energy accumulation
收藏 引用
Science China(Information Sciences) 2021年 第10期64卷 263-265页
作者: Ding XU Wireless Communication Key Lab of Jiangsu Province Nanjing University of Posts and Telecommunications
Dear editor,Wireless powered communication network(WPCN) is a wireless network where user devices are powered wirelessly by harvesting radio frequency(RF) signals transmitted by dedicated power stations or nearby powe... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
An Anti-eavesdropping Method in Data Collection of Smart Meter
收藏 引用
Journal of Computer and Communications 2019年 第9期7卷 38-49页
作者: Weiwei Dong Yong Wang Lin Zhou Kanghua Cao Haiming Li College of Information and Technology Shanghai University of Electric Shanghai China
At present, DL/T 645-2007 communication protocol is used to collect data for smart meters. However, in the beginning, this protocol is not designed to be a secure protocol and only the function and reliability were ta... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Secure network coding in the presence of eavesdroppers
收藏 引用
Science China(Information Sciences) 2010年 第3期53卷 648-658页
作者: LUO MingXing1,2,3, YANG YiXian1,2,3, WANG LiCheng1,2,3 & NIU XinXin1,2,3 1Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China 2Key Laboratory of Network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications, Beijing 100876, China 3National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China Information Security Center State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications Beijing China Key Laboratory of Network and Information Attack and Defence Technology of MOE Beijing University of Posts and Telecommunications Beijing China National Engineering Laboratory for Disaster Backup and Recovery Beijing University of Posts and Telecommunications Beijing China
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论