Results 231 to 240 of about 39,375 (295)
High-Security X-Ray Imaging Encryption Based on Irreversible Acid-Responsive Radioluminescence Memory Scintillator. [PDF]
Liu L +7 more
europepmc +1 more source
A chaos-based augmented image encryption scheme for satellite images using Fredkin logic. [PDF]
Alexan W +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
IEEE Transactions on Automatic Control, 2023
This article is concerned with the secure state estimation problem for a networked system with multirate measurements. The measurement data are transmitted to the estimator over a communication network, where an eavesdropper could intercept the ...
Lei Zou +3 more
semanticscholar +1 more source
This article is concerned with the secure state estimation problem for a networked system with multirate measurements. The measurement data are transmitted to the estimator over a communication network, where an eavesdropper could intercept the ...
Lei Zou +3 more
semanticscholar +1 more source
Fault-Tolerant Consensus Control for Multiagent Systems: An Encryption-Decryption Scheme
IEEE Transactions on Automatic Control, 2021In this article, the fault-tolerant consensus control problem is investigated for multiagent systems with sensor faults. A first-order difference equation is utilized to describe the sensor fault, and an observer is designed to estimate the state and the
Chen Gao +3 more
semanticscholar +1 more source
Small, 2022
The growing urgence of information protection promotes continuously the development of information-encryption technique. To date, hydrogels have become an emerging candidate for advanced information-encryption materials, because of their unique stimulus ...
X. Lan +8 more
semanticscholar +1 more source
The growing urgence of information protection promotes continuously the development of information-encryption technique. To date, hydrogels have become an emerging candidate for advanced information-encryption materials, because of their unique stimulus ...
X. Lan +8 more
semanticscholar +1 more source
Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
IEEE Transactions on Vehicular Technology, 2020Edge intelligence is an emerging concept referring to processes in which data are collected and analyzed and insights are delivered close to where the data are captured in a network using a selection of advanced intelligent technologies.
Chaosheng Feng +5 more
semanticscholar +1 more source
Encryption-decryption-based consensus control for multi-agent systems: Handling actuator faults
at - Automatisierungstechnik, 2021This paper deals with the encryption–decryption-based passive fault-tolerant consensus control problem for a class of linear multi-agent systems subject to loss-of-effectiveness and additive actuator faults.
Chen Gao +3 more
semanticscholar +1 more source
IEEE Systems Journal, 2022
Internet of Things (IoT) devices expect a secure communication method or protocol with communication performance that matches the network bandwidth in a public network.
Chengjian Liu +4 more
semanticscholar +1 more source
Internet of Things (IoT) devices expect a secure communication method or protocol with communication performance that matches the network bandwidth in a public network.
Chengjian Liu +4 more
semanticscholar +1 more source

