1 |
BIGGIO B, FUMERA G, RUSSU P, et al. Adversarial biometric recognition: A review on biometric system security from the adversarial machine-learning perspective[J]. IEEE Signal Processing Magazine, 2015, 32(5): 31-41.
|
2 |
张明, 王景璟, 马骏, 等. 从智能支架看植入式医疗电子的发展[J]. 电子学报, 2021, 49(7): 1406-1416.
|
|
ZHANG M, WANG J J, MA J, et al. Discussion on the new generation of vascular stent from the development of implantable medical devices[J]. Acta Electronica Sinica, 2021, 49(7): 1406-1416. (in Chinese)
|
3 |
梁永生, 柳伟, 周莺, 等. 基于视觉显著计算的视频流媒体渐进式表达方法[J]. 电子学报, 2017, 45(7): 1567-1575.
|
|
LIANG Y S, LIU W, ZHOU Y, et al. An approach to progressive description of video streaming based on visual saliency computation[J]. Acta Electronica Sinica, 2017, 45(7): 1567-1575. (in Chinese)
|
4 |
AL-JALJOULI R, ABAWAJY J, HASSAN M M, et al. Secure multi-attribute one-to-many bilateral negotiation framework for E-commerce[J]. IEEE Transactions on Services Computing, 2018, 11(2): 415-429.
|
5 |
SHANNON C E. Communication theory of secrecy systems[J]. The Bell System Technical Journal, 1949, 28(4): 656-715.
|
6 |
WYNER A D. The wire-tap channel[J]. Bell System Technical Journal, 1975, 54(8): 1355-1387.
|
7 |
CSISZAR I, KORNER J. Broadcast channels with confidential messages[J]. IEEE Transactions on Information Theory, 1978, 24(3): 339-348.
|
8 |
WYNER A, ZIV J. The rate-distortion function for source coding with side information at the decoder[J]. IEEE Transactions on Information Theory, 1976, 22(1): 1-10.
|
9 |
CHIA Y K, CHONG H F. On lossy source coding with side information under the erasure distortion measure[J]. IEEE Transactions on Information Theory, 2015, 61(12): 6475-6484.
|
10 |
VILLARD J, PIANTANIDA P. Secure lossy source coding with side information at the decoders[C]//2010 48th Annual Allerton Conference on Communication, Control, and Computing(Allerton). Piscataway: IEEE, 2010: 733-739.
|
11 |
KOYLUOGLU O O, SOUNDARARAJAN R, VISHWANATH S. State amplification subject to masking constraints[J]. IEEE Transactions on Information Theory, 2016, 62(11): 6233-6250.
|
12 |
HAN T S, SASAKI M. Wiretap channels with causal state information: Strong secrecy[J]. IEEE Transactions on Information Theory, 2019, 65(10): 6750-6765.
|
13 |
GAMAL A A EL, KIM Y H. Network Information Theory[M]. Cambridge, UK: Cambridge University Press, 2011.
|
14 |
GÜNLÜ O, KITTICHOKECHAI K, SCHAEFER R F, et al. Controllable identifier measurements for private authentication with secret keys[J]. IEEE Transactions on Information Forensics and Security, 2018, 13(8): 1945-1959.
|
15 |
VILLARD J, PIANTANIDA P, SHAMAI S. Secure transmission of sources over noisy channels with side information at the receivers[J]. IEEE Transactions on Information Theory, 2014, 60(1): 713-739.
|
16 |
COVER T M, THOMAS J A. Elements of Information Theory[M]. 2nd ed. Hoboken, NJ: Wiley-Interscience, 2006.
|