HUANG Wei-Qing
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China;Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaDING Chang
Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaCUI Yue
Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaWANG Si-Ye
School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China;Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaZHANG Yan-Fang
Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaZHAO Bo-Bai
Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaZHU Shao-Yi
Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaMAO Rui
Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaCHEN Chao
Institute of Information Engineering, The Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, ChinaNational High Technology Research and Development Program of China (863) (2013AA014002)
黄伟庆,丁昶,崔越,王思叶,张艳芳,赵博白,诸邵忆,毛锐,陈超.基于恶意读写器发现的RFID空口入侵检测技术.软件学报,2018,29(7):1922-1936
Copy