[26] |
SALEHI S A , RAZZAQUE M A , NARAEI P ,et al. Security in wireless sensor networks:issues and challenges[C]// IEEE International Conference on Space Science and Communication. IEEE, 2013: 356-360.
|
[27] |
AGRAWAL V , . Security and privacy issues in wireless sensor networks for healthcare[C]// International Internet of Things Summit. Springer International Publishing, 2014: 223-228.
|
[28] |
KAABOUCH M , COCQUEN E L . Bi-processor architecture for secure systems[P].US7984301.2011.--> US7984301. 2011.
|
[29] |
KERMANI M M , SAVAS E , UPADHYAYA S J . Guest editorial:introduction to the special issue on emerging security trends for deeply-embedded computing systems[J]. IEEE Transactions on Emerging Topics in Computing, 2016,4(3): 318-320.
|
[1] |
智能硬件产业创新发展专项行动(2016-2018 年)[EB/OL]. .
|
[2] |
中国信息通信研究院. 2016 智能硬件产业全面解析[EB/OL]. .
|
[3] |
BONOMI F , MILITO R , ZHU J ,et al. Fog computing and its role in the internet of things[C]// Edition of the MCC Workshop on Mobile Cloud Computing. 2012: 13-16.
|
[4] |
ELEONORA B . The Internet of Things vision:key features,applications and open issues[J]. Computer Communications, 2014,54: 1-31.
|
[5] |
GRIECO A , RIZZO A , COLUCCI S ,et al. IoT-aided robotics applications:technological implications,target domains and open issues[J]. Computer Communications, 2014,54: 67-83.
|
[6] |
AL-FUQAHA A , MOHSEN G , MEHDI M ,et al. Internet of Things:a survey on enabling technologies,protocols,and applications[J]. IEEE Communications Surveys&Tutorials, 2015,17(4): 2347-2376.
|
[7] |
WEBER A , ALEXA A , ECHO A . Amazon echo:the best user guide to learn Amazon echo and get benefits from Amazon prime membership[M]. Create Space Independent Publishing Platform, 2016.
|
[8] |
Novak . Google self-driving car[EB/OL]. .
|
[9] |
BENI G , WANG J . Swarm intelligence in cellular robotic systems[M]// Robots and Biological Systems:Towards a New Bionics?. 1993: 703-712.
|
[10] |
王明月 . 美国公布《“下一代”无人机系统研究、发展和验证路线图》[J]. 装备学院学报, 2012(3): 43-43.
|
[11] |
HEYDON R . Bluetooth low energy[M]. Prentice Hall, 2013.
|
[12] |
俄罗斯黑客组织红蜻蜓攻击了西部一千多家能源公司[EB/OL]. .[2014-7-17].
|
[13] |
ARM buys OffSpark the IOT security company[EB/OL]. .
|
[14] |
JORGE G , EDMUNDO M , JORGE S . Security for the Internet of Things:a survey of existing protocols and open research issues[J]. IEEE Communications Surveys&Tutorials, 2015,17(3): 1294-1312.
|
[15] |
JOUPPI N P , YOUNG C , PATIL N ,et al. In-datacenter performance analysis of a tensor processing unit[J]. arXiv:1704.04760.
|
[16] |
PRICE M , GLASS J , CHANDRAKASAN A P . A scalable speech recognizer with deep-neural-network acoustic models and voice-activated power gating[C]// ISSCC. 2017.
|
[17] |
BONG K , CHOI S , KIM C ,et al. A 0.62 mW ultra-low-power convolutional-neural-network face-recognition processor and a CIS integrated with always-on haar-like face detector[C]// ISSCC. 2017.
|
[18] |
SADHU B , TOUSI Y , HALLIN J ,et al. A 28 GHz 32-element phased-array transceiver IC with concurrent dual polarized beams and 1.4 degree beam-steering resolution for 5G communication[C]// ISSCC. 2017.
|
[19] |
BLAAUW D , SYLVESTER D , DUTTA P ,et al. IoT design space challenges:circuits and systems[C]// VLSI Technology. IEEE, 2014: 1-2.
|
[20] |
尤政 . 智能传感器技术的研究进展及应用展望[J]. 科技导报, 2016,34(17): 72-78.
|
|
YOU Z . Research progress and application prospect of smart sensor technology[J]. Science&Technology Review, 2016,34(17): 72-78.
|
[21] |
COLIN R J . Bosch unveils consumer MEMS[EB/OL]. .
|
[22] |
KONIJNENBURG M , STANZIONE S , YAN L ,et al. 28.4 A battery-powered efficient multi-sensor acquisition system with simultaneous ECG,BIO-Z,GSR,and PPG[C]// IEEE International Solid-State Circuits Conference, 2016: 480-481.
|
[23] |
JACOB W , TADAYOSHI K , SHORT D ,et al. WearFit:security design analysis of a wearable fitness tracker[C]// IEEE Cybersecurity, 2016.
|
[24] |
Secure Internet of Things Project[EB/OL]. .
|
[25] |
DENG J , HAN R , MISHRA S . Secure code distribution in dynamically programmable wireless sensor networks[C]// ACM/IEEE Int.Conf.Inf.Process.Sens.Netw. (IPSN), 2006: 292-300.
|
[30] |
TAN C , et al. Body sensor network security:an identity-based cryptography approach[C]// WiSec’08, 2008: 128-133.
|