智能硬件产业创新发展专项行动(2016-2018 年)[EB/OL]. http://www.miit.gov.cn/n1146295/n1652858/n1652930/n3757016/c52 59332/content.htmlhttp://www.miit.gov.cn/n1146295/n1652858/n1652930/n3757016/c52 59332/content.html.
中国信息通信研究院. 2016 智能硬件产业全面解析[EB/OL]. http://chuansong.me/n/1372551551352http://chuansong.me/n/1372551551352.
BONOMI F, MILITO R, ZHU J ,et al. Fog computing and its role in the internet of things[C]// Edition of the MCC Workshop on Mobile Cloud Computing. 2012: 13-16.
ELEONORA B . The Internet of Things vision:key features,applications and open issues[J]. Computer Communications, 2014,54: 1-31.
GRIECO A, RIZZO A, COLUCCI S ,et al. IoT-aided robotics applications:technological implications,target domains and open issues[J]. Computer Communications, 2014,54: 67-83.
AL-FUQAHA A , MOHSEN G , MEHDI M ,et al. Internet of Things:a survey on enabling technologies,protocols,and applications[J]. IEEE Communications Surveys&Tutorials, 2015,17(4): 2347-2376.
WEBER A, ALEXA A, ECHO A . Amazon echo:the best user guide to learn Amazon echo and get benefits from Amazon prime membership[M]. Create Space Independent Publishing Platform, 2016.
Novak . Google self-driving car[EB/OL]. https://en.wikipedia.org/wiki/Google_self-driving_cahttps://en.wikipedia.org/wiki/Google_self-driving_ca.
BENI G, WANG J . Swarm intelligence in cellular robotic systems[M]// Robots and Biological Systems:Towards a New Bionics?. 1993: 703-712.
王明月 . 美国公布《“下一代”无人机系统研究、发展和验证路线图》[J]. 装备学院学报, 2012(3): 43-43.
HEYDON R . Bluetooth low energy[M]. Prentice Hall, 2013.
俄罗斯黑客组织红蜻蜓攻击了西部一千多家能源公司[EB/OL]. http://server.chinabyte.com/170/12843170.shtmlhttp://server.chinabyte.com/170/12843170.shtml.[2014-7-17].
ARM buys OffSpark the IOT security company[EB/OL]. http://www.machinetomachinemagazine.com/2015/02/09/arm-buys-offsparkthe-iot-security-company/http://www.machinetomachinemagazine.com/2015/02/09/arm-buys-offsparkthe-iot-security-company/.
JORGE G, EDMUNDO M, JORGE S . Security for the Internet of Things:a survey of existing protocols and open research issues[J]. IEEE Communications Surveys&Tutorials, 2015,17(3): 1294-1312.
JOUPPI N P, YOUNG C, PATIL N ,et al. In-datacenter performance analysis of a tensor processing unit[J]. arXiv:1704.04760.
PRICE M, GLASS J, CHANDRAKASAN A P . A scalable speech recognizer with deep-neural-network acoustic models and voice-activated power gating[C]// ISSCC. 2017.
BONG K, CHOI S, KIM C ,et al. A 0.62 mW ultra-low-power convolutional-neural-network face-recognition processor and a CIS integrated with always-on haar-like face detector[C]// ISSCC. 2017.
SADHU B, TOUSI Y, HALLIN J ,et al. A 28 GHz 32-element phased-array transceiver IC with concurrent dual polarized beams and 1.4 degree beam-steering resolution for 5G communication[C]// ISSCC. 2017.
BLAAUW D, SYLVESTER D, DUTTA P ,et al. IoT design space challenges:circuits and systems[C]// VLSI Technology. IEEE, 2014: 1-2.
尤政 . 智能传感器技术的研究进展及应用展望[J]. 科技导报, 2016,34(17): 72-78.
YOU Z . Research progress and application prospect of smart sensor technology[J]. Science&Technology Review, 2016,34(17): 72-78.
COLIN R J . Bosch unveils consumer MEMS[EB/OL]. http://www.eetimes.com/document.asp? doc_id=1262945http://www.eetimes.com/document.asp? doc_id=1262945.
KONIJNENBURG M, STANZIONE S, YAN L ,et al. 28.4 A battery-powered efficient multi-sensor acquisition system with simultaneous ECG,BIO-Z,GSR,and PPG[C]// IEEE International Solid-State Circuits Conference, 2016: 480-481.
JACOB W, TADAYOSHI K, SHORT D ,et al. WearFit:security design analysis of a wearable fitness tracker[C]// IEEE Cybersecurity, 2016.
Secure Internet of Things Project[EB/OL]. http://iot.stanford.eduhttp://iot.stanford.edu.
DENG J, HAN R, MISHRA S . Secure code distribution in dynamically programmable wireless sensor networks[C]// ACM/IEEE Int.Conf.Inf.Process.Sens.Netw. (IPSN), 2006: 292-300.
SALEHI S A, RAZZAQUE M A, NARAEI P ,et al. Security in wireless sensor networks:issues and challenges[C]// IEEE International Conference on Space Science and Communication. IEEE, 2013: 356-360.
AGRAWAL V, . Security and privacy issues in wireless sensor networks for healthcare[C]// International Internet of Things Summit. Springer International Publishing, 2014: 223-228.
KAABOUCH M, COCQUEN E L . Bi-processor architecture for secure systems[P].US7984301.2011.--> US7984301. 2011.
KERMANI M M, SAVAS E, UPADHYAYA S J . Guest editorial:introduction to the special issue on emerging security trends for deeply-embedded computing systems[J]. IEEE Transactions on Emerging Topics in Computing, 2016,4(3): 318-320.
TAN C , et al. Body sensor network security:an identity-based cryptography approach[C]// WiSec’08, 2008: 128-133.