×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [10]
作者
Deng, Lei [2]
Hu, Xing [2]
Liang, Lin... [2]
Meng, Xuyi... [2]
Tan, Liang [2]
Wang, Suha... [2]
更多...
文献类型
期刊论文 [10]
发表日期
2021 [10]
语种
英语 [10]
出处
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE-ACM T... [1]
更多...
资助项目
National N... [2]
National S... [2]
National S... [2]
Sichuan Pr... [2]
Strategic ... [2]
Changzhou ... [1]
更多...
收录类别
SCI [10]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
发表日期:2021
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
Interactive Anomaly Detection in Dynamic Communication Networks
期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 卷号: 29, 期号: 6, 页码: 2602-2615
作者:
Meng, Xuying
;
Wang, Yequan
;
Wang, Suhang
;
Yao, Di
;
Zhang, Yujun
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/21
Anomaly detection
Communication networks
Feature extraction
Estimation
Adaptation models
Internet
Task analysis
Anomaly detection
interactive learning
dynamic networks
communication networks
semi-parametric bandits
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT
期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:
Yu, Keping
;
Tan, Liang
;
Aloqaily, Moayad
;
Yang, Hekun
;
Jararweh, Yaser
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2021/12/01
Industrial Internet of Things
Smart manufacturing
Blockchain
Security
Access control
Encryption
Cloud computing
Big data
blockchain
data sharing
industrial Internet-of-Thing (IIoT)
smart factory
traceable and revocation
An Efficient Full Hardware Implementation of Extended Merkle Signature Scheme
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 页码: 12
作者:
Cao, Yuan
;
Wu, Yanze
;
Wang, Wen
;
Lu, Xu
;
Chen, Shuai
;
Ye, Jing
;
Chang, Chip-Hong
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/06/21
Hardware
Random access memory
Software algorithms
Quantum computing
Field programmable gate arrays
Computers
NIST
Post-quantum cryptography
eXtended Merkle signature scheme
hardware accelerator
Semi-supervised anomaly detection in dynamic communication networks
期刊论文
INFORMATION SCIENCES, 2021, 卷号: 571, 页码: 527-542
作者:
Meng, Xuying
;
Wang, Suhang
;
Liang, Zhimin
;
Yao, Di
;
Zhou, Jihua
;
Zhang, Yujun
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2021/12/01
Anomaly detection
Semi-supervised learning
Generative adversarial networks
Self-learning
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient
期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:
Liang, Ling
;
Hu, Xing
;
Deng, Lei
;
Wu, Yujie
;
Li, Guoqi
;
Ding, Yufei
;
Li, Peng
;
Xie, Yuan
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/06/21
Spatiotemporal phenomena
Computational modeling
Perturbation methods
Biological neural networks
Backpropagation
Unsupervised learning
Training
Adversarial attack
backpropagation through time (BPTT)
neuromorphic computing
spike-compatible gradient
spiking neural networks (SNNs)
RON-enhanced blockchain propagation mechanism for edge-enabled smart cities
期刊论文
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 卷号: 61, 页码: 10
作者:
Huang, Junjie
;
Tan, Liang
;
Li, Wenjuan
;
Yu, Keping
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2021/12/01
Blockchain fork
Resilient overlay network
Propagation delay
Gossip
Optimal propagation mechanism
Discouraging pool block withholding attacks in Bitcoin
期刊论文
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2021, 页码: 16
作者:
Chen, Zhihuai
;
Li, Bo
;
Shan, Xiaohan
;
Sun, Xiaoming
;
Zhang, Jialin
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2021/12/01
Bitcoin
Mining pool
Block withholding attack
Nash equilibrium
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:
Zhao, Lutan
;
Li, Peinan
;
Hou, Rui
;
Huang, Michael C.
;
Liu, Peng
;
Zhang, Lixin
;
Meng, Dan
收藏
  |  
浏览/下载:29/0
  |  
提交时间:2021/12/01
Security
Hazards
Micromechanical devices
Microarchitecture
Out of order
Registers
Spectre vulnerabilities defense
security dependence
speculative execution side-channel vulnerabilities
Practical Attacks on Deep Neural Networks by Memory Trojaning
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:
Hu, Xing
;
Zhao, Yang
;
Deng, Lei
;
Liang, Ling
;
Zuo, Pengfei
;
Ye, Jing
;
Lin, Yingyan
;
Xie, Yuan
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2021/12/01
Trojan horses
Hardware
Integrated circuit modeling
Computational modeling
Security
Payloads
Convolutional neural networks (CNNs)
deep learning accelerator
deep learning attack
hardware Trojan
Enhancing the security of memory in cloud infrastructure through in-phase change memory data randomisation
期刊论文
IET COMPUTERS AND DIGITAL TECHNIQUES, 2021, 页码: 14
作者:
Zhou, Xianzhong
;
Wang, Ying
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2021/12/01