CSpace

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Interactive Anomaly Detection in Dynamic Communication Networks 期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2021, 卷号: 29, 期号: 6, 页码: 2602-2615
作者:  Meng, Xuying;  Wang, Yequan;  Wang, Suhang;  Yao, Di;  Zhang, Yujun
收藏  |  浏览/下载:24/0  |  提交时间:2022/06/21
Anomaly detection  Communication networks  Feature extraction  Estimation  Adaptation models  Internet  Task analysis  Anomaly detection  interactive learning  dynamic networks  communication networks  semi-parametric bandits  
Blockchain-Enhanced Data Sharing With Traceable and Direct Revocation in IIoT 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 卷号: 17, 期号: 11, 页码: 7669-7678
作者:  Yu, Keping;  Tan, Liang;  Aloqaily, Moayad;  Yang, Hekun;  Jararweh, Yaser
收藏  |  浏览/下载:34/0  |  提交时间:2021/12/01
Industrial Internet of Things  Smart manufacturing  Blockchain  Security  Access control  Encryption  Cloud computing  Big data  blockchain  data sharing  industrial Internet-of-Thing (IIoT)  smart factory  traceable and revocation  
An Efficient Full Hardware Implementation of Extended Merkle Signature Scheme 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 页码: 12
作者:  Cao, Yuan;  Wu, Yanze;  Wang, Wen;  Lu, Xu;  Chen, Shuai;  Ye, Jing;  Chang, Chip-Hong
收藏  |  浏览/下载:24/0  |  提交时间:2022/06/21
Hardware  Random access memory  Software algorithms  Quantum computing  Field programmable gate arrays  Computers  NIST  Post-quantum cryptography  eXtended Merkle signature scheme  hardware accelerator  
Semi-supervised anomaly detection in dynamic communication networks 期刊论文
INFORMATION SCIENCES, 2021, 卷号: 571, 页码: 527-542
作者:  Meng, Xuying;  Wang, Suhang;  Liang, Zhimin;  Yao, Di;  Zhou, Jihua;  Zhang, Yujun
收藏  |  浏览/下载:39/0  |  提交时间:2021/12/01
Anomaly detection  Semi-supervised learning  Generative adversarial networks  Self-learning  
Exploring Adversarial Attack in Spiking Neural Networks With Spike-Compatible Gradient 期刊论文
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2021, 页码: 15
作者:  Liang, Ling;  Hu, Xing;  Deng, Lei;  Wu, Yujie;  Li, Guoqi;  Ding, Yufei;  Li, Peng;  Xie, Yuan
收藏  |  浏览/下载:27/0  |  提交时间:2022/06/21
Spatiotemporal phenomena  Computational modeling  Perturbation methods  Biological neural networks  Backpropagation  Unsupervised learning  Training  Adversarial attack  backpropagation through time (BPTT)  neuromorphic computing  spike-compatible gradient  spiking neural networks (SNNs)  
RON-enhanced blockchain propagation mechanism for edge-enabled smart cities 期刊论文
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 卷号: 61, 页码: 10
作者:  Huang, Junjie;  Tan, Liang;  Li, Wenjuan;  Yu, Keping
收藏  |  浏览/下载:39/0  |  提交时间:2021/12/01
Blockchain fork  Resilient overlay network  Propagation delay  Gossip  Optimal propagation mechanism  
Discouraging pool block withholding attacks in Bitcoin 期刊论文
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2021, 页码: 16
作者:  Chen, Zhihuai;  Li, Bo;  Shan, Xiaohan;  Sun, Xiaoming;  Zhang, Jialin
收藏  |  浏览/下载:39/0  |  提交时间:2021/12/01
Bitcoin  Mining pool  Block withholding attack  Nash equilibrium  
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:  Zhao, Lutan;  Li, Peinan;  Hou, Rui;  Huang, Michael C.;  Liu, Peng;  Zhang, Lixin;  Meng, Dan
收藏  |  浏览/下载:29/0  |  提交时间:2021/12/01
Security  Hazards  Micromechanical devices  Microarchitecture  Out of order  Registers  Spectre vulnerabilities defense  security dependence  speculative execution side-channel vulnerabilities  
Practical Attacks on Deep Neural Networks by Memory Trojaning 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:  Hu, Xing;  Zhao, Yang;  Deng, Lei;  Liang, Ling;  Zuo, Pengfei;  Ye, Jing;  Lin, Yingyan;  Xie, Yuan
收藏  |  浏览/下载:35/0  |  提交时间:2021/12/01
Trojan horses  Hardware  Integrated circuit modeling  Computational modeling  Security  Payloads  Convolutional neural networks (CNNs)  deep learning accelerator  deep learning attack  hardware Trojan  
Enhancing the security of memory in cloud infrastructure through in-phase change memory data randomisation 期刊论文
IET COMPUTERS AND DIGITAL TECHNIQUES, 2021, 页码: 14
作者:  Zhou, Xianzhong;  Wang, Ying
收藏  |  浏览/下载:27/0  |  提交时间:2021/12/01