×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [13]
作者
Huang, Let... [2]
Jiang, Yin... [2]
Singh, Ami... [2]
Tan, Liang [2]
Wang, Xiao... [2]
Yang, Mei [2]
更多...
文献类型
期刊论文 [13]
发表日期
2022 [13]
语种
英语 [13]
出处
IEEE TRANS... [2]
ELECTRONIC... [1]
IEEE CONSU... [1]
IEEE NETWO... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
更多...
资助项目
Japan Soci... [2]
Japan Soci... [2]
Key Labora... [2]
National K... [2]
National N... [2]
National N... [2]
更多...
收录类别
SCI [13]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共13条,第1-10条
帮助
限定条件
发表日期:2022
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
A Systematic View of Model Leakage Risks in Deep Neural Network Systems
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:
Hu, Xing
;
Liang, Ling
;
Chen, Xiaobing
;
Deng, Lei
;
Ji, Yu
;
Ding, Yufei
;
Du, Zidong
;
Guo, Qi
;
Sherwood, Tim
;
Xie, Yuan
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/07/12
Domain-specific architecture
deep learning security
model security
Combating Stealthy Thermal Covert Channel Attack With Its Thermal Signal Transmitted in Direct Sequence Spread Spectrum
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 11, 页码: 4064-4075
作者:
Wang, Xiaohang
;
Wang, Shengjie
;
Jiang, Yingtao
;
Singh, Amit Kumar
;
Yang, Mei
;
Huang, Letian
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/07/12
Spread spectrum communication
Transmitters
Encoding
Bit error rate
Receivers
Codes
Thermal noise
Defense against covert channel attack
many-core systems
thermal covert channel (TCC) attack
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 卷号: 71, 期号: 11, 页码: 12250-12263
作者:
Shen, Meng
;
Lu, Hao
;
Wang, Fei
;
Liu, Huisen
;
Zhu, Liehuang
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/07/12
Blockchain
identity authentication
Internet-of-Vehicles
Modeling and simulation analysis of crowd evacuation behavior under terrorist attack
期刊论文
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 卷号: 604, 页码: 20
作者:
Liu, Jing
;
Jia, Yang
;
Mao, Tianlu
;
Wang, Zhaoqi
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/07/12
Evacuation simulation
Terrorist attack
Floor field model
Effect of obstacles
Image Denoising Based on GAN with Optimization Algorithm
期刊论文
ELECTRONICS, 2022, 卷号: 11, 期号: 15, 页码: 12
作者:
Zhu, Min-Ling
;
Zhao, Liang-Liang
;
Xiao, Li
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2022/12/07
image denoising
GAN
optimization algorithm
autoencoder
ResNet
A Bilayer Scalable Nakamoto Consensus Protocol for Blockchain Systems
期刊论文
IEEE NETWORK, 2022, 卷号: 36, 期号: 3, 页码: 174-182
作者:
Jiao, Zhenzhen
;
Tian, Rui
;
Shang, Dezhong
;
Ding, Hui
;
Zhang, Baoxian
;
Li, Cheng
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/12/07
Measurement
Leadership
Voting
Scalability
Throughput
Consensus protocol
Security
Making Information Hiding Effective Again
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:
Wang, Zhe
;
Wu, Chenggang
;
Zhang, Yinqian
;
Tang, Bowen
;
Yew, Pen-Chung
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Cheng, Yueqiang
;
Shi, Zhiping
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/12/07
Instruction sets
Registers
Computer crashes
Entropy
Kernel
Security
Probes
Side channel attacks
information hiding
intra-process memory isolation
TLB misses
Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness
期刊论文
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 卷号: 11, 期号: 3, 页码: 69-78
作者:
Tan, Liang
;
Yu, Keping
;
Ming, Fangpeng
;
Cheng, Xiaofan
;
Srivastava, Gautam
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2022/12/07
Detection of and Countermeasure Against Thermal Covert Channel in Many-Core Systems
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 2, 页码: 252-265
作者:
Huang, Hengli
;
Wang, Xiaohang
;
Jiang, Yingtao
;
Singh, Amit Kumar
;
Yang, Mei
;
Huang, Letian
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/12/07
Defense against covert channel attack
detection of covert channel
many-core systems
thermal covert channel (TCC)
A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computing
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2022, 页码: 22
作者:
Zhang, Xuejun
;
He, Fucun
;
Chen, Qian
;
Jiang, Xinlong
;
Bao, Junda
;
Ren, Tongwei
;
Du, Xiaogang
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/12/07
Location privacy
Edge computing
Differential privacy
Fusion semi-supervised extreme learning machine
Indoor localization