CSpace

浏览/检索结果: 共13条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:14/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
Combating Stealthy Thermal Covert Channel Attack With Its Thermal Signal Transmitted in Direct Sequence Spread Spectrum 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 11, 页码: 4064-4075
作者:  Wang, Xiaohang;  Wang, Shengjie;  Jiang, Yingtao;  Singh, Amit Kumar;  Yang, Mei;  Huang, Letian
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Spread spectrum communication  Transmitters  Encoding  Bit error rate  Receivers  Codes  Thermal noise  Defense against covert channel attack  many-core systems  thermal covert channel (TCC) attack  
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 卷号: 71, 期号: 11, 页码: 12250-12263
作者:  Shen, Meng;  Lu, Hao;  Wang, Fei;  Liu, Huisen;  Zhu, Liehuang
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Blockchain  identity authentication  Internet-of-Vehicles  
Modeling and simulation analysis of crowd evacuation behavior under terrorist attack 期刊论文
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 卷号: 604, 页码: 20
作者:  Liu, Jing;  Jia, Yang;  Mao, Tianlu;  Wang, Zhaoqi
收藏  |  浏览/下载:12/0  |  提交时间:2023/07/12
Evacuation simulation  Terrorist attack  Floor field model  Effect of obstacles  
Image Denoising Based on GAN with Optimization Algorithm 期刊论文
ELECTRONICS, 2022, 卷号: 11, 期号: 15, 页码: 12
作者:  Zhu, Min-Ling;  Zhao, Liang-Liang;  Xiao, Li
收藏  |  浏览/下载:21/0  |  提交时间:2022/12/07
image denoising  GAN  optimization algorithm  autoencoder  ResNet  
A Bilayer Scalable Nakamoto Consensus Protocol for Blockchain Systems 期刊论文
IEEE NETWORK, 2022, 卷号: 36, 期号: 3, 页码: 174-182
作者:  Jiao, Zhenzhen;  Tian, Rui;  Shang, Dezhong;  Ding, Hui;  Zhang, Baoxian;  Li, Cheng
收藏  |  浏览/下载:27/0  |  提交时间:2022/12/07
Measurement  Leadership  Voting  Scalability  Throughput  Consensus protocol  Security  
Making Information Hiding Effective Again 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Cheng, Yueqiang;  Shi, Zhiping
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Instruction sets  Registers  Computer crashes  Entropy  Kernel  Security  Probes  Side channel attacks  information hiding  intra-process memory isolation  TLB misses  
Secure and Resilient Artificial Intelligence of Things: A HoneyNet Approach for Threat Detection and Situational Awareness 期刊论文
IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 卷号: 11, 期号: 3, 页码: 69-78
作者:  Tan, Liang;  Yu, Keping;  Ming, Fangpeng;  Cheng, Xiaofan;  Srivastava, Gautam
收藏  |  浏览/下载:20/0  |  提交时间:2022/12/07
Detection of and Countermeasure Against Thermal Covert Channel in Many-Core Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 2, 页码: 252-265
作者:  Huang, Hengli;  Wang, Xiaohang;  Jiang, Yingtao;  Singh, Amit Kumar;  Yang, Mei;  Huang, Letian
收藏  |  浏览/下载:17/0  |  提交时间:2022/12/07
Defense against covert channel attack  detection of covert channel  many-core systems  thermal covert channel (TCC)  
A differentially private indoor localization scheme with fusion of WiFi and bluetooth fingerprints in edge computing 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2022, 页码: 22
作者:  Zhang, Xuejun;  He, Fucun;  Chen, Qian;  Jiang, Xinlong;  Bao, Junda;  Ren, Tongwei;  Du, Xiaogang
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Location privacy  Edge computing  Differential privacy  Fusion semi-supervised extreme learning machine  Indoor localization