×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [19]
项目 [3]
作者
Cao, Yuan [2]
Chang, Chi... [2]
Chen, Shua... [2]
Kang, Yan [2]
Lai, Yuanm... [2]
Li, Huawei [2]
更多...
文献类型
期刊论文 [20]
项目 [3]
发表日期
2023 [23]
语种
英语 [20]
出处
IEEE TRANS... [4]
COMPUTERS ... [2]
IEEE TRANS... [2]
FUTURE GEN... [1]
IEEE COMPU... [1]
IEEE TRANS... [1]
更多...
资助项目
National K... [2]
National N... [2]
National N... [2]
National N... [2]
Strategic ... [2]
Youth Inno... [2]
更多...
收录类别
SCI [20]
资助机构
Open Fund ... [1]
Open Proje... [1]
Program of... [1]
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共23条,第1-10条
帮助
限定条件
发表日期:2023
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:
Tang, Bowen
;
Wu, Chenggang
;
Yew, Pen-Chung
;
Zhang, Yinqian
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Wang, Wei
;
Wei, Qiang
;
Wang, Zhe
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2024/05/20
Resource contention
scheduling strategy
simultaneous multithreading (SMT)
transient execution attack (TEA)
Blockchain-enabled device command operation security for Industrial Internet of Things
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 卷号: 148, 页码: 280-297
作者:
Fu, Luxia
;
Zhang, Zhuang
;
Tan, Liang
;
Yao, Zhengyi
;
Tan, Hongxin
;
Xie, Jingxue
;
She, Kun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Access control
Device commands
Blockchain
Commands assert quota
Adversarial camouflage for node injection attack on graphs
期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
;
Sun, Fei
;
Cheng, Xueqi
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/12/04
Adversarial camouflage
Node injection attack
Adversarial attack
Graph neural networks
A New Reconfigurable True Random Number Generator and Physical Unclonable Function Unified Chip With On-Chip Auto-Calibration
期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 页码: 14
作者:
Cao, Yuan
;
Liu, Wanyi
;
Zheng, Yue
;
Chen, Shuai
;
Ye, Jing
;
Qian, Lei
;
Chang, Chip-Hong
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2023/12/04
Entropy
Authentication
System-on-chip
Protocols
Jitter
Computer architecture
Rail to rail outputs
True random number generator
physical unclonable function
current-starved ring oscillator
Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province[SKLACSS-202209]
项目
项目编号: SKLACSS-202209, 资助机构: Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province, 2023-
-
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2023/12/04
Random Beam Switching: A Physical Layer Key Generation Approach to Safeguard mmWave Electronic Devices
期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 卷号: 69, 期号: 3, 页码: 594-607
作者:
Ju, Ying
;
Zou, Guoxue
;
Bai, Haowen
;
Liu, Lei
;
Pei, Qingqi
;
Wu, Celimuge
;
Otaibi, Sattam Al
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Electronic device security
physical layer key generation
millimeter wave
static environments
beamforming
BoAu: Malicious traffic detection with noise labels based on boundary augmentation
期刊论文
COMPUTERS & SECURITY, 2023, 卷号: 131, 页码: 13
作者:
Yuan, Qingjun
;
Liu, Chang
;
Yu, Wentao
;
Zhu, Yuefei
;
Xiong, Gang
;
Wang, Yongjuan
;
Gou, Gaopeng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Malicious traffic detection
Deep learning
Learning with noise labels
Decision boundaries
Encrypted traffic
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 4, 页码: 3449-3465
作者:
Xu, Zhiwei
;
Wang, Xin
;
Zhang, Yujun
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
DDoS attacks
persistent attack detection
named date networking
malicious traffic pattern
lightweight
advanced FM sketch
Characterizing and Understanding Defense Methods for GNNs on GPUs
期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:
Wu, Meng
;
Yan, Mingyu
;
Yang, Xiaocheng
;
Li, Wenming
;
Zhang, Zhimin
;
Ye, Xiaochun
;
Fan, Dongrui
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Kernel
Purification
Estimation
Graphics processing units
Perturbation methods
Electric breakdown
Training
Graph neural networks
defense
execution semantic
execution pattern
overhead
TSC-VEE: A TrustZone-Based Smart Contract Virtual Execution Environment
期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 卷号: 34, 期号: 6, 页码: 1773-1788
作者:
Jian, Zhaolong
;
Lu, Ye
;
Qiao, Youyang
;
Fang, Yaozheng
;
Xie, Xueshuo
;
Yang, Dayi
;
Zhou, Zhiyuan
;
Li, Tao
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2023/12/04
Smart contracts
Blockchains
Memory management
Switches
Codes
Public key
Optimization
Blockchain
smart contract
solidity program language
TrustZone
virtual execution environment