CSpace

浏览/检索结果: 共23条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:  Tang, Bowen;  Wu, Chenggang;  Yew, Pen-Chung;  Zhang, Yinqian;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Wang, Wei;  Wei, Qiang;  Wang, Zhe
收藏  |  浏览/下载:8/0  |  提交时间:2024/05/20
Resource contention  scheduling strategy  simultaneous multithreading (SMT)  transient execution attack (TEA)  
Blockchain-enabled device command operation security for Industrial Internet of Things 期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2023, 卷号: 148, 页码: 280-297
作者:  Fu, Luxia;  Zhang, Zhuang;  Tan, Liang;  Yao, Zhengyi;  Tan, Hongxin;  Xie, Jingxue;  She, Kun
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Access control  Device commands  Blockchain  Commands assert quota  
Adversarial camouflage for node injection attack on graphs 期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:  Tao, Shuchang;  Cao, Qi;  Shen, Huawei;  Wu, Yunfan;  Hou, Liang;  Sun, Fei;  Cheng, Xueqi
收藏  |  浏览/下载:8/0  |  提交时间:2023/12/04
Adversarial camouflage  Node injection attack  Adversarial attack  Graph neural networks  
A New Reconfigurable True Random Number Generator and Physical Unclonable Function Unified Chip With On-Chip Auto-Calibration 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 页码: 14
作者:  Cao, Yuan;  Liu, Wanyi;  Zheng, Yue;  Chen, Shuai;  Ye, Jing;  Qian, Lei;  Chang, Chip-Hong
收藏  |  浏览/下载:8/0  |  提交时间:2023/12/04
Entropy  Authentication  System-on-chip  Protocols  Jitter  Computer architecture  Rail to rail outputs  True random number generator  physical unclonable function  current-starved ring oscillator  
Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province[SKLACSS-202209] 项目
项目编号: SKLACSS-202209, 资助机构: Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province, 2023-
-
收藏  |  浏览/下载:5/0  |  提交时间:2023/12/04
Random Beam Switching: A Physical Layer Key Generation Approach to Safeguard mmWave Electronic Devices 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 卷号: 69, 期号: 3, 页码: 594-607
作者:  Ju, Ying;  Zou, Guoxue;  Bai, Haowen;  Liu, Lei;  Pei, Qingqi;  Wu, Celimuge;  Otaibi, Sattam Al
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Electronic device security  physical layer key generation  millimeter wave  static environments  beamforming  
BoAu: Malicious traffic detection with noise labels based on boundary augmentation 期刊论文
COMPUTERS & SECURITY, 2023, 卷号: 131, 页码: 13
作者:  Yuan, Qingjun;  Liu, Chang;  Yu, Wentao;  Zhu, Yuefei;  Xiong, Gang;  Wang, Yongjuan;  Gou, Gaopeng
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Malicious traffic detection  Deep learning  Learning with noise labels  Decision boundaries  Encrypted traffic  
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 4, 页码: 3449-3465
作者:  Xu, Zhiwei;  Wang, Xin;  Zhang, Yujun
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
DDoS attacks  persistent attack detection  named date networking  malicious traffic pattern  lightweight  advanced FM sketch  
Characterizing and Understanding Defense Methods for GNNs on GPUs 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:  Wu, Meng;  Yan, Mingyu;  Yang, Xiaocheng;  Li, Wenming;  Zhang, Zhimin;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Kernel  Purification  Estimation  Graphics processing units  Perturbation methods  Electric breakdown  Training  Graph neural networks  defense  execution semantic  execution pattern  overhead  
TSC-VEE: A TrustZone-Based Smart Contract Virtual Execution Environment 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 卷号: 34, 期号: 6, 页码: 1773-1788
作者:  Jian, Zhaolong;  Lu, Ye;  Qiao, Youyang;  Fang, Yaozheng;  Xie, Xueshuo;  Yang, Dayi;  Zhou, Zhiyuan;  Li, Tao
收藏  |  浏览/下载:7/0  |  提交时间:2023/12/04
Smart contracts  Blockchains  Memory management  Switches  Codes  Public key  Optimization  Blockchain  smart contract  solidity program language  TrustZone  virtual execution environment