×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [10]
作者
Tan, Liang [2]
Yang, Caix... [2]
Yu, Keping [2]
Bashir, Al... [1]
Chen, Si [1]
Chen, Xiao... [1]
更多...
文献类型
期刊论文 [10]
发表日期
2022 [10]
语种
英语 [10]
出处
IEEE INTER... [1]
IEEE NETWO... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
更多...
资助项目
Japan Soci... [2]
Japan Soci... [2]
National N... [2]
Sichuan Pr... [2]
Sichuan Pr... [2]
Youth Inno... [2]
更多...
收录类别
SCI [10]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共10条,第1-10条
帮助
限定条件
发表日期:2022
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
题名升序
题名降序
A Systematic View of Model Leakage Risks in Deep Neural Network Systems
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:
Hu, Xing
;
Liang, Ling
;
Chen, Xiaobing
;
Deng, Lei
;
Ji, Yu
;
Ding, Yufei
;
Du, Zidong
;
Guo, Qi
;
Sherwood, Tim
;
Xie, Yuan
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2023/07/12
Domain-specific architecture
deep learning security
model security
DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning
期刊论文
JOURNAL OF SUPERCOMPUTING, 2022, 页码: 31
作者:
Liu, Zizhen
;
Chen, Si
;
Ye, Jing
;
Fan, Junfeng
;
Li, Huawei
;
Li, Xiaowei
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/12/07
Federated learning
Security
Efficient
Homomorphic
A Bilayer Scalable Nakamoto Consensus Protocol for Blockchain Systems
期刊论文
IEEE NETWORK, 2022, 卷号: 36, 期号: 3, 页码: 174-182
作者:
Jiao, Zhenzhen
;
Tian, Rui
;
Shang, Dezhong
;
Ding, Hui
;
Zhang, Baoxian
;
Li, Cheng
收藏
  |  
浏览/下载:24/0
  |  
提交时间:2022/12/07
Measurement
Leadership
Voting
Scalability
Throughput
Consensus protocol
Security
Characterising Usage Patterns and Privacy Risks of a Home Security Camera Service
期刊论文
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 卷号: 21, 期号: 7, 页码: 2344-2357
作者:
Li, Jinyang
;
Li, Zhenyu
;
Tyson, Gareth
;
Xie, Gaogang
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2022/12/07
Cameras
Privacy
Streaming media
Servers
Motion detection
Mobile computing
Feeds
Home security camera
IoT
privacy
usage pattern
Making Information Hiding Effective Again
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:
Wang, Zhe
;
Wu, Chenggang
;
Zhang, Yinqian
;
Tang, Bowen
;
Yew, Pen-Chung
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Cheng, Yueqiang
;
Shi, Zhiping
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/12/07
Instruction sets
Registers
Computer crashes
Entropy
Kernel
Security
Probes
Side channel attacks
information hiding
intra-process memory isolation
TLB misses
Quantum Network: Security Assessment and Key Management
期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 卷号: 30, 期号: 3, 页码: 1328-1339
作者:
Zhou, Hongyi
;
Lv, Kefan
;
Huang, Longbo
;
Ma, Xiongfeng
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2022/12/07
Security
Quantum networks
Computer hacking
Data communication
Task analysis
Routing
Quantum channels
Quantum key distribution
Lyapunov analysis
queueing
A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 9, 期号: 11, 页码: 8154-8167
作者:
Yu, Keping
;
Tan, Liang
;
Yang, Caixia
;
Choo, Kim-Kwang Raymond
;
Bashir, Ali Kashif
;
Rodrigues, Joel J. P. C.
;
Sato, Takuro
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2022/12/07
Industrial Internet of Things
Security
Cloud computing
Blockchains
Encryption
Edge computing
Logic gates
Blockchain
data protection
Industrial Internet of Things (IIoT)
Shamir secret sharing (SSS)
LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV
期刊论文
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 页码: 16
作者:
Zhang, Mingyue
;
Zhou, Junlong
;
Cong, Peijin
;
Zhang, Gongxuan
;
Zhuo, Cheng
;
Hu, Shiyan
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/12/07
Forensics
Authentication
Security
Privacy
Computer architecture
Cameras
Message authentication
Anonymous authentication
forensic service
lightweight
incentive
Internet of Vehicles
security
Attention-guided transformation-invariant attack for black-box adversarial examples
期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:
Zhu, Jiaqi
;
Dai, Feng
;
Yu, Lingyun
;
Xie, Hongtao
;
Wang, Lidong
;
Wu, Bo
;
Zhang, Yongdong
收藏
  |  
浏览/下载:16/0
  |  
提交时间:2022/12/07
adversarial examples
attention
media convergence
security
transformation-invariant
Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach
期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 卷号: 9, 期号: 1, 页码: 271-281
作者:
Tan, Liang
;
Yu, Keping
;
Shi, Na
;
Yang, Caixia
;
Wei, Wei
;
Lu, Huimin
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2022/12/07
COVID-19
Blockchains
Encryption
Privacy
Hospitals
Outsourcing
Authorization
Blockchain
security and privacy protection
traceable and revocation
COVID-19
electronic medical records