CSpace

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:13/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
DHSA: efficient doubly homomorphic secure aggregation for cross-silo federated learning 期刊论文
JOURNAL OF SUPERCOMPUTING, 2022, 页码: 31
作者:  Liu, Zizhen;  Chen, Si;  Ye, Jing;  Fan, Junfeng;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:16/0  |  提交时间:2022/12/07
Federated learning  Security  Efficient  Homomorphic  
A Bilayer Scalable Nakamoto Consensus Protocol for Blockchain Systems 期刊论文
IEEE NETWORK, 2022, 卷号: 36, 期号: 3, 页码: 174-182
作者:  Jiao, Zhenzhen;  Tian, Rui;  Shang, Dezhong;  Ding, Hui;  Zhang, Baoxian;  Li, Cheng
收藏  |  浏览/下载:24/0  |  提交时间:2022/12/07
Measurement  Leadership  Voting  Scalability  Throughput  Consensus protocol  Security  
Characterising Usage Patterns and Privacy Risks of a Home Security Camera Service 期刊论文
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2022, 卷号: 21, 期号: 7, 页码: 2344-2357
作者:  Li, Jinyang;  Li, Zhenyu;  Tyson, Gareth;  Xie, Gaogang
收藏  |  浏览/下载:15/0  |  提交时间:2022/12/07
Cameras  Privacy  Streaming media  Servers  Motion detection  Mobile computing  Feeds  Home security camera  IoT  privacy  usage pattern  
Making Information Hiding Effective Again 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Cheng, Yueqiang;  Shi, Zhiping
收藏  |  浏览/下载:17/0  |  提交时间:2022/12/07
Instruction sets  Registers  Computer crashes  Entropy  Kernel  Security  Probes  Side channel attacks  information hiding  intra-process memory isolation  TLB misses  
Quantum Network: Security Assessment and Key Management 期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 卷号: 30, 期号: 3, 页码: 1328-1339
作者:  Zhou, Hongyi;  Lv, Kefan;  Huang, Longbo;  Ma, Xiongfeng
收藏  |  浏览/下载:19/0  |  提交时间:2022/12/07
Security  Quantum networks  Computer hacking  Data communication  Task analysis  Routing  Quantum channels  Quantum key distribution  Lyapunov analysis  queueing  
A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings 期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2022, 卷号: 9, 期号: 11, 页码: 8154-8167
作者:  Yu, Keping;  Tan, Liang;  Yang, Caixia;  Choo, Kim-Kwang Raymond;  Bashir, Ali Kashif;  Rodrigues, Joel J. P. C.;  Sato, Takuro
收藏  |  浏览/下载:18/0  |  提交时间:2022/12/07
Industrial Internet of Things  Security  Cloud computing  Blockchains  Encryption  Edge computing  Logic gates  Blockchain  data protection  Industrial Internet of Things (IIoT)  Shamir secret sharing (SSS)  
LIAS: A Lightweight Incentive Authentication Scheme for Forensic Services in IoV 期刊论文
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2022, 页码: 16
作者:  Zhang, Mingyue;  Zhou, Junlong;  Cong, Peijin;  Zhang, Gongxuan;  Zhuo, Cheng;  Hu, Shiyan
收藏  |  浏览/下载:17/0  |  提交时间:2022/12/07
Forensics  Authentication  Security  Privacy  Computer architecture  Cameras  Message authentication  Anonymous authentication  forensic service  lightweight  incentive  Internet of Vehicles  security  
Attention-guided transformation-invariant attack for black-box adversarial examples 期刊论文
INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 页码: 24
作者:  Zhu, Jiaqi;  Dai, Feng;  Yu, Lingyun;  Xie, Hongtao;  Wang, Lidong;  Wu, Bo;  Zhang, Yongdong
收藏  |  浏览/下载:16/0  |  提交时间:2022/12/07
adversarial examples  attention  media convergence  security  transformation-invariant  
Towards Secure and Privacy-Preserving Data Sharing for COVID-19 Medical Records: A Blockchain-Empowered Approach 期刊论文
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 卷号: 9, 期号: 1, 页码: 271-281
作者:  Tan, Liang;  Yu, Keping;  Shi, Na;  Yang, Caixia;  Wei, Wei;  Lu, Huimin
收藏  |  浏览/下载:17/0  |  提交时间:2022/12/07
COVID-19  Blockchains  Encryption  Privacy  Hospitals  Outsourcing  Authorization  Blockchain  security and privacy protection  traceable and revocation  COVID-19  electronic medical records