×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技... [471]
中国科学院计算技术... [73]
信息技术快报 [25]
更多...
作者
Tan, Liang [7]
Yu, Keping [7]
孙毓忠 [5]
Shan, Shig... [4]
Ye, Jing [4]
Zhang, Yuj... [4]
更多...
文献类型
学位论文 [466]
期刊论文 [105]
项目 [1]
发表日期
2023 [7]
2022 [14]
2021 [15]
2020 [8]
2019 [7]
2018 [44]
更多...
语种
中文 [497]
英语 [74]
出处
信息技术快报 [25]
IEEE ACCES... [5]
IEEE TRANS... [5]
IEEE TRANS... [4]
INFORMATIO... [4]
COMPUTERS ... [3]
更多...
资助项目
National N... [7]
Japan Soci... [6]
Sichuan Pr... [5]
Sichuan Pr... [4]
Japan Soci... [3]
National N... [3]
更多...
收录类别
SCI [73]
其他 [31]
资助机构
Qi''anxin ... [1]
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共572条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
Dual Sampling Based Causal Intervention for Face Anti-Spoofing With Identity Debiasing
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 851-862
作者:
Long, Xingming
;
Zhang, Jie
;
Wu, Shuzhe
;
Jin, Xin
;
Shan, Shiguang
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2024/05/20
Causal intervention
backdoor adjustment
face anti-spoofing
out-of-distribution
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:
Tang, Bowen
;
Wu, Chenggang
;
Yew, Pen-Chung
;
Zhang, Yinqian
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Wang, Wei
;
Wei, Qiang
;
Wang, Zhe
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2024/05/20
Resource contention
scheduling strategy
simultaneous multithreading (SMT)
transient execution attack (TEA)
Adversarial camouflage for node injection attack on graphs
期刊论文
INFORMATION SCIENCES, 2023, 卷号: 649, 页码: 14
作者:
Tao, Shuchang
;
Cao, Qi
;
Shen, Huawei
;
Wu, Yunfan
;
Hou, Liang
;
Sun, Fei
;
Cheng, Xueqi
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/12/04
Adversarial camouflage
Node injection attack
Adversarial attack
Graph neural networks
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 4, 页码: 3449-3465
作者:
Xu, Zhiwei
;
Wang, Xin
;
Zhang, Yujun
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
DDoS attacks
persistent attack detection
named date networking
malicious traffic pattern
lightweight
advanced FM sketch
TSC-VEE: A TrustZone-Based Smart Contract Virtual Execution Environment
期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2023, 卷号: 34, 期号: 6, 页码: 1773-1788
作者:
Jian, Zhaolong
;
Lu, Ye
;
Qiao, Youyang
;
Fang, Yaozheng
;
Xie, Xueshuo
;
Yang, Dayi
;
Zhou, Zhiyuan
;
Li, Tao
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Smart contracts
Blockchains
Memory management
Switches
Codes
Public key
Optimization
Blockchain
smart contract
solidity program language
TrustZone
virtual execution environment
Rethinking Label Flipping Attack: From Sample Masking to Sample Thresholding
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 6, 页码: 7668-7685
作者:
Xu, Qianqian
;
Yang, Zhiyong
;
Zhao, Yunrui
;
Cao, Xiaochun
;
Huang, Qingming
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Data models
Training data
Training
Deep learning
Predictive models
Testing
Optimization
Label flipping attack
machine learning
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:
Lv, Hao
;
Li, Bing
;
Zhang, Lei
;
Liu, Cheng
;
Wang, Ying
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2023/12/04
Security
Hardware
Neuromorphic engineering
Computational modeling
Circuit faults
Resistance
Immune system
Adversarial attack
fault injection attack
neuromorphic computing system (NCS)
processing in memory
reliability
resistive memory
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 1959-1978
作者:
Wu, Chenggang
;
Xie, Mengyao
;
Wang, Zhe
;
Zhang, Yinqian
;
Lu, Kangjie
;
Zhang, Xiaofeng
;
Lai, Yuanming
;
Kang, Yan
;
Yang, Min
;
Li, Tao
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2023/12/04
Codes
Hardware
Kernel
Runtime
Security
Registers
Virtualization
Intra-process memory isolation
Intel supervisor-mode access prevention
Secured Data Transmission Over Insecure Networks-on-Chip by Modulating Inter-Packet Delays
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 11, 页码: 4313-4324
作者:
Xu, Jiaen
;
Wang, Xiaohang
;
Jiang, Yingtao
;
Singh, Amit Kumar
;
Gu, Chongyan
;
Huang, Letian
;
Yang, Mei
;
Li, Shunbin
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2023/07/12
Block coding
inter-packet delay
network-on-chip (NoC)
secure channel
Secure and Efficient Blockchain-Assisted Authentication for Edge-Integrated Internet-of-Vehicles
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 卷号: 71, 期号: 11, 页码: 12250-12263
作者:
Shen, Meng
;
Lu, Hao
;
Wang, Fei
;
Liu, Huisen
;
Zhu, Liehuang
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2023/07/12
Blockchain
identity authentication
Internet-of-Vehicles