×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [27]
信息技术快报 [1]
作者
Kang, Yan [4]
Lai, Yuanm... [4]
Li, Tao [4]
Sun, Shiwe... [4]
Wang, Zhe [4]
Wu, Chengg... [4]
更多...
文献类型
期刊论文 [28]
发表日期
2025 [1]
2024 [2]
2023 [4]
2022 [2]
2021 [2]
2020 [4]
更多...
语种
英语 [27]
中文 [1]
出处
IEEE TRANS... [2]
NUCLEIC AC... [2]
计算机工程 [2]
ACM TRANSA... [1]
AIP ADVANC... [1]
BIOINFORMA... [1]
更多...
资助项目
National K... [3]
National N... [3]
Natural Sc... [3]
100 Talent... [2]
13th Five-... [2]
K.C. Wong ... [2]
更多...
收录类别
SCI [19]
其他 [1]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共28条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
期刊影响因子升序
期刊影响因子降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
题名升序
题名降序
WOS被引频次升序
WOS被引频次降序
Shining Light on the Inter-procedural Code Obfuscation: Keep Pace with Progress in Binary Diffing
期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2025, 卷号: 22, 期号: 1, 页码: 28
作者:
Zhang, Peihua
;
Wu, Chenggang
;
Hu, Hanzhi
;
Jia, Lichen
;
Peng, Mingfan
;
Xu, Jiali
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Wang, Zhe
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2025/06/25
Software protection
obfuscation
binary diffing
ParaLoupe: Real-Time Video Analytics on Edge Cluster via Mini Model Parallelization
期刊论文
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 卷号: 23, 期号: 12, 页码: 13945-13962
作者:
Wang, Hanling
;
Li, Qing
;
Kang, Haidong
;
Hu, Dieli
;
Ma, Lianbo
;
Tyson, Gareth
;
Yuan, Zhenhui
;
Jiang, Yong
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2025/06/25
Accuracy
Task analysis
Computational modeling
Image edge detection
Visual analytics
Streaming media
Real-time systems
Distributed computing
edge computing
real-time video analytics
Towards connection-scalable RNIC architecture
期刊论文
JOURNAL OF SUPERCOMPUTING, 2024, 页码: 25
作者:
Kang, Ning
;
Wang, Zhan
;
Yang, Fan
;
Ma, Xiaoxiao
;
Ma, Zhenlong
;
Yuan, Guojun
;
Tan, Guangming
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2024/05/20
Architecture design
Network Interface Card (NIC)
Remote Direct Memory Access (RDMA)
Scalability problem
SpecWands: An Efficient Priority-Based Scheduler Against Speculation Contention Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 12, 页码: 4477-4490
作者:
Tang, Bowen
;
Wu, Chenggang
;
Yew, Pen-Chung
;
Zhang, Yinqian
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Wang, Wei
;
Wei, Qiang
;
Wang, Zhe
收藏
  |  
浏览/下载:59/0
  |  
提交时间:2024/05/20
Resource contention
scheduling strategy
simultaneous multithreading (SMT)
transient execution attack (TEA)
Large Scale Visual Food Recognition
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 8, 页码: 9932-9949
作者:
Min, Weiqing
;
Wang, Zhiling
;
Liu, Yuxin
;
Luo, Mengjiang
;
Kang, Liping
;
Wei, Xiaoming
;
Wei, Xiaolin
;
Jiang, Shuqiang
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2023/12/04
Image recognition
Visualization
Task analysis
Benchmark testing
Representation learning
Training
Semantics
Food dataset
food recognition
large-scale datasets
fine-grained recognition
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 1959-1978
作者:
Wu, Chenggang
;
Xie, Mengyao
;
Wang, Zhe
;
Zhang, Yinqian
;
Lu, Kangjie
;
Zhang, Xiaofeng
;
Lai, Yuanming
;
Kang, Yan
;
Yang, Min
;
Li, Tao
收藏
  |  
浏览/下载:38/0
  |  
提交时间:2023/12/04
Codes
Hardware
Kernel
Runtime
Security
Registers
Virtualization
Intra-process memory isolation
Intel supervisor-mode access prevention
Iterative Self-Training Based Domain Adaptation for Cross-User sEMG Gesture Recognition
期刊论文
IEEE TRANSACTIONS ON NEURAL SYSTEMS AND REHABILITATION ENGINEERING, 2023, 卷号: 31, 页码: 2974-2987
作者:
Wang, Kang
;
Chen, Yiqiang
;
Zhang, Yingwei
;
Yang, Xiaodong
;
Hu, Chunyu
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2023/12/04
Surface electromyography
gesture recognition
cross-user
domain adaptation
semi-supervised learning
Making Information Hiding Effective Again
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:
Wang, Zhe
;
Wu, Chenggang
;
Zhang, Yinqian
;
Tang, Bowen
;
Yew, Pen-Chung
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Cheng, Yueqiang
;
Shi, Zhiping
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2022/12/07
Instruction sets
Registers
Computer crashes
Entropy
Kernel
Security
Probes
Side channel attacks
information hiding
intra-process memory isolation
TLB misses
Microbiome Resilience and Health Implications for People in Half-Year Travel
期刊论文
FRONTIERS IN IMMUNOLOGY, 2022, 卷号: 13, 页码: 15
作者:
Cheng, Mingyue
;
Liu, Hong
;
Han, Maozhen
;
Li, Shuai Cheng
;
Bu, Dongbo
;
Sun, Shiwei
;
Hu, Zhiqiang
;
Yang, Pengshuo
;
Wang, Rui
;
Liu, Yawen
;
Chen, Feng
;
Peng, Jianjun
;
Peng, Hong
;
Song, Hongxing
;
Xia, Yang
;
Chu, Liqun
;
Zhou, Quan
;
Guan, Feng
;
Wu, Jing
;
Tan, Guangming
;
Ning, Kang
收藏
  |  
浏览/下载:58/0
  |  
提交时间:2022/12/07
travel
enterotype
microbiome
bi-directional plasticity
resilience
dietary shift
immunity
health
WPC: Whole-Picture Workload Characterization Across Intermediate Representation, ISA, and Microarchitecture
期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2021, 卷号: 20, 期号: 2, 页码: 86-89
作者:
Wang, Lei
;
Xiong, Xingwang
;
Zhan, Jianfeng
;
Gao, Wanling
;
Wen, Xu
;
Kang, Guoxin
;
Tang, Fei
收藏
  |  
浏览/下载:55/0
  |  
提交时间:2021/12/01
Microarchitecture
Tools
Measurement
Pipelines
Java
Entropy
Runtime
Whole-picture workload characterization
intermediate representation
ISA
microarchitecture