CSpace

浏览/检索结果: 共11条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
INOR-An Intelligent noise reduction method to defend against adversarial audio examples 期刊论文
NEUROCOMPUTING, 2020, 卷号: 401, 页码: 160-172
作者:  Guo, Qingli;  Ye, Jing;  Chen, Yiran;  Hu, Yu;  Lan, Yazhu;  Zhang, Guohe;  Li, Xiaowei
收藏  |  浏览/下载:60/0  |  提交时间:2020/12/10
Adversarial audio examples  Defense against adversarial audio examples  INOR  
MultiPAD: A Multivariant Partition-Based Method for Audio Adversarial Examples Detection 期刊论文
IEEE ACCESS, 2020, 卷号: 8, 页码: 63368-63380
作者:  Guo, Qingli;  Ye, Jing;  Hu, Yu;  Zhang, Guohe;  Li, Xiaowei;  Li, Huawei
收藏  |  浏览/下载:49/0  |  提交时间:2020/12/10
Speech recognition  Feature extraction  Decoding  Mathematical model  Acoustics  Psychoacoustic models  Radio frequency  Adversarial examples  audio  detection  multivariant partition  
Quick-and-Dirty: An Architecture for High-Performance Temporary Short Writes in MLC PCM 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2019, 卷号: 68, 期号: 9, 页码: 1365-1375
作者:  Zhang, Mingzhe;  Zhang, Lunkai;  Jiang, Lei;  Chong, Frederic T.;  Liu, Zhiyong
收藏  |  浏览/下载:83/0  |  提交时间:2019/12/10
MLC PCM  performance  lifetime  retention time  tradeoff  
Scan Chain Based Attacks and Countermeasures: A Survey 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 85055-85065
作者:  Li, Xiaowei;  Li, Wenjie;  Ye, Jing;  Li, Huawei;  Hu, Yu
收藏  |  浏览/下载:63/0  |  提交时间:2019/12/10
Scan chain based attacks  test mode  mode switch  signature  secure scan chain  secret key  physical unclonable function  
PIMSim: A Flexible and Detailed Processing-in-Memory Simulator 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2019, 卷号: 18, 期号: 1, 页码: 6-9
作者:  Xu, Sheng;  Chen, Xiaoming;  Wang, Ying;  Han, Yinhe;  Qian, Xuehai;  Li, Xiaowei
收藏  |  浏览/下载:89/0  |  提交时间:2019/04/03
Processing-in-memory  simulator  heterogeneous computing  memory system  
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks 期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 卷号: 15, 期号: 4, 页码: 21
作者:  Zhang, Jun;  Hou, Rui;  Song, Wei;  Mckee, Sally A.;  Jia, Zhen;  Zheng, Chen;  Chen, Mingyu;  Zhang, Lixin;  Meng, Dan
收藏  |  浏览/下载:85/0  |  提交时间:2019/04/03
Code-reuse attacks  return-oriented programming attacks  message authentication code  AES-128  key management  PUF  
PUFPass: A password management mechanism based on software/hardware codesign 期刊论文
INTEGRATION-THE VLSI JOURNAL, 2019, 卷号: 64, 页码: 173-183
作者:  Guo, Qingli;  Ye, Jing;  Li, Bing;  Hu, Yu;  Li, Xiaowei;  Lan, Yazhu;  Zhang, Guohe
收藏  |  浏览/下载:77/0  |  提交时间:2019/04/03
Password  Password management mechanism  PUF  Security  Usability  
NVM Streaker: a fast and reconfigurable performance simulator for non-volatile memory-based memory architecture 期刊论文
JOURNAL OF SUPERCOMPUTING, 2018, 卷号: 74, 期号: 8, 页码: 3875-3903
作者:  Hu, Danqi;  Lv, Fang;  Wang, Chenxi;  Cui, Hui-Min;  Wang, Lei;  Liu, Ying;  Feng, Xiao-Bing
收藏  |  浏览/下载:74/0  |  提交时间:2019/12/10
NVM  Reconfigurable  Fast simulation  Big data  
PTAT: An Efficient and Precise Tool for Tracing and Profiling Detailed TLB Misses 期刊论文
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2018, 卷号: 17, 期号: 3, 页码: 17
作者:  Zhang, Jiutian;  Liu, Yuhang;  Li, Haifeng;  Zhu, Xiaojing;  Chen, Mingyu
收藏  |  浏览/下载:80/0  |  提交时间:2019/12/10
TLB misses  hardware profiling tool  memory trace collector  efficiency  precision  
Towards the Tradeoffs in Designing Data Center Network Architectures 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2017, 卷号: 28, 期号: 1, 页码: 260-273
作者:  Li, Dawei;  Wu, Jie;  Liu, Zhiyong;  Zhang, Fa
收藏  |  浏览/下载:48/0  |  提交时间:2019/12/12
Data center network (DCN)  power consumption  end-to-end delay  bisection bandwidth  dual-centric design