CSpace

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
On Modeling and Detecting Trojans in Instruction Sets 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:  Zhang, Ying;  He, Aodi;  Li, Jiaying;  Rezine, Ahmed;  Peng, Zebo;  Larsson, Erik;  Yang, Tao;  Jiang, Jianhui;  Li, Huawei
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Trojan horses  Security  Program processors  Companies  Inspection  Hardware security  Reverse engineering  Deep test for security  hidden instruction Trojan (HIT)  unbounded model checking (UMC)  VLSI test  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:11/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:  Lv, Hao;  Li, Bing;  Zhang, Lei;  Liu, Cheng;  Wang, Ying
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Security  Hardware  Neuromorphic engineering  Computational modeling  Circuit faults  Resistance  Immune system  Adversarial attack  fault injection attack  neuromorphic computing system (NCS)  processing in memory  reliability  resistive memory  
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 1959-1978
作者:  Wu, Chenggang;  Xie, Mengyao;  Wang, Zhe;  Zhang, Yinqian;  Lu, Kangjie;  Zhang, Xiaofeng;  Lai, Yuanming;  Kang, Yan;  Yang, Min;  Li, Tao
收藏  |  浏览/下载:20/0  |  提交时间:2023/12/04
Codes  Hardware  Kernel  Runtime  Security  Registers  Virtualization  Intra-process memory isolation  Intel supervisor-mode access prevention  
Practical Attacks on Deep Neural Networks by Memory Trojaning 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:  Hu, Xing;  Zhao, Yang;  Deng, Lei;  Liang, Ling;  Zuo, Pengfei;  Ye, Jing;  Lin, Yingyan;  Xie, Yuan
收藏  |  浏览/下载:46/0  |  提交时间:2021/12/01
Trojan horses  Hardware  Integrated circuit modeling  Computational modeling  Security  Payloads  Convolutional neural networks (CNNs)  deep learning accelerator  deep learning attack  hardware Trojan  
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:328/0  |  提交时间:2020/12/10
Artificial neural networks  Nonvolatile memory  Encryption  Computational modeling  Hardware  Non-volatile memory (NVM)  compute-in-memory (CIM)  neural network  security  encryption  
The Cat and Mouse in Split Manufacturing 期刊论文
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 卷号: 26, 期号: 5, 页码: 805-817
作者:  Wang, Yujie;  Chen, Pu;  Hu, Jiang;  Li, Guofeng;  Rajendran, Jeyavijayan
收藏  |  浏览/下载:44/0  |  提交时间:2019/12/10
Hardware security  placement perturbation  split manufacturing