×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术研... [7]
作者
Hu, Xing [2]
Wang, Ying [2]
Cai, Yi [1]
Chen, Pu [1]
Chen, Tian... [1]
Chen, Xiao... [1]
更多...
文献类型
期刊论文 [7]
发表日期
2024 [2]
2023 [2]
2021 [1]
2020 [1]
2018 [1]
语种
英语 [7]
出处
IEEE TRANS... [4]
IEEE TRANS... [1]
IEEE TRANS... [1]
IEEE TRANS... [1]
资助项目
Beijing Ac... [1]
Beijing In... [1]
Beijing Na... [1]
Beijing Na... [1]
China Scho... [1]
NSFC[61902... [1]
更多...
收录类别
SCI [7]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共7条,第1-7条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
On Modeling and Detecting Trojans in Instruction Sets
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:
Zhang, Ying
;
He, Aodi
;
Li, Jiaying
;
Rezine, Ahmed
;
Peng, Zebo
;
Larsson, Erik
;
Yang, Tao
;
Jiang, Jianhui
;
Li, Huawei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Trojan horses
Security
Program processors
Companies
Inspection
Hardware security
Reverse engineering
Deep test for security
hidden instruction Trojan (HIT)
unbounded model checking (UMC)
VLSI test
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
;
Wang, Ying
;
Zhao, Yongwei
;
Du, Zidong
;
Guo, Qi
;
Wang, Yanzhi
;
Zhang, Xishan
;
Chen, Tianshi
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:
Lv, Hao
;
Li, Bing
;
Zhang, Lei
;
Liu, Cheng
;
Wang, Ying
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/12/04
Security
Hardware
Neuromorphic engineering
Computational modeling
Circuit faults
Resistance
Immune system
Adversarial attack
fault injection attack
neuromorphic computing system (NCS)
processing in memory
reliability
resistive memory
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 1959-1978
作者:
Wu, Chenggang
;
Xie, Mengyao
;
Wang, Zhe
;
Zhang, Yinqian
;
Lu, Kangjie
;
Zhang, Xiaofeng
;
Lai, Yuanming
;
Kang, Yan
;
Yang, Min
;
Li, Tao
收藏
  |  
浏览/下载:20/0
  |  
提交时间:2023/12/04
Codes
Hardware
Kernel
Runtime
Security
Registers
Virtualization
Intra-process memory isolation
Intel supervisor-mode access prevention
Practical Attacks on Deep Neural Networks by Memory Trojaning
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:
Hu, Xing
;
Zhao, Yang
;
Deng, Lei
;
Liang, Ling
;
Zuo, Pengfei
;
Ye, Jing
;
Lin, Yingyan
;
Xie, Yuan
收藏
  |  
浏览/下载:46/0
  |  
提交时间:2021/12/01
Trojan horses
Hardware
Integrated circuit modeling
Computational modeling
Security
Payloads
Convolutional neural networks (CNNs)
deep learning accelerator
deep learning attack
hardware Trojan
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:328/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
The Cat and Mouse in Split Manufacturing
期刊论文
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 卷号: 26, 期号: 5, 页码: 805-817
作者:
Wang, Yujie
;
Chen, Pu
;
Hu, Jiang
;
Li, Guofeng
;
Rajendran, Jeyavijayan
收藏
  |  
浏览/下载:44/0
  |  
提交时间:2019/12/10
Hardware security
placement perturbation
split manufacturing