CSpace

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
Trident: The Acceleration Architecture for High-Performance Private Set Intersection 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2025, 卷号: 74, 期号: 4, 页码: 1152-1167
作者:  Zhang, Jinkai;  Yang, Yinghao;  Zhou, Zhe;  Hu, Zhicheng;  Zhao, Xin;  Chang, Liang;  Lu, Hang;  Li, Xiaowei
收藏  |  浏览/下载:4/0  |  提交时间:2025/06/25
Protocols  Receivers  Cryptography  Hardware  Central Processing Unit  Random access memory  Data privacy  Polynomials  Field programmable gate arrays  Computer architecture  Private set intersection (PSI)  fully homomorphic encryption (FHE)  FPGA accelerator  privacy computing  
Generic Sensitivity: Generics-Guided Context Sensitivity for Pointer Analysis 期刊论文
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2024, 卷号: 50, 期号: 5, 页码: 1144-1162
作者:  Li, Haofeng;  Tan, Tian;  Li, Yue;  Lu, Jie;  Meng, Haining;  Cao, Liqing;  Huang, Yongheng;  Li, Lian;  Gao, Lin;  Di, Peng;  Lin, Liang;  Cui, Chenxi
收藏  |  浏览/下载:18/0  |  提交时间:2024/12/06
Sensitivity  Receivers  Java  Resource management  Codes  Software  Benchmark testing  Pointer analysis  generic programming  context sensitivity  
Estuary: A Low Cross-Shard Blockchain Sharding Protocol Based on State Splitting 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2024, 卷号: 35, 期号: 3, 页码: 405-420
作者:  Jia, Linpeng;  Liu, Yanxiu;  Wang, Keyuan;  Sun, Yi
收藏  |  浏览/下载:31/0  |  提交时间:2024/05/20
Sharding  Protocols  Throughput  Blockchains  Estuaries  Sun  Receivers  Blockchain  low cross-shard  sharding  state model  
Revisiting AUC-Oriented Adversarial Training With Loss-Agnostic Perturbations 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2023, 卷号: 45, 期号: 12, 页码: 15494-15511
作者:  Yang, Zhiyong;  Xu, Qianqian;  Hou, Wenzheng;  Bao, Shilong;  He, Yuan;  Cao, Xiaochun;  Huang, Qingming
收藏  |  浏览/下载:32/0  |  提交时间:2024/05/20
Optimization  Training  Perturbation methods  Machine learning  Receivers  Machine learning algorithms  Linear programming  AUC Optimization  adversarial learning  machine learning  
Modeling and Analysis of Thermal Covert Channel Attacks in Many-core Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2023, 卷号: 72, 期号: 2, 页码: 494-500
作者:  Wang, Shengjie;  Wang, Xiaohang;  Jiang, Yingtao;  Singh, Amit Kumar;  Yang, Mei;  Huang, Letian
收藏  |  浏览/下载:39/0  |  提交时间:2023/07/12
Computational modeling  Receivers  Transmitters  Encoding  Bit error rate  Signal to noise ratio  Thermal conductivity  Many-core systems  thermal covert channel  analytical model  
Combating Stealthy Thermal Covert Channel Attack With Its Thermal Signal Transmitted in Direct Sequence Spread Spectrum 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 11, 页码: 4064-4075
作者:  Wang, Xiaohang;  Wang, Shengjie;  Jiang, Yingtao;  Singh, Amit Kumar;  Yang, Mei;  Huang, Letian
收藏  |  浏览/下载:35/0  |  提交时间:2023/07/12
Spread spectrum communication  Transmitters  Encoding  Bit error rate  Receivers  Codes  Thermal noise  Defense against covert channel attack  many-core systems  thermal covert channel (TCC) attack  
Design of Power-Imbalanced SCMA Codebook 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 卷号: 71, 期号: 2, 页码: 2140-2145
作者:  Li, Xudong;  Gao, Zhicheng;  Gui, Yiming;  Liu, Zilong;  Xiao, Pei;  Yu, Lisu
收藏  |  浏览/下载:47/0  |  提交时间:2022/12/07
NOMA  Genetic algorithms  Electronic mail  Downlink  Sparse matrices  Codes  Receivers  Sparse code multiple access (SCMA)  power imbalance  near-far effect  minimum Euclidean distance (MED)  minimum product distance (MPD)