×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术... [69]
作者
Li, Xiaowe... [4]
Tan, Liang [4]
Ye, Jing [4]
Yu, Keping [4]
Chen, Tian... [3]
Guo, Qi [3]
更多...
文献类型
期刊论文 [69]
发表日期
2024 [9]
2023 [6]
2022 [10]
2021 [4]
2020 [10]
2019 [7]
更多...
语种
英语 [69]
出处
IEEE TRANS... [5]
IEEE ACCES... [4]
IEEE NETWO... [4]
COMPUTERS ... [3]
IEEE TRANS... [3]
COMPUTER N... [2]
更多...
资助项目
Japan Soci... [4]
National N... [4]
Sichuan Pr... [3]
Youth Inno... [3]
China Post... [2]
China Post... [2]
更多...
收录类别
SCI [69]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共69条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
DiSAuth: A DNS-based secure authorization framework for protecting data decoupled from applications
期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:
Li, Ying
;
Wei, Jiuqi
;
Fei, Ziyu
;
Fu, Yufan
;
Lee, Xiaodong
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Authorization
Data security and privacy
DNS
Blockchain
On Modeling and Detecting Trojans in Instruction Sets
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:
Zhang, Ying
;
He, Aodi
;
Li, Jiaying
;
Rezine, Ahmed
;
Peng, Zebo
;
Larsson, Erik
;
Yang, Tao
;
Jiang, Jianhui
;
Li, Huawei
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Trojan horses
Security
Program processors
Companies
Inspection
Hardware security
Reverse engineering
Deep test for security
hidden instruction Trojan (HIT)
unbounded model checking (UMC)
VLSI test
An Intelligent Secure Fault Classification and Identification Scheme for Mining Valuable Information in IIoT
期刊论文
IEEE SYSTEMS JOURNAL, 2024, 页码: 12
作者:
Zhang, Ying
;
Zhang, Wenyuan
;
Jiang, Xiaoyu
;
Sun, Yuzhong
;
Feng, Baiming
;
Xiong, Naixue
;
Wo, Tianyu
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/12/06
Industrial Internet of Things
Vectors
Pattern matching
Fault diagnosis
Fault detection
Feature extraction
Source coding
Abnormal detection
Industrial Internet of Things (IIoT)
log mining
security
S-Kmeans
Adaptive Perturbation for Adversarial Attack
期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:
Yuan, Zheng
;
Zhang, Jie
;
Jiang, Zhaoyan
;
Li, Liangliang
;
Shan, Shiguang
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Perturbation methods
Iterative methods
Adaptation models
Generators
Closed box
Security
Training
Adversarial attack
transfer-based attack
adversarial example
adaptive perturbation
Structural analysis and vulnerability assessment of the European LNG maritime supply chain network (2018-2020)
期刊论文
OCEAN & COASTAL MANAGEMENT, 2024, 卷号: 253, 页码: 20
作者:
Mei, Qiang
;
Hu, Qinyou
;
Hu, Yu
;
Yang, Yang
;
Liu, Xiliang
;
Huang, Zishuo
;
Wang, Peng
收藏
  |  
浏览/下载:7/0
  |  
提交时间:2024/12/06
Liquefied natural gas
Supply chain security
Maritime transportation network
Vulnerability
Community evolution
Graph deep learning
UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off
期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 卷号: 73, 期号: 5, 页码: 6993-7006
作者:
Fan, Xiaokun
;
Chen, Yali
;
Liu, Min
;
Sun, Sheng
;
Liu, Zhuotao
;
Xu, Ke
;
Li, Zhongcheng
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/12/06
Training
Security
Autonomous aerial vehicles
Energy consumption
Resource management
Data models
Computational modeling
Deep reinforcement learning
federated learning (FL)
physical layer security
resource allocation
unmanned aerial vehicle (UAV)
Adversarial Medical Image With Hierarchical Feature Hiding
期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2024, 卷号: 43, 期号: 4, 页码: 1296-1307
作者:
Yao, Qingsong
;
He, Zecheng
;
Li, Yuexiang
;
Lin, Yi
;
Ma, Kai
;
Zheng, Yefeng
;
Zhou, S. Kevin
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Security in machine learning
adversarial attacks and defense
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:
Liu, Zizhen
;
He, Weiyang
;
Chang, Chip-Hong
;
Ye, Jing
;
Li, Huawei
;
Li, Xiaowei
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2024/12/06
Data models
Servers
Training
Hidden Markov models
Training data
Adaptation models
Security
Federated learning
poisoning attack
knowledge distillation
attention maps
deep neural network
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
;
Wang, Ying
;
Zhao, Yongwei
;
Du, Zidong
;
Guo, Qi
;
Wang, Yanzhi
;
Zhang, Xishan
;
Chen, Tianshi
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time
Random Beam Switching: A Physical Layer Key Generation Approach to Safeguard mmWave Electronic Devices
期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 卷号: 69, 期号: 3, 页码: 594-607
作者:
Ju, Ying
;
Zou, Guoxue
;
Bai, Haowen
;
Liu, Lei
;
Pei, Qingqi
;
Wu, Celimuge
;
Otaibi, Sattam Al
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2023/12/04
Electronic device security
physical layer key generation
millimeter wave
static environments
beamforming