CSpace

浏览/检索结果: 共69条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
DiSAuth: A DNS-based secure authorization framework for protecting data decoupled from applications 期刊论文
COMPUTER NETWORKS, 2024, 卷号: 254, 页码: 18
作者:  Li, Ying;  Wei, Jiuqi;  Fei, Ziyu;  Fu, Yufan;  Lee, Xiaodong
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Authorization  Data security and privacy  DNS  Blockchain  
On Modeling and Detecting Trojans in Instruction Sets 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:  Zhang, Ying;  He, Aodi;  Li, Jiaying;  Rezine, Ahmed;  Peng, Zebo;  Larsson, Erik;  Yang, Tao;  Jiang, Jianhui;  Li, Huawei
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Trojan horses  Security  Program processors  Companies  Inspection  Hardware security  Reverse engineering  Deep test for security  hidden instruction Trojan (HIT)  unbounded model checking (UMC)  VLSI test  
An Intelligent Secure Fault Classification and Identification Scheme for Mining Valuable Information in IIoT 期刊论文
IEEE SYSTEMS JOURNAL, 2024, 页码: 12
作者:  Zhang, Ying;  Zhang, Wenyuan;  Jiang, Xiaoyu;  Sun, Yuzhong;  Feng, Baiming;  Xiong, Naixue;  Wo, Tianyu
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Industrial Internet of Things  Vectors  Pattern matching  Fault diagnosis  Fault detection  Feature extraction  Source coding  Abnormal detection  Industrial Internet of Things (IIoT)  log mining  security  S-Kmeans  
Adaptive Perturbation for Adversarial Attack 期刊论文
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 2024, 卷号: 46, 期号: 8, 页码: 5663-5676
作者:  Yuan, Zheng;  Zhang, Jie;  Jiang, Zhaoyan;  Li, Liangliang;  Shan, Shiguang
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Perturbation methods  Iterative methods  Adaptation models  Generators  Closed box  Security  Training  Adversarial attack  transfer-based attack  adversarial example  adaptive perturbation  
Structural analysis and vulnerability assessment of the European LNG maritime supply chain network (2018-2020) 期刊论文
OCEAN & COASTAL MANAGEMENT, 2024, 卷号: 253, 页码: 20
作者:  Mei, Qiang;  Hu, Qinyou;  Hu, Yu;  Yang, Yang;  Liu, Xiliang;  Huang, Zishuo;  Wang, Peng
收藏  |  浏览/下载:7/0  |  提交时间:2024/12/06
Liquefied natural gas  Supply chain security  Maritime transportation network  Vulnerability  Community evolution  Graph deep learning  
UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 卷号: 73, 期号: 5, 页码: 6993-7006
作者:  Fan, Xiaokun;  Chen, Yali;  Liu, Min;  Sun, Sheng;  Liu, Zhuotao;  Xu, Ke;  Li, Zhongcheng
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Training  Security  Autonomous aerial vehicles  Energy consumption  Resource management  Data models  Computational modeling  Deep reinforcement learning  federated learning (FL)  physical layer security  resource allocation  unmanned aerial vehicle (UAV)  
Adversarial Medical Image With Hierarchical Feature Hiding 期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2024, 卷号: 43, 期号: 4, 页码: 1296-1307
作者:  Yao, Qingsong;  He, Zecheng;  Li, Yuexiang;  Lin, Yi;  Ma, Kai;  Zheng, Yefeng;  Zhou, S. Kevin
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Security in machine learning  adversarial attacks and defense  
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:  Liu, Zizhen;  He, Weiyang;  Chang, Chip-Hong;  Ye, Jing;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Data models  Servers  Training  Hidden Markov models  Training data  Adaptation models  Security  Federated learning  poisoning attack  knowledge distillation  attention maps  deep neural network  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:11/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
Random Beam Switching: A Physical Layer Key Generation Approach to Safeguard mmWave Electronic Devices 期刊论文
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2023, 卷号: 69, 期号: 3, 页码: 594-607
作者:  Ju, Ying;  Zou, Guoxue;  Bai, Haowen;  Liu, Lei;  Pei, Qingqi;  Wu, Celimuge;  Otaibi, Sattam Al
收藏  |  浏览/下载:17/0  |  提交时间:2023/12/04
Electronic device security  physical layer key generation  millimeter wave  static environments  beamforming