CSpace

浏览/检索结果: 共8条,第1-8条 帮助

已选(0)清除 条数/页:   排序方式:
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:7/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
Swarm Intelligence-Based Task Scheduling for Enhancing Security for IoT Devices 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 6, 页码: 1756-1769
作者:  Zhou, Junlong;  Shen, Yufan;  Li, Liying;  Zhuo, Cheng;  Chen, Mingsong
收藏  |  浏览/下载:11/0  |  提交时间:2023/12/04
Security  Internet of Things  Task analysis  Logic gates  Servers  Particle swarm optimization  Optimization  Energy efficiency  fund  Index Terms  Internet of Things (IoT)  mixed-integer linear programming (MILP)  security  swarm intelligence  task scheduling  
Quantum Network: Security Assessment and Key Management 期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 卷号: 30, 期号: 3, 页码: 1328-1339
作者:  Zhou, Hongyi;  Lv, Kefan;  Huang, Longbo;  Ma, Xiongfeng
收藏  |  浏览/下载:24/0  |  提交时间:2022/12/07
Security  Quantum networks  Computer hacking  Data communication  Task analysis  Routing  Quantum channels  Quantum key distribution  Lyapunov analysis  queueing  
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0 期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:  Zhang, Qianying;  Zhao, Shijun
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
Security analysis  Authenticated key exchange  TPM 2.0  
A Blockchain-Based Computing Architecture for Mobile Ad Hoc Cloud 期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 4, 页码: 140-149
作者:  Jiao, Zhenzhen;  Zhang, Baoxian;  Zhang, Li;  Liu, Min;  Gong, Wei;  Li, Cheng
收藏  |  浏览/下载:314/0  |  提交时间:2020/12/10
Blockchain  Ad hoc networks  Cloud computing  Smart contracts  Task analysis  Security  Computer architecture  
Data Security and Privacy Challenges of Computing Offloading in FINs 期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 2, 页码: 14-20
作者:  Wang, Fei;  Diao, Boyu;  Sun, Tao;  Xu, Yongjun
收藏  |  浏览/下载:89/0  |  提交时间:2020/12/10
Task analysis  Cloud computing  Data privacy  Edge computing  Smart homes  Data security  
Causality reasoning about network events for detecting stealthy malware activities 期刊论文
COMPUTERS & SECURITY, 2016, 卷号: 58, 页码: 180-198
作者:  Zhang, Hao;  Yao, Danfeng (Daphne);  Rarnakrishnan, Naren;  Zhang, Zhibin
收藏  |  浏览/下载:45/0  |  提交时间:2019/12/13
Network security  Anomaly detection  Stealthy maiware  Traffic analysis  Dependence analysis  Machine learning classification  
Security Analysis for Web Service Behaviors Based on Hierarchical Stochastic Game Model 期刊论文
CHINESE JOURNAL OF ELECTRONICS, 2015, 卷号: 24, 期号: 3, 页码: 449-454
作者:  Lv Junjie;  Wang Yuanzhuo;  Li Jingyuan;  Meng Kun;  Lin Chuang
收藏  |  浏览/下载:47/0  |  提交时间:2019/12/13
Hierarchical stochastic game nets  Web service behaviors  Security analysis  Attack  Defence