×
验证码:
换一张
忘记密码?
记住我
×
登录
中文版
|
English
中国科学院计算技术研究所机构知识库
Institute of Computing Technology, Chinese Academy IR
登录
注册
ALL
ORCID
题名
作者
学科领域
关键词
文献类型
出处
收录类别
出版者
发表日期
存缴日期
资助项目
学科门类
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
新闻&公告
在结果中检索
研究单元&专题
中国科学院计算技术研... [9]
作者
Li, Huawei [2]
Cao, Huawe... [1]
Chen, Ming... [1]
Chen, Yira... [1]
Cheng, Yue... [1]
Cui, Aijia... [1]
更多...
文献类型
期刊论文 [9]
发表日期
2025 [1]
2024 [1]
2023 [1]
2022 [1]
2020 [2]
2019 [3]
更多...
语种
英语 [9]
出处
IEEE TRANS... [3]
IEEE TRANS... [2]
ACM TRANSA... [1]
IEEE ACCES... [1]
IEEE TRANS... [1]
NEUROCOMPU... [1]
更多...
资助项目
National N... [2]
Air Force ... [1]
Beijing Na... [1]
CAS Pionee... [1]
China Nati... [1]
Chinese Ac... [1]
更多...
收录类别
SCI [9]
资助机构
×
知识图谱
CSpace
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
WOS被引频次升序
WOS被引频次降序
提交时间升序
提交时间降序
期刊影响因子升序
期刊影响因子降序
题名升序
题名降序
发表日期升序
发表日期降序
SPMGAE: Self-purified masked graph autoencoders release robust expression power
期刊论文
NEUROCOMPUTING, 2025, 卷号: 611, 页码: 14
作者:
Song, Shuhan
;
Li, Ping
;
Dun, Ming
;
Zhang, Yuan
;
Cao, Huawei
;
Ye, Xiaochun
收藏
  |  
浏览/下载:3/0
  |  
提交时间:2024/12/06
Graph neural networks
Masked graph autoencoders
Robustness
Graph adversarial attacks
Adversarial Medical Image With Hierarchical Feature Hiding
期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2024, 卷号: 43, 期号: 4, 页码: 1296-1307
作者:
Yao, Qingsong
;
He, Zecheng
;
Li, Yuexiang
;
Lin, Yi
;
Ma, Kai
;
Zheng, Yefeng
;
Zhou, S. Kevin
收藏
  |  
浏览/下载:1/0
  |  
提交时间:2024/12/06
Security in machine learning
adversarial attacks and defense
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 4, 页码: 3449-3465
作者:
Xu, Zhiwei
;
Wang, Xin
;
Zhang, Yujun
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2023/12/04
DDoS attacks
persistent attack detection
named date networking
malicious traffic pattern
lightweight
advanced FM sketch
Making Information Hiding Effective Again
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:
Wang, Zhe
;
Wu, Chenggang
;
Zhang, Yinqian
;
Tang, Bowen
;
Yew, Pen-Chung
;
Xie, Mengyao
;
Lai, Yuanming
;
Kang, Yan
;
Cheng, Yueqiang
;
Shi, Zhiping
收藏
  |  
浏览/下载:27/0
  |  
提交时间:2022/12/07
Instruction sets
Registers
Computer crashes
Entropy
Kernel
Security
Probes
Side channel attacks
information hiding
intra-process memory isolation
TLB misses
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
;
Li, Hai
;
Chen, Yiran
收藏
  |  
浏览/下载:49/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
Dynamic Packet Forwarding Verification in SDN
期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 期号: 6, 页码: 915-929
作者:
Li, Qi
;
Zou, Xiaoyue
;
Huang, Qun
;
Zheng, Jing
;
Lee, Patrick P. C.
收藏
  |  
浏览/下载:53/0
  |  
提交时间:2020/12/10
Control systems
Cryptography
Protocols
IP networks
Software
Prototypes
Delays
Software-defined networking
attacks
forwarding verification
Scan Chain Based Attacks and Countermeasures: A Survey
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 85055-85065
作者:
Li, Xiaowei
;
Li, Wenjie
;
Ye, Jing
;
Li, Huawei
;
Hu, Yu
收藏
  |  
浏览/下载:63/0
  |  
提交时间:2019/12/10
Scan chain based attacks
test mode
mode switch
signature
secure scan chain
secret key
physical unclonable function
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks
期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 卷号: 15, 期号: 4, 页码: 21
作者:
Zhang, Jun
;
Hou, Rui
;
Song, Wei
;
Mckee, Sally A.
;
Jia, Zhen
;
Zheng, Chen
;
Chen, Mingyu
;
Zhang, Lixin
;
Meng, Dan
收藏
  |  
浏览/下载:85/0
  |  
提交时间:2019/04/03
Code-reuse attacks
return-oriented programming attacks
message authentication code
AES-128
key management
PUF