CSpace

浏览/检索结果: 共9条,第1-9条 帮助

已选(0)清除 条数/页:   排序方式:
SPMGAE: Self-purified masked graph autoencoders release robust expression power 期刊论文
NEUROCOMPUTING, 2025, 卷号: 611, 页码: 14
作者:  Song, Shuhan;  Li, Ping;  Dun, Ming;  Zhang, Yuan;  Cao, Huawei;  Ye, Xiaochun
收藏  |  浏览/下载:3/0  |  提交时间:2024/12/06
Graph neural networks  Masked graph autoencoders  Robustness  Graph adversarial attacks  
Adversarial Medical Image With Hierarchical Feature Hiding 期刊论文
IEEE TRANSACTIONS ON MEDICAL IMAGING, 2024, 卷号: 43, 期号: 4, 页码: 1296-1307
作者:  Yao, Qingsong;  He, Zecheng;  Li, Yuexiang;  Lin, Yi;  Ma, Kai;  Zheng, Yefeng;  Zhou, S. Kevin
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Security in machine learning  adversarial attacks and defense  
Towards Persistent Detection of DDoS Attacks in NDN: A Sketch-Based Approach 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 4, 页码: 3449-3465
作者:  Xu, Zhiwei;  Wang, Xin;  Zhang, Yujun
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
DDoS attacks  persistent attack detection  named date networking  malicious traffic pattern  lightweight  advanced FM sketch  
Making Information Hiding Effective Again 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Cheng, Yueqiang;  Shi, Zhiping
收藏  |  浏览/下载:27/0  |  提交时间:2022/12/07
Instruction sets  Registers  Computer crashes  Entropy  Kernel  Security  Probes  Side channel attacks  information hiding  intra-process memory isolation  TLB misses  
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:  Lan, Yazhu;  Nixon, Kent W.;  Guo, Qingli;  Zhang, Guohe;  Xu, Yuanchao;  Li, Hai;  Chen, Yiran
收藏  |  浏览/下载:49/0  |  提交时间:2021/12/01
Perturbation methods  Computational modeling  Data integrity  Detectors  Optimization  Field programmable gate arrays  Hardware  Adversarial attacks  confidence detection  deep neural networks (DNNs)  FPGA-based hardware architecture  sensor pattern noise (SPN)  
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:  Cui, Aijiao;  Li, Mengyang;  Qu, Gang;  Li, Huawei
收藏  |  浏览/下载:36/0  |  提交时间:2021/12/01
Ciphers  Encryption  Integrated circuits  Side-channel attacks  Testing  Cryptographic hash function  obfuscation logic  scan design  scan-based side-channel attack  
Dynamic Packet Forwarding Verification in SDN 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2019, 卷号: 16, 期号: 6, 页码: 915-929
作者:  Li, Qi;  Zou, Xiaoyue;  Huang, Qun;  Zheng, Jing;  Lee, Patrick P. C.
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
Control systems  Cryptography  Protocols  IP networks  Software  Prototypes  Delays  Software-defined networking  attacks  forwarding verification  
Scan Chain Based Attacks and Countermeasures: A Survey 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 85055-85065
作者:  Li, Xiaowei;  Li, Wenjie;  Ye, Jing;  Li, Huawei;  Hu, Yu
收藏  |  浏览/下载:63/0  |  提交时间:2019/12/10
Scan chain based attacks  test mode  mode switch  signature  secure scan chain  secret key  physical unclonable function  
RAGuard: An Efficient and User-Transparent Hardware Mechanism against ROP Attacks 期刊论文
ACM TRANSACTIONS ON ARCHITECTURE AND CODE OPTIMIZATION, 2019, 卷号: 15, 期号: 4, 页码: 21
作者:  Zhang, Jun;  Hou, Rui;  Song, Wei;  Mckee, Sally A.;  Jia, Zhen;  Zheng, Chen;  Chen, Mingyu;  Zhang, Lixin;  Meng, Dan
收藏  |  浏览/下载:85/0  |  提交时间:2019/04/03
Code-reuse attacks  return-oriented programming attacks  message authentication code  AES-128  key management  PUF