CSpace

浏览/检索结果: 共7条,第1-7条 帮助

已选(0)清除 条数/页:   排序方式:
Structural analysis and vulnerability assessment of the European LNG maritime supply chain network (2018-2020) 期刊论文
OCEAN & COASTAL MANAGEMENT, 2024, 卷号: 253, 页码: 20
作者:  Mei, Qiang;  Hu, Qinyou;  Hu, Yu;  Yang, Yang;  Liu, Xiliang;  Huang, Zishuo;  Wang, Peng
收藏  |  浏览/下载:7/0  |  提交时间:2024/12/06
Liquefied natural gas  Supply chain security  Maritime transportation network  Vulnerability  Community evolution  Graph deep learning  
UAV-Enabled Federated Learning in Dynamic Environments: Efficiency and Security Trade-Off 期刊论文
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2024, 卷号: 73, 期号: 5, 页码: 6993-7006
作者:  Fan, Xiaokun;  Chen, Yali;  Liu, Min;  Sun, Sheng;  Liu, Zhuotao;  Xu, Ke;  Li, Zhongcheng
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Training  Security  Autonomous aerial vehicles  Energy consumption  Resource management  Data models  Computational modeling  Deep reinforcement learning  federated learning (FL)  physical layer security  resource allocation  unmanned aerial vehicle (UAV)  
SPFL: A Self-Purified Federated Learning Method Against Poisoning Attacks 期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 卷号: 19, 页码: 6604-6619
作者:  Liu, Zizhen;  He, Weiyang;  Chang, Chip-Hong;  Ye, Jing;  Li, Huawei;  Li, Xiaowei
收藏  |  浏览/下载:2/0  |  提交时间:2024/12/06
Data models  Servers  Training  Hidden Markov models  Training data  Adaptation models  Security  Federated learning  poisoning attack  knowledge distillation  attention maps  deep neural network  
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:  Han, Husheng;  Hu, Xing;  Hao, Yifan;  Xu, Kaidi;  Dang, Pucheng;  Wang, Ying;  Zhao, Yongwei;  Du, Zidong;  Guo, Qi;  Wang, Yanzhi;  Zhang, Xishan;  Chen, Tianshi
收藏  |  浏览/下载:11/0  |  提交时间:2024/05/20
Object detection  Streaming media  Optical flow  Feature extraction  Real-time systems  Task analysis  Detectors  Adversarial patch attack  deep learning security  domain-specific accelerator  hardware/software co-design  real time  
AD-YOLOv5s based UAV detection for low altitude security 期刊论文
INTERNATIONAL JOURNAL OF MICRO AIR VEHICLES, 2023, 卷号: 15, 页码: 19
作者:  Shang, Yuanfeng;  Liu, Chang;  Qiu, Dawei;  Zhao, Zixu;  Wu, Ruikang;  Tang, Shuyuan
收藏  |  浏览/下载:14/0  |  提交时间:2023/12/04
Low Altitude Security  object detection  embedded deployment  deep learning  UAV  
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:22/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
Practical Attacks on Deep Neural Networks by Memory Trojaning 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:  Hu, Xing;  Zhao, Yang;  Deng, Lei;  Liang, Ling;  Zuo, Pengfei;  Ye, Jing;  Lin, Yingyan;  Xie, Yuan
收藏  |  浏览/下载:46/0  |  提交时间:2021/12/01
Trojan horses  Hardware  Integrated circuit modeling  Computational modeling  Security  Payloads  Convolutional neural networks (CNNs)  deep learning accelerator  deep learning attack  hardware Trojan