CSpace

浏览/检索结果: 共6条,第1-6条 帮助

已选(0)清除 条数/页:   排序方式:
Characterizing and Understanding Defense Methods for GNNs on GPUs 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2023, 卷号: 22, 期号: 2, 页码: 137-140
作者:  Wu, Meng;  Yan, Mingyu;  Yang, Xiaocheng;  Li, Wenming;  Zhang, Zhimin;  Ye, Xiaochun;  Fan, Dongrui
收藏  |  浏览/下载:16/0  |  提交时间:2023/12/04
Kernel  Purification  Estimation  Graphics processing units  Perturbation methods  Electric breakdown  Training  Graph neural networks  defense  execution semantic  execution pattern  overhead  
Combating Stealthy Thermal Covert Channel Attack With Its Thermal Signal Transmitted in Direct Sequence Spread Spectrum 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 11, 页码: 4064-4075
作者:  Wang, Xiaohang;  Wang, Shengjie;  Jiang, Yingtao;  Singh, Amit Kumar;  Yang, Mei;  Huang, Letian
收藏  |  浏览/下载:18/0  |  提交时间:2023/07/12
Spread spectrum communication  Transmitters  Encoding  Bit error rate  Receivers  Codes  Thermal noise  Defense against covert channel attack  many-core systems  thermal covert channel (TCC) attack  
Detection of and Countermeasure Against Thermal Covert Channel in Many-Core Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2022, 卷号: 41, 期号: 2, 页码: 252-265
作者:  Huang, Hengli;  Wang, Xiaohang;  Jiang, Yingtao;  Singh, Amit Kumar;  Yang, Mei;  Huang, Letian
收藏  |  浏览/下载:23/0  |  提交时间:2022/12/07
Defense against covert channel attack  detection of covert channel  many-core systems  thermal covert channel (TCC)  
Exploiting Security Dependence for Conditional Speculation Against Spectre Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2021, 卷号: 70, 期号: 7, 页码: 963-978
作者:  Zhao, Lutan;  Li, Peinan;  Hou, Rui;  Huang, Michael C.;  Liu, Peng;  Zhang, Lixin;  Meng, Dan
收藏  |  浏览/下载:35/0  |  提交时间:2021/12/01
Security  Hazards  Micromechanical devices  Microarchitecture  Out of order  Registers  Spectre vulnerabilities defense  security dependence  speculative execution side-channel vulnerabilities  
INOR-An Intelligent noise reduction method to defend against adversarial audio examples 期刊论文
NEUROCOMPUTING, 2020, 卷号: 401, 页码: 160-172
作者:  Guo, Qingli;  Ye, Jing;  Chen, Yiran;  Hu, Yu;  Lan, Yazhu;  Zhang, Guohe;  Li, Xiaowei
收藏  |  浏览/下载:59/0  |  提交时间:2020/12/10
Adversarial audio examples  Defense against adversarial audio examples  INOR  
A USERID-CENTRALIZED RECOVERABLE BOTNET: STRUCTURE RESEARCH AND DEFENSE 期刊论文
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 卷号: 6, 期号: 10, 页码: 4305-4317
作者:  Wang, Wei;  Fang, Binxing;  Cui, Xiang;  Shi, Jinqiao
收藏  |  浏览/下载:43/0  |  提交时间:2019/12/16
Botnet  Recoverability  User identity addressing  Defense