CSpace

浏览/检索结果: 共36条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Entropy-regulated cross-modal generative fusion for multimodal network intrusion detection 期刊论文
INFORMATION FUSION, 2026, 卷号: 126, 页码: 16
作者:  Wang, Xiangbin;  Yuan, Qingjun;  Yu, Wentao;  Meng, Qianwei;  Lu, Siqi;  He, Wenqi;  Gu, Chunxiang;  Wang, Yongjuan
收藏  |  浏览/下载:6/0  |  提交时间:2025/12/03
Generative artificial intelligence  Intrusion detection system  Multimodal fusion  Diffusion model  Cross-modal representation  Differential entropy  
Multi-View Facial Expressions Analysis of Autistic Children in Social Play 期刊论文
IEEE TRANSACTIONS ON AFFECTIVE COMPUTING, 2025, 卷号: 16, 期号: 3, 页码: 2200-2214
作者:  Zeng, Jiabei;  Yuan, Yujian;  Qu, Lu;  Chang, Fei;  Sun, Xuran;  Gong, Jinqiuyu;  Han, Xuling;  Liu, Min;  Zhao, Hang;  Liu, Qiaoyun;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:4/0  |  提交时间:2025/12/03
Face recognition  Autism  Faces  Feature extraction  Cameras  Accuracy  Pediatrics  Complexity theory  Software  Magnetic heads  Multi-view facial expression recognition  facial expression quantification  facial expression analysis  autism spectrum disorder assessment  multi-scale entropy  
Suppressing the Interference Within a Datacenter: Theorems, Metric and Strategy 期刊论文
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2024, 卷号: 35, 期号: 5, 页码: 732-750
作者:  Liu, Yuhang;  Deng, Xin;  Zhou, Jiapeng;  Chen, Mingyu;  Bao, Yungang
收藏  |  浏览/下载:50/0  |  提交时间:2024/05/20
Interference  Tail  Quality of service  Entropy  Throughput  Cloud computing  Resource management  Datacenter  high-throughput  performance uncertainty  quality of services (QoS)  resource contention  
Hierarchical image-to-image translation with nested distributions modeling 期刊论文
PATTERN RECOGNITION, 2024, 卷号: 146, 页码: 12
作者:  Qiao, Shishi;  Wang, Ruiping;  Shan, Shiguang;  Chen, Xilin
收藏  |  浏览/下载:46/0  |  提交时间:2024/05/20
Image-to-image translation  Distribution modeling  Information entropy  Generative adversarial network  
Rényi Entropy Rate of Stationary Ergodic Processes 期刊论文
IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 卷号: 70, 期号: 1, 页码: 1-15
作者:  Wu, Chengyu;  Li, Yonglong;  Xu, Li;  Han, Guangyue
收藏  |  浏览/下载:41/0  |  提交时间:2024/05/20
R & eacute  ergodic processes  hidden Markov models  hidden Markov models  cutting and stacking method  nyi entropy rate  
A New Reconfigurable True Random Number Generator and Physical Unclonable Function Unified Chip With On-Chip Auto-Calibration 期刊论文
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2023, 页码: 14
作者:  Cao, Yuan;  Liu, Wanyi;  Zheng, Yue;  Chen, Shuai;  Ye, Jing;  Qian, Lei;  Chang, Chip-Hong
收藏  |  浏览/下载:56/0  |  提交时间:2023/12/04
Entropy  Authentication  System-on-chip  Protocols  Jitter  Computer architecture  Rail to rail outputs  True random number generator  physical unclonable function  current-starved ring oscillator  
Information Superbahn: Towards a Planet-Scale, Low-Entropy and High-Goodput Computing Utility 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2023, 卷号: 38, 期号: 1, 页码: 103-114
作者:  Xu, Zhi-Wei;  Li, Zhen-Ying;  Yu, Zi-Shu;  Li, Feng-Zhi
收藏  |  浏览/下载:45/0  |  提交时间:2023/12/04
cloud computing  computing utility  utilization  low-entropy system  high-goodput computing  
Making Information Hiding Effective Again 期刊论文
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 卷号: 19, 期号: 4, 页码: 2576-2594
作者:  Wang, Zhe;  Wu, Chenggang;  Zhang, Yinqian;  Tang, Bowen;  Yew, Pen-Chung;  Xie, Mengyao;  Lai, Yuanming;  Kang, Yan;  Cheng, Yueqiang;  Shi, Zhiping
收藏  |  浏览/下载:61/0  |  提交时间:2022/12/07
Instruction sets  Registers  Computer crashes  Entropy  Kernel  Security  Probes  Side channel attacks  information hiding  intra-process memory isolation  TLB misses  
WPC: Whole-Picture Workload Characterization Across Intermediate Representation, ISA, and Microarchitecture 期刊论文
IEEE COMPUTER ARCHITECTURE LETTERS, 2021, 卷号: 20, 期号: 2, 页码: 86-89
作者:  Wang, Lei;  Xiong, Xingwang;  Zhan, Jianfeng;  Gao, Wanling;  Wen, Xu;  Kang, Guoxin;  Tang, Fei
收藏  |  浏览/下载:75/0  |  提交时间:2021/12/01
Microarchitecture  Tools  Measurement  Pipelines  Java  Entropy  Runtime  Whole-picture workload characterization  intermediate representation  ISA  microarchitecture  
HTDet: A Clustering Method Using Information Entropy for Hardware Trojan Detection 期刊论文
TSINGHUA SCIENCE AND TECHNOLOGY, 2021, 卷号: 26, 期号: 1, 页码: 48-61
作者:  Lu, Renjie;  Shen, Haihua;  Feng, Zhihua;  Li, Huawei;  Zhao, Wei;  Li, Xiaowei
收藏  |  浏览/下载:85/0  |  提交时间:2021/12/01
Hardware Trojan (HT) detection  information entropy  Density-Based Spatial Clustering of Applications with Noise (DBSCAN)  unsupervised learning  clustering  mutual information  test patterns generation