CSpace

浏览/检索结果: 共3条,第1-3条 帮助

已选(0)清除 条数/页:   排序方式:
On Modeling and Detecting Trojans in Instruction Sets 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:  Zhang, Ying;  He, Aodi;  Li, Jiaying;  Rezine, Ahmed;  Peng, Zebo;  Larsson, Erik;  Yang, Tao;  Jiang, Jianhui;  Li, Huawei
收藏  |  浏览/下载:1/0  |  提交时间:2024/12/06
Trojan horses  Security  Program processors  Companies  Inspection  Hardware security  Reverse engineering  Deep test for security  hidden instruction Trojan (HIT)  unbounded model checking (UMC)  VLSI test  
A Systematic View of Model Leakage Risks in Deep Neural Network Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2022, 卷号: 71, 期号: 12, 页码: 3254-3267
作者:  Hu, Xing;  Liang, Ling;  Chen, Xiaobing;  Deng, Lei;  Ji, Yu;  Ding, Yufei;  Du, Zidong;  Guo, Qi;  Sherwood, Tim;  Xie, Yuan
收藏  |  浏览/下载:22/0  |  提交时间:2023/07/12
Domain-specific architecture  deep learning security  model security  
Parameter Communication Consistency Model for Large-Scale Security Monitoring Based on Mobile Computing 期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 171884-171897
作者:  Yang, Rui;  Zhang, Jilin;  Wan, Jian;  Zhou, Li;  Shen, Jing;  Zhang, Yunchen;  Wei, Zhenguo;  Zhang, Juncong;  Wang, Jue
收藏  |  浏览/下载:48/0  |  提交时间:2020/12/10
Mobile computing  security monitoring  distributed machine learning  limited synchronous parallel model  parameter server