CSpace

浏览/检索结果: 共10条,第1-10条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Part alignment network for vehicle re-identification 期刊论文
NEUROCOMPUTING, 2020, 卷号: 418, 页码: 114-125
作者:  Chen, Yucheng;  Ma, Bingpeng;  Chang, Hong
收藏  |  浏览/下载:29/0  |  提交时间:2021/12/01
Vehicle re-identification  Part alignment  Cross-correlation  
Long Live TIME: Improving Lifetime and Security for NVM-Based Training-in-Memory Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4707-4720
作者:  Cai, Yi;  Lin, Yujun;  Xia, Lixue;  Chen, Xiaoming;  Han, Song;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:37/0  |  提交时间:2021/12/01
Gradient sparsification  lifetime  neural networks  training-in-memory  wear-leveling  
Security risk and response analysis of typical application architecture of information and communication blockchain 期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:  Zhao, Hongwei;  Zhang, Moli;  Wang, Shi;  Li, Entang;  Guo, Zhenhua;  Sun, Dianmin
收藏  |  浏览/下载:35/0  |  提交时间:2021/12/01
Information and communication blockchain  Network security risks  Homomorphic verifiable secret sharing  Risk response  
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:318/0  |  提交时间:2020/12/10
Artificial neural networks  Nonvolatile memory  Encryption  Computational modeling  Hardware  Non-volatile memory (NVM)  compute-in-memory (CIM)  neural network  security  encryption  
Intelligent city intelligent medical sharing technology based on internet of things technology 期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 卷号: 111, 页码: 226-233
作者:  Zhao, Xin;  Xiao, Wei;  Wu, Lu;  Zhao, Zhigang;  Huo, Jidong;  Wang, Shi;  Guo, Zhenhua;  Sun, Dianmin
收藏  |  浏览/下载:53/0  |  提交时间:2020/12/10
Internet of things  Intelligent city  Intelligent medical sharing  Data encryption  Information security  
A Blockchain-Based Computing Architecture for Mobile Ad Hoc Cloud 期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 4, 页码: 140-149
作者:  Jiao, Zhenzhen;  Zhang, Baoxian;  Zhang, Li;  Liu, Min;  Gong, Wei;  Li, Cheng
收藏  |  浏览/下载:310/0  |  提交时间:2020/12/10
Blockchain  Ad hoc networks  Cloud computing  Smart contracts  Task analysis  Security  Computer architecture  
Rumor detection based on topic classification and multi-scale feature fusion 期刊论文
Journal of Physics: Conference Series, 2020, 卷号: 1601, 期号: 3
作者:  Tan,Li;  Ma,Zihao;  Cao,Juan;  Lv,Xinyue
收藏  |  浏览/下载:19/0  |  提交时间:2021/12/01
HMMs based masquerade detection for network security on with parallel computing 期刊论文
COMPUTER COMMUNICATIONS, 2020, 卷号: 156, 页码: 168-173
作者:  Liu, Jia;  Duan, Miyi;  Li, Wenfa;  Tian, Xinguang
收藏  |  浏览/下载:40/0  |  提交时间:2020/12/10
Masquerade detection  Shell command  Anomaly detection  Hidden Markov model  
Data Security and Privacy Challenges of Computing Offloading in FINs 期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 2, 页码: 14-20
作者:  Wang, Fei;  Diao, Boyu;  Sun, Tao;  Xu, Yongjun
收藏  |  浏览/下载:85/0  |  提交时间:2020/12/10
Task analysis  Cloud computing  Data privacy  Edge computing  Smart homes  Data security  
Secure V2X Communication Network based on Intelligent PKI and Edge Computing 期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 2, 页码: 172-178
作者:  Qiu, Han;  Qiu, Meikang;  Lu, Ruqian
收藏  |  浏览/下载:44/0  |  提交时间:2020/12/10
Vehicle-to-everything  Servers  Security  Edge computing  Prediction algorithms  Autonomous vehicles