CSpace

浏览/检索结果: 共9条,第1-9条 帮助

限定条件    
已选(0)清除 条数/页:   排序方式:
Long Live TIME: Improving Lifetime and Security for NVM-Based Training-in-Memory Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4707-4720
作者:  Cai, Yi;  Lin, Yujun;  Xia, Lixue;  Chen, Xiaoming;  Han, Song;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:42/0  |  提交时间:2021/12/01
Gradient sparsification  lifetime  neural networks  training-in-memory  wear-leveling  
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:  Lan, Yazhu;  Nixon, Kent W.;  Guo, Qingli;  Zhang, Guohe;  Xu, Yuanchao;  Li, Hai;  Chen, Yiran
收藏  |  浏览/下载:46/0  |  提交时间:2021/12/01
Perturbation methods  Computational modeling  Data integrity  Detectors  Optimization  Field programmable gate arrays  Hardware  Adversarial attacks  confidence detection  deep neural networks (DNNs)  FPGA-based hardware architecture  sensor pattern noise (SPN)  
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:  Cui, Aijiao;  Li, Mengyang;  Qu, Gang;  Li, Huawei
收藏  |  浏览/下载:33/0  |  提交时间:2021/12/01
Ciphers  Encryption  Integrated circuits  Side-channel attacks  Testing  Cryptographic hash function  obfuscation logic  scan design  scan-based side-channel attack  
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:325/0  |  提交时间:2020/12/10
Artificial neural networks  Nonvolatile memory  Encryption  Computational modeling  Hardware  Non-volatile memory (NVM)  compute-in-memory (CIM)  neural network  security  encryption  
Reinforcement Learning-Based Mobile Offloading for Edge Computing Against Jamming and Interference 期刊论文
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 卷号: 68, 期号: 10, 页码: 6114-6126
作者:  Xiao, Liang;  Lu, Xiaozhen;  Xu, Tangwei;  Wan, Xiaoyue;  Ji, Wen;  Zhang, Yanyong
收藏  |  浏览/下载:55/0  |  提交时间:2020/12/10
Task analysis  Mobile handsets  Edge computing  Computational modeling  Interference  Energy consumption  Jamming  Mobile offloading  edge computing  interference  jamming  reinforcement learning  
A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks 期刊论文
COMPUTERS & SECURITY, 2020, 卷号: 96, 页码: 12
作者:  Yang, Bo
收藏  |  浏览/下载:52/0  |  提交时间:2020/12/10
Cognitive radio networks  Hopping sequences  Distributed rendezvous algorithms  Chinese remainder theorem  Anti-jamming  Information entropy  
Quick and Accurate False Data Detection in Mobile Crowd Sensing 期刊论文
IEEE-ACM TRANSACTIONS ON NETWORKING, 2020, 卷号: 28, 期号: 3, 页码: 1339-1352
作者:  Li, Xiaocan;  Xie, Kun;  Wang, Xin;  Xie, Gaogang;  Xie, Dongliang;  Li, Zhenyu;  Wen, Jigang;  Diao, Zulong;  Wang, Tian
收藏  |  浏览/下载:58/0  |  提交时间:2020/12/10
Sparse matrices  Sensors  Matrix decomposition  Monitoring  Principal component analysis  Robustness  Wireless sensor networks  Matrix separation  false data detection  mobile crowd sensing  
HMMs based masquerade detection for network security on with parallel computing 期刊论文
COMPUTER COMMUNICATIONS, 2020, 卷号: 156, 页码: 168-173
作者:  Liu, Jia;  Duan, Miyi;  Li, Wenfa;  Tian, Xinguang
收藏  |  浏览/下载:45/0  |  提交时间:2020/12/10
Masquerade detection  Shell command  Anomaly detection  Hidden Markov model  
IMPULP: A Hardware Approach for In-Process Memory Protection via User-Level Partitioning 期刊论文
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2020, 卷号: 35, 期号: 2, 页码: 418-432
作者:  Zhao, Yang-Yang;  Chen, Ming-Yu;  Liu, Yu-Hang;  Yang, Zong-Hao;  Zhu, Xiao-Jing;  Hong, Zong-Hui;  Guo, Yun-Ge
收藏  |  浏览/下载:100/0  |  提交时间:2020/12/10
in-process isolation  memory protection  out-of-bounds  user-level partitioning