×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
自动化研究所 [20]
兰州理工大学 [10]
计算技术研究所 [9]
沈阳自动化研究所 [7]
北京航空航天大学 [2]
地理科学与资源研究所 [2]
更多...
内容类型
期刊论文 [55]
会议论文 [7]
专利 [1]
发表日期
2020 [63]
学科主题
Environmen... [1]
Evolutiona... [1]
Plant Scie... [1]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共63条,第1-10条
帮助
限定条件
发表日期:2020
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Network Characteristics and Vulnerability Analysis of Chinese Railway Network under Earthquake Disasters
期刊论文
ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2020, 卷号: 9, 期号: 12, 页码: 19
作者:
Yin, Lingzhi
;
Wang, Yafei
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2021/03/15
Chinese railway network
complex network
linear reference
earthquake disasters
vulnerability analysis
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4791-4804
作者:
Lan, Yazhu
;
Nixon, Kent W.
;
Guo, Qingli
;
Zhang, Guohe
;
Xu, Yuanchao
收藏
  |  
浏览/下载:37/0
  |  
提交时间:2021/12/01
Perturbation methods
Computational modeling
Data integrity
Detectors
Optimization
Field programmable gate arrays
Hardware
Adversarial attacks
confidence detection
deep neural networks (DNNs)
FPGA-based hardware architecture
sensor pattern noise (SPN)
Long Live TIME: Improving Lifetime and Security for NVM-Based Training-in-Memory Systems
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4707-4720
作者:
Cai, Yi
;
Lin, Yujun
;
Xia, Lixue
;
Chen, Xiaoming
;
Han, Song
收藏
  |  
浏览/下载:18/0
  |  
提交时间:2021/12/01
Gradient sparsification
lifetime
neural networks
training-in-memory
wear-leveling
Face Anti-Spoofing by Learning Polarization Cues in a Real-World Scenario
会议论文
Chengdu, China, November 13 - 15, 2020
作者:
Tian, Yu
;
Zhang, Kunbo
;
Wang, Leyuan
;
Sun, Zhenan
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/10/08
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
Formal Security Evaluation and Improvement of Industrial Ethernet EtherCAT Protocol
期刊论文
Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 卷号: 57, 期号: 11, 页码: 2312-2327
作者:
Feng, Tao
;
Wang, Shuaishuai
;
Gong, Xiang
;
Fang, Junli
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/18
Ethernet
Function evaluation
Hash functions
Industrial research
Man machine systems
Model checking
Petri netsIndustrial control systems
Industrial Ethernets
Key distribution centers
Man in the middle attacks
Real time performance
Security evaluation
Security functions
Security verification
Energy Based Optimal Dynamic Stealth False Data Injection Attacks on the Smart Grid
会议论文
Guangzhou, China, 2020.11.13-15
作者:
Liu, Yifa
;
Cheng, Long
收藏
  |  
浏览/下载:0/0
  |  
提交时间:2023/06/29
smart grid, security, false data injection attack, optimal control
Reinforcement Learning-Based Mobile Offloading for Edge Computing Against Jamming and Interference
期刊论文
IEEE TRANSACTIONS ON COMMUNICATIONS, 2020, 卷号: 68, 期号: 10, 页码: 6114-6126
作者:
Xiao, Liang
;
Lu, Xiaozhen
;
Xu, Tangwei
;
Wan, Xiaoyue
;
Ji, Wen
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2020/12/10
Task analysis
Mobile handsets
Edge computing
Computational modeling
Interference
Energy consumption
Jamming
Mobile offloading
edge computing
interference
jamming
reinforcement learning
Efficient Joint Gradient Based Atack Against SOR Defense for 3D Point Cloud Classification
会议论文
Virtual, October 12–16, 2020
作者:
Chengcheng Ma
;
Weiliang Meng
;
Baoyuan Wu
;
Shibiao Xu
;
Xiaopeng Zhang
收藏
  |  
浏览/下载:25/0
  |  
提交时间:2022/04/02
©版权所有 ©2017 CSpace - Powered by
CSpace