CORC

浏览/检索结果: 共11条,第1-10条 帮助

已选(0)清除 条数/页:   排序方式:
Long Live TIME: Improving Lifetime and Security for NVM-Based Training-in-Memory Systems 期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4707-4720
作者:  Cai, Yi;  Lin, Yujun;  Xia, Lixue;  Chen, Xiaoming;  Han, Song
收藏  |  浏览/下载:16/0  |  提交时间:2021/12/01
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption 期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:  Cai, Yi;  Chen, Xiaoming;  Tian, Lu;  Wang, Yu;  Yang, Huazhong
收藏  |  浏览/下载:32/0  |  提交时间:2020/12/10
Energy-Aware Green Adversary Model for Cyberphysical Security in Industrial System 期刊论文
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 卷号: 16, 期号: 5, 页码: 3322-3329
作者:  Sangaiah, Arun Kumar;  Medhane, Darshan Vishwasrao;  Bian, Gui-Bin;  Ghoneim, Ahmed;  Alrashoud, Mubarak
收藏  |  浏览/下载:19/0  |  提交时间:2020/06/02
Fully Dynamic Broadcasting under SINR 会议论文
2018
作者:  Dongxiao Yu;  Longlong Lin;  Yong Zhang;  Jiguo Yu;  Yifei Zou
收藏  |  浏览/下载:38/0  |  提交时间:2019/01/31
Autonomous Maneuvering Decision Research of UAV Based on Experience Knowledge Representation 会议论文
宁夏银川, 2016/5/28-2016/5/30
作者:  He XM(贺雪梅);  Zu W(祖伟);  Chang HX(常红星);  Gao Y(高阳);  He XM(贺雪梅)
收藏  |  浏览/下载:13/0  |  提交时间:2016/06/27
PRE: Stronger security notions and efficient construction with non-interactive opening 期刊论文
Theoretical Computer Science, 2014, 卷号: 542, 页码: 1-16
Zhang, Jiang (1); Zhang, Zhenfeng (1); Chen, Yu (3)
收藏  |  浏览/下载:16/0  |  提交时间:2014/12/16
Efficient construction of provably secure steganography under ordinary covert channels 其他
2012-01-01
Zhu Yan; Yu MengYang; Hu HongXin; Ahn, Gail-Joon; Zhao HongJia
收藏  |  浏览/下载:9/0  |  提交时间:2015/11/10
single hop detection of node clone attacks in mobile wireless sensor networks 会议论文
2012 International Workshop on Information and Electronics Engineering, IWIEE 2012, Harbin, China, March 10, 2012 - March 11, 2012
Lou Yanxiang; Zhang Yong; Liu Shengli
收藏  |  浏览/下载:18/0  |  提交时间:2013/09/22
群组密钥协商协议的设计与分析 学位论文
博士, 北京: 中国科学院研究生院, 2011
滕济凯
收藏  |  浏览/下载:15/0  |  提交时间:2012/01/05
The hierarchical threat model of routing security for wireless ad hoc networks 会议论文
作者:  Xian, Guo;  Tao, Feng;  Yuan, Zhan-Ting;  Ma, Jian-Feng
收藏  |  浏览/下载:15/0  |  提交时间:2020/11/15


©版权所有 ©2017 CSpace - Powered by CSpace