×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
计算技术研究所 [17]
内容类型
期刊论文 [17]
发表日期
2020 [17]
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共17条,第1-10条
帮助
限定条件
发表日期:2020
专题:计算技术研究所
第一署名单位
第一作者单位
通讯作者单位
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Part alignment network for vehicle re-identification
期刊论文
NEUROCOMPUTING, 2020, 卷号: 418, 页码: 114-125
作者:
Chen, Yucheng
;
Ma, Bingpeng
;
Chang, Hong
收藏
  |  
浏览/下载:39/0
  |  
提交时间:2021/12/01
Vehicle re-identification
Part alignment
Cross-correlation
A Guaranteed Secure Scan Design Based on Test Data Obfuscation by Cryptographic Hash
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4524-4536
作者:
Cui, Aijiao
;
Li, Mengyang
;
Qu, Gang
;
Li, Huawei
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2021/12/01
Ciphers
Encryption
Integrated circuits
Side-channel attacks
Testing
Cryptographic hash function
obfuscation logic
scan design
scan-based side-channel attack
Long Live TIME: Improving Lifetime and Security for NVM-Based Training-in-Memory Systems
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2020, 卷号: 39, 期号: 12, 页码: 4707-4720
作者:
Cai, Yi
;
Lin, Yujun
;
Xia, Lixue
;
Chen, Xiaoming
;
Han, Song
收藏
  |  
浏览/下载:15/0
  |  
提交时间:2021/12/01
Gradient sparsification
lifetime
neural networks
training-in-memory
wear-leveling
Security risk and response analysis of typical application architecture of information and communication blockchain
期刊论文
NEURAL COMPUTING & APPLICATIONS, 2020, 页码: 11
作者:
Zhao, Hongwei
;
Zhang, Moli
;
Wang, Shi
;
Li, Entang
;
Guo, Zhenhua
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2021/12/01
Information and communication blockchain
Network security risks
Homomorphic verifiable secret sharing
Risk response
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
A comprehensive formal security analysis and revision of the two-phase key exchange primitive of TPM 2.0
期刊论文
COMPUTER NETWORKS, 2020, 卷号: 179, 页码: 18
作者:
Zhang, Qianying
;
Zhao, Shijun
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2020/12/10
Security analysis
Authenticated key exchange
TPM 2.0
Intelligent city intelligent medical sharing technology based on internet of things technology
期刊论文
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 卷号: 111, 页码: 226-233
作者:
Zhao, Xin
;
Xiao, Wei
;
Wu, Lu
;
Zhao, Zhigang
;
Huo, Jidong
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Internet of things
Intelligent city
Intelligent medical sharing
Data encryption
Information security
A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks
期刊论文
COMPUTERS & SECURITY, 2020, 卷号: 96, 页码: 12
作者:
Yang, Bo
收藏
  |  
浏览/下载:12/0
  |  
提交时间:2020/12/10
Cognitive radio networks
Hopping sequences
Distributed rendezvous algorithms
Chinese remainder theorem
Anti-jamming
Information entropy
A Blockchain-Based Computing Architecture for Mobile Ad Hoc Cloud
期刊论文
IEEE NETWORK, 2020, 卷号: 34, 期号: 4, 页码: 140-149
作者:
Jiao, Zhenzhen
;
Zhang, Baoxian
;
Zhang, Li
;
Liu, Min
;
Gong, Wei
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2020/12/10
Blockchain
Ad hoc networks
Cloud computing
Smart contracts
Task analysis
Security
Computer architecture
Rumor detection based on topic classification and multi-scale feature fusion
期刊论文
Journal of Physics: Conference Series, 2020, 卷号: 1601, 期号: 3
作者:
Tan,Li
;
Ma,Zihao
;
Cao,Juan
;
Lv,Xinyue
收藏
  |  
浏览/下载:10/0
  |  
提交时间:2021/12/01
©版权所有 ©2017 CSpace - Powered by
CSpace