中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [8]
计算技术研究所 [7]
自动化研究所 [1]
采集方式
OAI收割 [16]
内容类型
期刊论文 [10]
会议论文 [6]
发表日期
2024 [3]
2023 [2]
2021 [1]
2020 [1]
2018 [1]
2013 [3]
更多
学科主题
计算机科学技术基础学... [3]
计算机系统结构::计... [3]
计算机软件::操作系... [3]
计算机软件::程序设... [3]
计算机软件::编译系... [3]
Computer S... [1]
更多
筛选
浏览/检索结果:
共16条,第1-10条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
On Modeling and Detecting Trojans in Instruction Sets
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 10, 页码: 3226-3239
作者:
Zhang, Ying
;
He, Aodi
;
Li, Jiaying
;
Rezine, Ahmed
;
Peng, Zebo
  |  
收藏
  |  
浏览/下载:17/0
  |  
提交时间:2024/12/06
Trojan horses
Security
Program processors
Companies
Inspection
Hardware security
Reverse engineering
Deep test for security
hidden instruction Trojan (HIT)
unbounded model checking (UMC)
VLSI test
Real-Time Robust Video Object Detection System Against Physical-World Adversarial Attacks
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2024, 卷号: 43, 期号: 1, 页码: 366-379
作者:
Han, Husheng
;
Hu, Xing
;
Hao, Yifan
;
Xu, Kaidi
;
Dang, Pucheng
  |  
收藏
  |  
浏览/下载:36/0
  |  
提交时间:2024/05/20
Object detection
Streaming media
Optical flow
Feature extraction
Real-time systems
Task analysis
Detectors
Adversarial patch attack
deep learning security
domain-specific accelerator
hardware/software co-design
real time
Novel methods for locating and matching IC cells based on standard cell libraries
期刊论文
OAI收割
MICROELECTRONIC ENGINEERING, 2024, 卷号: 283, 页码: 12
作者:
Liu, Can
;
Wang, Kaige
;
Li, Qing
;
Zhao, Fazhan
;
Zhao, Kun
  |  
收藏
  |  
浏览/下载:34/0
  |  
提交时间:2024/02/22
Reverse engineering
Integrated circuits
Scanning electron microscopy
Image processing
Hardware security
Variation Enhanced Attacks Against RRAM-Based Neuromorphic Computing System
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2023, 卷号: 42, 期号: 5, 页码: 1588-1596
作者:
Lv, Hao
;
Li, Bing
;
Zhang, Lei
;
Liu, Cheng
;
Wang, Ying
  |  
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2023/12/04
Security
Hardware
Neuromorphic engineering
Computational modeling
Circuit faults
Resistance
Immune system
Adversarial attack
fault injection attack
neuromorphic computing system (NCS)
processing in memory
reliability
resistive memory
Dancing With Wolves: An Intra-Process Isolation Technique With Privileged Hardware
期刊论文
OAI收割
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 卷号: 20, 期号: 3, 页码: 1959-1978
作者:
Wu, Chenggang
;
Xie, Mengyao
;
Wang, Zhe
;
Zhang, Yinqian
;
Lu, Kangjie
  |  
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2023/12/04
Codes
Hardware
Kernel
Runtime
Security
Registers
Virtualization
Intra-process memory isolation
Intel supervisor-mode access prevention
Practical Attacks on Deep Neural Networks by Memory Trojaning
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:
Hu, Xing
;
Zhao, Yang
;
Deng, Lei
;
Liang, Ling
;
Zuo, Pengfei
  |  
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2021/12/01
Trojan horses
Hardware
Integrated circuit modeling
Computational modeling
Security
Payloads
Convolutional neural networks (CNNs)
deep learning accelerator
deep learning attack
hardware Trojan
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
OAI收割
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
  |  
收藏
  |  
浏览/下载:62/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
The Cat and Mouse in Split Manufacturing
期刊论文
OAI收割
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2018, 卷号: 26, 期号: 5, 页码: 805-817
作者:
Wang, Yujie
;
Chen, Pu
;
Hu, Jiang
;
Li, Guofeng
;
Rajendran, Jeyavijayan
  |  
收藏
  |  
浏览/下载:26/0
  |  
提交时间:2019/12/10
Hardware security
placement perturbation
split manufacturing
Defending return-oriented programming based on virtualization techniques
期刊论文
OAI收割
Security and Communication Networks, 2013, 卷号: Volume 6, 期号: Issue 10, 页码: 1236-1249
Xiaoqi Jia
;
Rui Wang
;
Jun Jiang
;
Shengzhi Zhang
;
Peng Liu
  |  
收藏
  |  
浏览/下载:35/0
  |  
提交时间:2013/04/11
return-oriented programming
hypervisor-based security
hardware-assisted virtualization
recursive diffusion layers for (lightweight) block ciphers and hash functions
会议论文
OAI收割
19th International Conference on Selected Areas in Cryptography, SAC 2012, Windsor, ON, Canada, August 15, 2012 - August 16, 2012
Wu Shengbao
;
Wang Mingsheng
;
Wu Wenling
  |  
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2013/09/22
Hardware
Hash functions
Linear transformations
Lyapunov methods
Matrix algebra
Photons
Security of data
Shift registers