咨询与建议

限定检索结果

文献类型

  • 12 篇 会议
  • 6 篇 期刊文献

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 7 篇 计算机科学与技术...
    • 7 篇 软件工程
    • 4 篇 电子科学与技术(可...
    • 2 篇 光学工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 生物工程
  • 4 篇 理学
    • 2 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 系统科学
    • 1 篇 统计学(可授理学、...
  • 3 篇 法学
    • 3 篇 社会学
  • 1 篇 管理学
    • 1 篇 图书情报与档案管...

主题

  • 5 篇 hardware
  • 5 篇 cryptography
  • 4 篇 throughput
  • 3 篇 tools
  • 2 篇 supercomputers
  • 2 篇 protocols
  • 2 篇 mathematical mod...
  • 2 篇 data models
  • 2 篇 training
  • 1 篇 conferences
  • 1 篇 reed-solomon cod...
  • 1 篇 runtime
  • 1 篇 tuning
  • 1 篇 access control
  • 1 篇 quantum computin...
  • 1 篇 data privacy
  • 1 篇 integrated circu...
  • 1 篇 application soft...
  • 1 篇 leadership
  • 1 篇 fault tolerance

机构

  • 3 篇 adaptive and sec...
  • 3 篇 adaptive and sec...
  • 2 篇 adaptive and sec...
  • 2 篇 adaptive and sec...
  • 2 篇 adaptive and sec...
  • 2 篇 argonne national...
  • 1 篇 adaptive and sec...
  • 1 篇 reliable computi...
  • 1 篇 the charles star...
  • 1 篇 adaptive and sec...
  • 1 篇 the charles star...
  • 1 篇 lincoln laborato...
  • 1 篇 adaptive and sec...
  • 1 篇 boston universit...
  • 1 篇 adaptive and sec...
  • 1 篇 mit lincoln labo...
  • 1 篇 mit lincoln labo...
  • 1 篇 mit lincoln labo...
  • 1 篇 adaptive and sec...
  • 1 篇 adaptive and sec...

作者

  • 10 篇 michel a. kinsy
  • 8 篇 kinsy michel a.
  • 5 篇 bu lake
  • 5 篇 eliakin del rosa...
  • 5 篇 mihailo isakov
  • 3 篇 agrawal rashmi
  • 3 篇 karen gettings
  • 3 篇 isakov mihailo
  • 3 篇 sandeep madiredd...
  • 3 篇 philip carns
  • 3 篇 robert b. ross
  • 3 篇 rashmi agrawal
  • 3 篇 lake bu
  • 3 篇 prasanna balapra...
  • 2 篇 ehret alan
  • 2 篇 cheng hai
  • 2 篇 vijay gadepally
  • 2 篇 kava donato
  • 2 篇 alan ehret
  • 1 篇 hien d. nguyen

语言

  • 18 篇 英文
检索条件"机构=Adaptive and Secure Computing Systems Laboratory"
18 条 记 录,以下是11-20 订阅
排序:
A lightweight mceliece cryptosystem co-processor design
arXiv
收藏 引用
arXiv 2019年
作者: Bu, Lake Agrawal, Rashmi Cheng, Hai Kinsy, Michel A. Adaptive and Secure Computing Systems Laboratory Department of Electrical and Computer Engineering Boston University
Due to the rapid advances in the development of quantum computers and their susceptibility to errors, there is a renewed interest in error correction algorithms. In particular, error correcting code-based cryptosystem... 详细信息
来源: 评论
Survey of Attacks and Defenses on Edge-Deployed Neural Networks
Survey of Attacks and Defenses on Edge-Deployed Neural Netwo...
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Mihailo Isakov Vijay Gadepally Karen M. Gettings Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Boston MA MIT Lincoln Laboratory Boston MA
Deep Neural Network (DNN) workloads are quickly moving from datacenters onto edge devices, for latency, privacy, or energy reasons. While datacenter networks can be protected using conventional cybersecurity measures,... 详细信息
来源: 评论
A Survey on Hardware Security Techniques Targeting Low-Power SoC Designs
A Survey on Hardware Security Techniques Targeting Low-Power...
收藏 引用
IEEE Conference on High Performance Extreme computing (HPEC)
作者: Alan Ehret Karen Gettings Bruce R. Jordan Michel A. Kinsy Adaptive and Secure Computing Systems (ASCS) Laboratory Boston University MIT Lincoln Laboratory Lexingon United States of America
In this work, we survey hardware-based security techniques applicable to low-power system-on-chip designs. Techniques related to a system's processing elements, volatile main memory and caches, non-volatile memory... 详细信息
来源: 评论
A secure and Robust Scheme for Sharing Confidential Information in IoT systems
arXiv
收藏 引用
arXiv 2019年
作者: Bu, Lake Isakov, Mihailo Kinsy, Michel A. Adaptive and Secure Computing Systems Laboratory Department of Electrical and Computer Engineering Boston University Boston United States
In Internet of Things (IoT) systems with security demands, there is often a need to distribute sensitive information (such as encryption keys, digital signatures, or login credentials, etc.) among the devices, so that... 详细信息
来源: 评论
Sphinx: A secure architecture based on binary code diversification and execution obfuscation
arXiv
收藏 引用
arXiv 2018年
作者: Kinsy, Michel A. Kava, Donato Ehret, Alan Mark, Miguel Adaptive and Secure Computing Systems Laboratory Boston University Boston United States
Sphinx, a hardware-software co-design architecture for binary code and runtime obfuscation. The Sphinx architecture uses binary code diversification and self-reconfigurable processing elements to maintain application ... 详细信息
来源: 评论
SAPA: Self-aware polymorphic architecture
arXiv
收藏 引用
arXiv 2018年
作者: Kinsy, Michel A. Isakov, Mihailo Ehret, Alan Kava, Donato Adaptive and Secure Computing Systems Laboratory Boston University Boston United States
In this work, we introduce a Self-Aware Polymorphic Architecture (SAPA) design approach to support emerging context-aware applications and mitigate the programming challenges caused by the ever-increasing complexity a... 详细信息
来源: 评论
Closnets: A priori sparse topologies for faster DNN training
arXiv
收藏 引用
arXiv 2018年
作者: Isakov, Mihailo Kinsy, Michel A. Adaptive and Secure Computing Systems Laboratory Department of Electrical and Computer Engineering Boston University Boston United States
Fully-connected layers in deep neural networks (DNN) are often the throughput and power bottleneck during training. This is due to their large size and low data reuse. Pruning dense layers can significantly reduce the... 详细信息
来源: 评论
RASSS: A perfidy-aware protocol for designing trustworthy distributed systems
RASSS: A perfidy-aware protocol for designing trustworthy di...
收藏 引用
IEEE International Symposium on Defect and Fault Tolerance in VLSI systems
作者: Lake Bu Hien D. Nguyen Michel A. Kinsy Adaptive and Secure Computing Systems Laboratory Boston University Boston USA
Robust adaptive secure Secret Sharing (RASSS) is a protocol for reconstructing secrets and information in distributed computing systems even in the presence of a large number of untrusted participants. Since the origi... 详细信息
来源: 评论