咨询与建议

限定检索结果

文献类型

  • 31 篇 会议
  • 29 篇 期刊文献

馆藏范围

  • 60 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 25 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 8 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 冶金工程
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
  • 17 篇 理学
    • 10 篇 数学
    • 4 篇 生物学
    • 2 篇 物理学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 10 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学

主题

  • 6 篇 cryptography
  • 5 篇 hardware
  • 4 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 security
  • 3 篇 software
  • 2 篇 conferences
  • 2 篇 parallel process...
  • 2 篇 smart contract
  • 2 篇 computers
  • 2 篇 semantics
  • 2 篇 complexity theor...
  • 2 篇 concrete
  • 2 篇 polynomials
  • 2 篇 codes (symbols)
  • 2 篇 explosions
  • 2 篇 single cycle t-f...
  • 2 篇 delay
  • 1 篇 internet of thin...

机构

  • 11 篇 state key labora...
  • 4 篇 university of ch...
  • 4 篇 school of scienc...
  • 4 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 computer archite...
  • 3 篇 department of ma...
  • 3 篇 security enginee...
  • 3 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 huawei
  • 2 篇 institute of mic...
  • 2 篇 data security go...
  • 2 篇 institute of inf...
  • 2 篇 department of co...
  • 2 篇 international op...

作者

  • 6 篇 szefer jakub
  • 5 篇 biedermann sebas...
  • 4 篇 wang yan
  • 3 篇 guan xianglong
  • 3 篇 simha sethumadha...
  • 3 篇 zhang zhifei
  • 3 篇 katzenbeisser st...
  • 3 篇 chen cui
  • 3 篇 hu yu-pu
  • 3 篇 huang yunyou
  • 3 篇 xiaowei li
  • 3 篇 miao xiuxia
  • 3 篇 ma li
  • 2 篇 jing zhang
  • 2 篇 yuan feng
  • 2 篇 hui yu
  • 2 篇 jing ye
  • 2 篇 yang yang
  • 2 篇 xiaochun ye
  • 2 篇 tang suqin

语言

  • 58 篇 英文
  • 2 篇 中文
检索条件"机构=Computer Architecture and Security Laboratory"
60 条 记 录,以下是21-30 订阅
排序:
Software Defect Prediction via Deep Belief Network
收藏 引用
Chinese Journal of Electronics 2019年 第5期28卷 925-932页
作者: WEI Hua SHAN Chun HU Changzhen ZHANG Yu YU Xiao School of Computer Science and Technology Beijing Institute of Technology China Information Technology Security Evaluation Center Beijing Key Laboratory of Software Security Engineering Technology Beijing Institute of Technology School of Electrical and Information Engineering and Beijing Key Laboratory of Intelligent Processing for Building Big Data Beijing University of Civil Engineering and Architecture State Key Laboratory in China for Geomechanics and Deep Underground Engineering (Beijing) China University of Mining and Technology School of Computer Science and Technology Shandong University of Technology
Defect distribution prediction is a meaningful topic because software defects are the fundamental cause of many attacks and data loss. Building accurate prediction models can help developers find bugs and prioritize t... 详细信息
来源: 评论
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications
Modular Inverse for Integers using Fast Constant Time GCD Al...
收藏 引用
International Conference on Field Programmable Logic and Applications
作者: Sanjay Deshpande Santos Merino del Pozo Victor Mateu Marc Manzano Najwa Aaraj Jakub Szefer Computer Architecture and Security Laboratory Yale University New Haven CT USA Cryptography Research Centre Technology Innovation Institute Abu Dhabi UAE Digital Security Group Faculty of Science Radboud University Nijmegen Netherlands Faculty of Engineering Mondragon Unibertsitatea Mondragon Spain Okinawa Institute of Science and Technology Okinawa Japan
Modular inversion, the multiplicative inverse of an integer in the ring of integers modulo a prime number, is widely used in public-key cryptography. However, it is one of the most computationally intensive operations... 详细信息
来源: 评论
Enhanced Particle Swarm Optimization for Workflow Scheduling in Clouds
Enhanced Particle Swarm Optimization for Workflow Scheduling...
收藏 引用
Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)
作者: Chang Lu Dayu Feng Jie Zhu Haiping Huang Nanjing University of Posts & Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China
As a NP-hard problem, it is always baffling to figure out a scheduling strategy to arrange the interconnected tasks of a workflow on the infinite number of resources in the cloud environment so that the workflow can b... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Zhao, Yao Zhao, Weizhong Jiang, Xingpeng He, Tingting Su, Bianping Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Hubei Wuhan430079 China School of Computer Central China Normal University Hubei Wuhan430079 China National Language Resources Monitoring and Research Center for Network Media Central China Normal University Hubei Wuhan430079 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China Xi'An University of Architecture and Technology Shanxi Xi'an China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论
SPECBOX: A label-based transparent speculation scheme against transient execution attacks
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Bowen Wu, Chenggang Wang, Zhe Jia, Lichen Yew, Pen-Chung Cheng, Yueqiang Zhang, Yinqian Wang, Chenxi Xu, Guoqing Harry State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of the Chinese Academy of Sciences China University of Minnesota Twin Cities United States NIO Security Research United States Southern University of Science and Technology China University of California Los Angeles United States
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind of techniques could be exploited by attackers to le... 详细信息
来源: 评论
OpenClinicalAI: enabling AI to diagnose diseases in real-world clinical settings
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Yunyou Wang, Nana Tang, Suqin Ma, Li Hao, Tianshu Jiang, Zihan Zhang, Fan Kang, Guoxin Miao, Xiuxia Guan, Xianglong Zhang, Ruchang Zhang, Zhifei Zhan, Jianfeng Guangxi Key Lab of Multi-Source Information Mining & Security School of Computer Science and Engineering School of Software Guangxi Normal University Guilin China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Guilin Medical University Guilin China Department of Physiology and Pathophysiology Capital Medical University Beijing China University of Chinese Academy of Sciences China International Open Benchmark Council
This paper quantitatively reveals the state-of-the-art and state-of-the-practice AI systems only achieve acceptable performance on the stringent conditions that all categories of subjects are known, which we call clos... 详细信息
来源: 评论
Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless Communications
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Helin Xiong, Zehui Zhao, Jun Niyato, Dusit Xiao, Liang Wu, Qingqing School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore Department of Information and Communication Engineering Key Laboratory of Digital Fujian on IoT Communication Architecture and Security Technology Xiamen University Xiamen361005 China Department of Electrical and Computer Engineering National University of Singapore Singapore119260 Singapore
In this paper, we study an intelligent reflecting surface (IRS)-aided wireless secure communication system for physical layer security, where an IRS is deployed to adjust its reflecting elements to secure the communic... 详细信息
来源: 评论
Optimization Space Exploration of Hardware Design for CRYSTALS-KYBER
Optimization Space Exploration of Hardware Design for CRYSTA...
收藏 引用
Asian Test Symposium (ATS)
作者: Yixuan Zhao Zhiteng Chao Jing Ye Wen Wang Yuan Cao Shuai Chen Xiaowei Li Huawei Li State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Yale University US Hohai University China Rock Solid Security Lab FiberHome Co. Ltd. China
Public key cryptography is important in the global communication digital infrastructure. However, the emergence of quantum computer and Shor algorithm has greatly threatened the security of public key cryptography. Th... 详细信息
来源: 评论
Eliminating NB-IoT interference to LTE system: A sparse machine learning based approach
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Sicong Xiao, Liang Han, Zhu Tang, Yuliang Department of Communication Engineering Key Laboratory of Digital Fujian on IoT Communication Architecture and Security Technology Xiamen University Xiamen361005 China University of Houston HoustonTX77004 United States Department of Computer Science and Engineering Kyung Hee University Seoul446-701 Korea Republic of
—Narrowband internet-of-things (NB-IoT) is a competitive 5G technology for massive machine-type communication scenarios, but meanwhile introduces narrowband interference (NBI) to existing broadband transmission such ... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yao Zhao Weizhong Zhao Xingpeng Jiang Tingting He Bianping Su Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin PR China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin PR China Xi’an University of Architecture and Technology Xi’an Shanxi PR China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论