咨询与建议

限定检索结果

文献类型

  • 25 篇 期刊文献
  • 19 篇 会议

馆藏范围

  • 44 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 31 篇 工学
    • 17 篇 计算机科学与技术...
    • 12 篇 软件工程
    • 7 篇 信息与通信工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
  • 12 篇 理学
    • 7 篇 数学
    • 2 篇 物理学
    • 2 篇 生物学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 9 篇 管理学
    • 6 篇 管理科学与工程(可...
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 5 篇 cryptography
  • 4 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 security
  • 3 篇 hardware
  • 2 篇 conferences
  • 2 篇 parallel process...
  • 2 篇 computer archite...
  • 2 篇 smart contract
  • 2 篇 semantics
  • 2 篇 software
  • 2 篇 polynomials
  • 2 篇 explosions
  • 2 篇 single cycle t-f...
  • 1 篇 internet of thin...
  • 1 篇 covid-19
  • 1 篇 few
  • 1 篇 tools
  • 1 篇 algebraic method
  • 1 篇 reliability

机构

  • 11 篇 state key labora...
  • 4 篇 university of ch...
  • 4 篇 school of scienc...
  • 4 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 department of ma...
  • 3 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 huawei
  • 2 篇 institute of mic...
  • 2 篇 data security go...
  • 2 篇 institute of inf...
  • 2 篇 department of co...
  • 2 篇 international op...
  • 2 篇 college of infor...
  • 2 篇 department of ph...

作者

  • 4 篇 wang yan
  • 3 篇 guan xianglong
  • 3 篇 zhang zhifei
  • 3 篇 chen cui
  • 3 篇 hu yu-pu
  • 3 篇 huang yunyou
  • 3 篇 xiaowei li
  • 3 篇 miao xiuxia
  • 3 篇 ma li
  • 2 篇 jing zhang
  • 2 篇 yuan feng
  • 2 篇 hui yu
  • 2 篇 jing ye
  • 2 篇 yang yang
  • 2 篇 xiaochun ye
  • 2 篇 tang suqin
  • 2 篇 dongrui fan
  • 2 篇 simha sethumadha...
  • 2 篇 weizhi xu
  • 2 篇 da wang

语言

  • 42 篇 英文
  • 2 篇 中文
检索条件"机构=Computer Architecture and Security Technology Laboratory"
44 条 记 录,以下是21-30 订阅
排序:
Modular Inverse for Integers using Fast Constant Time GCD Algorithm and its Applications
Modular Inverse for Integers using Fast Constant Time GCD Al...
收藏 引用
International Conference on Field Programmable Logic and Applications
作者: Sanjay Deshpande Santos Merino del Pozo Victor Mateu Marc Manzano Najwa Aaraj Jakub Szefer Computer Architecture and Security Laboratory Yale University New Haven CT USA Cryptography Research Centre Technology Innovation Institute Abu Dhabi UAE Digital Security Group Faculty of Science Radboud University Nijmegen Netherlands Faculty of Engineering Mondragon Unibertsitatea Mondragon Spain Okinawa Institute of Science and Technology Okinawa Japan
Modular inversion, the multiplicative inverse of an integer in the ring of integers modulo a prime number, is widely used in public-key cryptography. However, it is one of the most computationally intensive operations... 详细信息
来源: 评论
Enhanced Particle Swarm Optimization for Workflow Scheduling in Clouds
Enhanced Particle Swarm Optimization for Workflow Scheduling...
收藏 引用
Symposium of Image, Signal Processing, and Artificial Vision (STSIVA)
作者: Chang Lu Dayu Feng Jie Zhu Haiping Huang Nanjing University of Posts & Telecommunications Nanjing China Jiangsu Key Laboratory of Big Data Security & Intelligent Processing Nanjing China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks Nanjing China
As a NP-hard problem, it is always baffling to figure out a scheduling strategy to arrange the interconnected tasks of a workflow on the infinite number of resources in the cloud environment so that the workflow can b... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
2021 IEEE International Conference on Bioinformatics and Biomedicine, BIBM 2021
作者: Zhao, Yao Zhao, Weizhong Jiang, Xingpeng He, Tingting Su, Bianping Central China Normal University Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Hubei Wuhan430079 China School of Computer Central China Normal University Hubei Wuhan430079 China National Language Resources Monitoring and Research Center for Network Media Central China Normal University Hubei Wuhan430079 China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin541004 China Guangxi Key Lab of Multi-source Information Mining and Security Guangxi Normal University Guilin541004 China Xi'An University of Architecture and Technology Shanxi Xi'an China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论
SPECBOX: A label-based transparent speculation scheme against transient execution attacks
arXiv
收藏 引用
arXiv 2021年
作者: Tang, Bowen Wu, Chenggang Wang, Zhe Jia, Lichen Yew, Pen-Chung Cheng, Yueqiang Zhang, Yinqian Wang, Chenxi Xu, Guoqing Harry State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of the Chinese Academy of Sciences China University of Minnesota Twin Cities United States NIO Security Research United States Southern University of Science and Technology China University of California Los Angeles United States
Speculative execution techniques have been a cornerstone of modern processors to improve instruction-level parallelism. However, recent studies showed that this kind of techniques could be exploited by attackers to le... 详细信息
来源: 评论
OpenClinicalAI: enabling AI to diagnose diseases in real-world clinical settings
arXiv
收藏 引用
arXiv 2021年
作者: Huang, Yunyou Wang, Nana Tang, Suqin Ma, Li Hao, Tianshu Jiang, Zihan Zhang, Fan Kang, Guoxin Miao, Xiuxia Guan, Xianglong Zhang, Ruchang Zhang, Zhifei Zhan, Jianfeng Guangxi Key Lab of Multi-Source Information Mining & Security School of Computer Science and Engineering School of Software Guangxi Normal University Guilin China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China Guilin Medical University Guilin China Department of Physiology and Pathophysiology Capital Medical University Beijing China University of Chinese Academy of Sciences China International Open Benchmark Council
This paper quantitatively reveals the state-of-the-art and state-of-the-practice AI systems only achieve acceptable performance on the stringent conditions that all categories of subjects are known, which we call clos... 详细信息
来源: 评论
Deep Reinforcement Learning Based Intelligent Reflecting Surface for Secure Wireless Communications
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Helin Xiong, Zehui Zhao, Jun Niyato, Dusit Xiao, Liang Wu, Qingqing School of Computer Science and Engineering Nanyang Technological University Singapore639798 Singapore Department of Information and Communication Engineering Key Laboratory of Digital Fujian on IoT Communication Architecture and Security Technology Xiamen University Xiamen361005 China Department of Electrical and Computer Engineering National University of Singapore Singapore119260 Singapore
In this paper, we study an intelligent reflecting surface (IRS)-aided wireless secure communication system for physical layer security, where an IRS is deployed to adjust its reflecting elements to secure the communic... 详细信息
来源: 评论
Optimization Space Exploration of Hardware Design for CRYSTALS-KYBER
Optimization Space Exploration of Hardware Design for CRYSTA...
收藏 引用
Asian Test Symposium (ATS)
作者: Yixuan Zhao Zhiteng Chao Jing Ye Wen Wang Yuan Cao Shuai Chen Xiaowei Li Huawei Li State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Yale University US Hohai University China Rock Solid Security Lab FiberHome Co. Ltd. China
Public key cryptography is important in the global communication digital infrastructure. However, the emergence of quantum computer and Shor algorithm has greatly threatened the security of public key cryptography. Th... 详细信息
来源: 评论
Eliminating NB-IoT interference to LTE system: A sparse machine learning based approach
arXiv
收藏 引用
arXiv 2020年
作者: Liu, Sicong Xiao, Liang Han, Zhu Tang, Yuliang Department of Communication Engineering Key Laboratory of Digital Fujian on IoT Communication Architecture and Security Technology Xiamen University Xiamen361005 China University of Houston HoustonTX77004 United States Department of Computer Science and Engineering Kyung Hee University Seoul446-701 Korea Republic of
—Narrowband internet-of-things (NB-IoT) is a competitive 5G technology for massive machine-type communication scenarios, but meanwhile introduces narrowband interference (NBI) to existing broadband transmission such ... 详细信息
来源: 评论
An improved RL-based framework for multiple biomedical event extraction via self-supervised learning
An improved RL-based framework for multiple biomedical event...
收藏 引用
IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
作者: Yao Zhao Weizhong Zhao Xingpeng Jiang Tingting He Bianping Su Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning Central China Normal University Wuhan Hubei PR China School of Computer Central China Normal University Wuhan Hubei PR China National Language Resources Monitoring & Research Center for Network Media Central China Normal University Wuhan Hubei PR China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin PR China Guangxi Key Lab of Multi-source Information Mining & Security Guangxi Normal University Guilin PR China Xi’an University of Architecture and Technology Xi’an Shanxi PR China
The main goal of biomedical event extraction is to structurally extract biomedical events from texts, however, the specificity of the domain makes both text modeling and data annotation very difficult. We propose a se... 详细信息
来源: 评论
Sparse code multiple access for 6G wireless communication networks: Recent advances and future directions
arXiv
收藏 引用
arXiv 2021年
作者: Yu, Lisu Liu, Zilong Wen, Miaowen Cai, Donghong Dang, Shuping Wang, Yuhao Xiao, Pei School of Information Engineering Nanchang University Nanchang330031 China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing100190 China School of Computer Science and Electronics Engineering University of Essex ColchesterCO4 3SQ United Kingdom School of Electronic and Information Engineering South China University of Technology Guangzhou510640 China College of Cyber Security Jinan University Guangzhou510632 China Thuwal23955-6900 Saudi Arabia Institute for Communication Systems 5G Innovation Centre University of Surrey GuildfordGU2 7XH United Kingdom
As 5G networks rolling out in many different countries nowadays, the time has come to investigate how to upgrade and expand them towards 6G, where the latter is expected to realize the interconnection of everything as... 详细信息
来源: 评论