咨询与建议

限定检索结果

文献类型

  • 110 篇 会议
  • 85 篇 期刊文献

馆藏范围

  • 195 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 140 篇 工学
    • 98 篇 计算机科学与技术...
    • 69 篇 软件工程
    • 32 篇 信息与通信工程
    • 21 篇 电子科学与技术(可...
    • 19 篇 电气工程
    • 17 篇 生物工程
    • 12 篇 动力工程及工程热...
    • 10 篇 机械工程
    • 10 篇 光学工程
    • 10 篇 控制科学与工程
    • 9 篇 网络空间安全
    • 8 篇 仪器科学与技术
    • 8 篇 化学工程与技术
    • 7 篇 交通运输工程
    • 5 篇 安全科学与工程
    • 4 篇 建筑学
    • 4 篇 生物医学工程(可授...
    • 3 篇 力学(可授工学、理...
    • 3 篇 土木工程
  • 63 篇 理学
    • 27 篇 数学
    • 19 篇 生物学
    • 17 篇 物理学
    • 9 篇 统计学(可授理学、...
    • 7 篇 化学
    • 6 篇 系统科学
  • 26 篇 管理学
    • 21 篇 管理科学与工程(可...
    • 12 篇 工商管理
    • 6 篇 图书情报与档案管...
  • 5 篇 法学
    • 4 篇 社会学
  • 4 篇 医学
    • 3 篇 临床医学
  • 2 篇 文学
  • 2 篇 军事学
  • 2 篇 艺术学

主题

  • 6 篇 deep learning
  • 6 篇 energy consumpti...
  • 6 篇 hardware
  • 5 篇 semantics
  • 5 篇 algorithm design...
  • 4 篇 deep neural netw...
  • 4 篇 computer archite...
  • 4 篇 logic gates
  • 4 篇 convolution
  • 4 篇 quality of servi...
  • 4 篇 schedules
  • 4 篇 real-time system...
  • 4 篇 feature extracti...
  • 4 篇 field programmab...
  • 4 篇 encryption
  • 4 篇 cloud computing
  • 4 篇 scheduling
  • 4 篇 training
  • 3 篇 object detection
  • 3 篇 fault tolerance

机构

  • 21 篇 key laboratory f...
  • 20 篇 key laboratory f...
  • 14 篇 college of compu...
  • 10 篇 key laboratory f...
  • 7 篇 network resource...
  • 6 篇 school of inform...
  • 5 篇 hunan provincial...
  • 5 篇 college of infor...
  • 5 篇 college of compu...
  • 4 篇 dalian maritime ...
  • 4 篇 northeastern uni...
  • 4 篇 national collabo...
  • 4 篇 school of electr...
  • 4 篇 school of comput...
  • 4 篇 key laboratory o...
  • 4 篇 baidu inc.
  • 4 篇 department of co...
  • 4 篇 hunan university...
  • 4 篇 hunan province h...
  • 4 篇 college of compu...

作者

  • 20 篇 renfa li
  • 18 篇 li renfa
  • 14 篇 xie guoqi
  • 12 篇 guoqi xie
  • 7 篇 wu di
  • 6 篇 yi wang
  • 6 篇 liu yan
  • 6 篇 long jun
  • 6 篇 wanli chang
  • 6 篇 wang yi
  • 5 篇 li zhetao
  • 5 篇 yang zhan
  • 5 篇 tian shujuan
  • 5 篇 junli wang
  • 5 篇 shujuan tian
  • 5 篇 li keqin
  • 5 篇 chungang yan
  • 4 篇 xie xin
  • 4 篇 raymond osolo ia...
  • 4 篇 wang kezhi

语言

  • 191 篇 英文
  • 3 篇 其他
  • 1 篇 中文
检索条件"机构=Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University"
195 条 记 录,以下是51-60 订阅
排序:
FPGA based optimized SHA-3 finalist in reconfigurable hardware
FPGA based optimized SHA-3 finalist in reconfigurable hardwa...
收藏 引用
2011 International Symposium on Integrated Circuits, ISIC 2011
作者: Song, Qian Wang, Yi Li, Zhican Zhou, Quan Wu, Wufei Han, Demin Xu, Wenlong Chen, Zuo Li, Renfa Embedded Systems and Networking Laboratory Hunan University Hunan Provincial Key Laboratory of Network and Information Security China
A hash function is well-defined procedure to convert large, uncertain long message into fixed small integers. Secure Hash Algorithm (SHA) is an one-way message digest algorithm which is usually used in cryptographic a... 详细信息
来源: 评论
An improved differential fault analysis attack to AES using reduced searching space
An improved differential fault analysis attack to AES using ...
收藏 引用
5th International Symposium on Cyberspace Safety and Security, CSS 2013
作者: Cai, Zemin Wang, Yi Li, Renfa Embedded Systems and Networking Laboratory Hunan University China Hunan Provincial Key Laboratory of Network and Information Security Hunan University Changsha China
Differential Power Analysis against AES proved to be effective, with use mask techniques, we can truncate the relevance and defense DPA attacks successfully. In this paper, we introduce a new mean called DFA (Differen... 详细信息
来源: 评论
RTISM: Real-Time Inter-VM Communication Based on Shared Memory for Mixed-Criticality Flows  44
RTISM: Real-Time Inter-VM Communication Based on Shared Memo...
收藏 引用
44th IEEE Real-Time Systems Symposium, RTSS 2023
作者: Li, Zonghong Xie, Guoqi Ma, Wenhong Xiao, Xiongren Xie, Yong Ren, Wei Chang, Wanli College of Computer Science and Electronic Engineering Hunan University Key Laboratory for Embedded and Network Computing of Hunan Province China Research Institute of Hunan University Chongqing China Nanjing University of Posts and Telecommunications China Huawei Technologies China
Virtual machines (VMs) have been increasingly deployed in real-time systems to enhance heterogeneous resource sharing. Despite being isolated for security and prevention of failure propagation, VMs need to communicate... 详细信息
来源: 评论
Secret sharing based countermeasure for AES S-box
Secret sharing based countermeasure for AES S-box
收藏 引用
2011 International Symposium on Integrated Circuits, ISIC 2011
作者: Wang, Yi Yuan, Zheng Li, Zhican Li, Renfa Embedded Systems and Networking Laboratory Hunan University Hunan Provincial Key Laboratory of Network and Information Security Changsha China
Cryptographic devices are vulnerable to Differential Power Attack (DPA) in embedded systems. Masking methods are popularly used to defend against DPA by masking all intermediate data with random values. However, maski... 详细信息
来源: 评论
An Improved algorithm of parameters reconfiguration in cognitive radio networks using ant colony optimization
An Improved algorithm of parameters reconfiguration in cogni...
收藏 引用
2015 3rd International Conference on Manufacturing Engineering and Technology for Manufacturing Growth(METMG 2015)
作者: Shaoyuan Liu Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University
Recent years, cognitive radio techniques have becoming a promising solution to tackle the bottleneck of spectrum scarcity. As an essential characteristics for CRN, the cognitive parameter reconfiguration can automatic... 详细信息
来源: 评论
Multi-Users Cooperative Spectrum Sensing in Distributed Cognitive Radio networks with Energy Harvesting
Multi-Users Cooperative Spectrum Sensing in Distributed Cogn...
收藏 引用
2nd International Conference on Simulation and Modeling Methodologies,Technologies and Applications(SMTA 2015)
作者: H.Wang F.Z.Zeng Key Laboratory for Embedded and Network Computing of Hunan Province Hunan University
In this paper we propose an improved sensing scheme in cognitive radio networks, which allows the secondary users to utilize the spectrum of primary users when these resources are not being used currently. We first ap... 详细信息
来源: 评论
New binary artificial bee colony for the 0-1 knapsack problem  9th
New binary artificial bee colony for the 0-1 knapsack proble...
收藏 引用
9th International Conference on Swarm Intelligence, ICSI 2018
作者: Nouioua, Mourad Li, Zhiyong Jiang, Shilong The College of Computer Science and Electronic Engineering Hunan University Changsha China Key Laboratory for Embedded and Network Computing of Hunan Province Changsha China PKU-HKUST Shenzhen-HongKong Institution Shenzhen China
The knapsack problem is one of the well known NP-Hard optimization problems. Because of its appearance as a sub-problem in many real world problems, it attracts the attention of many researchers on swarm intelligence ... 详细信息
来源: 评论
Improvement on masked S-box hardware implementation
Improvement on masked S-box hardware implementation
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zeng, Juanli Wang, Yi Xu, Cheng Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ... 详细信息
来源: 评论
A unified architecture for DPA-resistant PRESENT
A unified architecture for DPA-resistant PRESENT
收藏 引用
2012 International Conference on Innovations in Information Technology, IIT 2012
作者: Zhao, Wei Wang, Yi Li, Renfa Embedded System and Network Laboratory Hunan University Changsha Hunan 410082 China Hunan Province Key Laboratory of Network and Information Security Hunan University Changsha Hunan 410082 China College of Information Science and Engineering Hunan University Changsha Hunan 410082 China Department of Electrical and Computer Engineering National University of Singapore Singapore 117576 Singapore
Recently, there is a new kinds of cryptographic algorithms are proposed to meet the requirements of "lightweight" applications. PRESENT is one of them, which is built based on 4-bit substitution transformati... 详细信息
来源: 评论
On Efficient Feature Ranking Methods for High-Throughput Data Analysis
On Efficient Feature Ranking Methods for High-Throughput Dat...
收藏 引用
作者: Liao, Bo Jiang, Yan Liang, Wei Peng, Lihong Peng, Li Hanyurwimfura, Damien Li, Zejun Chen, Min Key Laboratory for Embedded and Network Computing of Hunan Province College of Information Science and Engineering Hunan University Changsha Hunan410082 China School of Computer Science and Engineering Hunan University of Science and Technology Xiangtan411201 China Department of Computer Science and Engineering Changsha Medical University Changsha Hunan410219 China
Efficient mining of high-throughput data has become one of the popular themes in the big data era. Existing biology-related feature ranking methods mainly focus on statistical and annotation information. In this study... 详细信息
来源: 评论