×
验证码:
换一张
忘记密码?
记住我
CORC
首页
科研机构
检索
知识图谱
申请加入
托管服务
登录
注册
在结果中检索
科研机构
北京航空航天大学 [20]
清华大学 [9]
软件研究所 [8]
华南理工大学 [7]
湖南大学 [7]
计算技术研究所 [3]
更多...
内容类型
期刊论文 [33]
会议论文 [29]
会议 [2]
其他 [1]
发表日期
2024 [1]
2021 [1]
2020 [1]
2019 [7]
2018 [14]
2017 [2]
更多...
学科主题
计算机科学技术基础学... [3]
计算机系统结构::计... [3]
计算机软件::操作系... [3]
计算机软件::程序设... [3]
计算机软件::编译系... [3]
Computer S... [1]
更多...
×
知识图谱
CORC
开始提交
已提交作品
待认领作品
已认领作品
未提交全文
收藏管理
QQ客服
官方微博
反馈留言
浏览/检索结果:
共65条,第1-10条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
作者升序
作者降序
题名升序
题名降序
发表日期升序
发表日期降序
提交时间升序
提交时间降序
Novel methods for locating and matching IC cells based on standard cell libraries
期刊论文
MICROELECTRONIC ENGINEERING, 2024, 卷号: 283, 页码: 12
作者:
Liu, Can
;
Wang, Kaige
;
Li, Qing
;
Zhao, Fazhan
;
Zhao, Kun
收藏
  |  
浏览/下载:4/0
  |  
提交时间:2024/02/22
Reverse engineering
Integrated circuits
Scanning electron microscopy
Image processing
Hardware security
Practical Attacks on Deep Neural Networks by Memory Trojaning
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2021, 卷号: 40, 期号: 6, 页码: 1230-1243
作者:
Hu, Xing
;
Zhao, Yang
;
Deng, Lei
;
Liang, Ling
;
Zuo, Pengfei
收藏
  |  
浏览/下载:21/0
  |  
提交时间:2021/12/01
Trojan horses
Hardware
Integrated circuit modeling
Computational modeling
Security
Payloads
Convolutional neural networks (CNNs)
deep learning accelerator
deep learning attack
hardware Trojan
Enabling Secure NVM-Based in-Memory Neural Network Computing by Sparse Fast Gradient Encryption
期刊论文
IEEE TRANSACTIONS ON COMPUTERS, 2020, 卷号: 69, 期号: 11, 页码: 1596-1610
作者:
Cai, Yi
;
Chen, Xiaoming
;
Tian, Lu
;
Wang, Yu
;
Yang, Huazhong
收藏
  |  
浏览/下载:32/0
  |  
提交时间:2020/12/10
Artificial neural networks
Nonvolatile memory
Encryption
Computational modeling
Hardware
Non-volatile memory (NVM)
compute-in-memory (CIM)
neural network
security
encryption
PUFPass: A password management mechanism based on software/hardware codesign
期刊论文
Integration, 2019, 卷号: 64, 页码: 173-183
作者:
Guo, Qingli
;
Ye, Jing
;
Li, Bing
;
Hu, Yu
;
Li, Xiaowei
收藏
  |  
浏览/下载:6/0
  |  
提交时间:2019/11/19
Password
Password management
Physical disorders
Physical unclonable functions (PUF)
Security
Shoulder-surfing attacks
Software/hardware co designs
Usability
A Multi-Layer Hardware Trojan Protection Framework for IoT Chips
期刊论文
IEEE ACCESS, 2019, 卷号: 7, 页码: 23628-23639
作者:
Dong, Chen
;
He, Guorong
;
Liu, Ximeng
;
Yang, Yang
;
Guo, Wenzhong
收藏
  |  
浏览/下载:2/0
  |  
提交时间:2019/11/21
protection framework
hardware security
hardware Trojan
Internet of Things
Stripped Functionality Logic Locking With Hamming Distance-Based Restore Unit (SFLL-hd) - Unlocked
期刊论文
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 卷号: 14, 期号: 10
作者:
Yang, Fangfei
;
Tang, Ming
;
Sinanoglu, Ozgur
收藏
  |  
浏览/下载:5/0
  |  
提交时间:2019/12/05
Hardware
security
logic gates
hamming distance
reverse engineering
HCIC: Hardware-Assisted Control-Flow Integrity Checking
期刊论文
IEEE Internet of Things Journal, 2019, 卷号: Vol.6 No.1, 页码: 458-471
作者:
Zhang, JL
;
Qi, BH
;
Qin, Z
;
Qu, G
收藏
  |  
浏览/下载:23/0
  |  
提交时间:2019/12/13
Runtime
Cryptography
Internet of Things
Malware
Programming
Resists
Code reuse attacks (CRAs)
control flow integrity (CFI)
hardware-assisted security
physical unclonable function (PUF)
An Architectural-Enhanced Secure Design in Embedded System
会议论文
Proceedings of the IEEE International Conference on Software Engineering and Service Sciences, ICSESS, 2018-11-23
作者:
Wang, X.
;
Xu, B.
;
Wang, W.
;
Zhang, Z.
;
Zhang, X.
收藏
  |  
浏览/下载:19/0
  |  
提交时间:2019/12/30
Cryptography
Hardware security
Intrusion detection
Software engineering
Architectural enhancement
Buffer overflows
Cryptographic algorithms
execution behavior
Memory authentication
Performance loss
Security solutions
Software and hardwares
Embedded systems
Hardware-Enhanced Protection for the Runtime Data Security in Embedded Systems
期刊论文
ELECTRONICS, 2019, 卷号: 8
作者:
Wang, Weike
;
Zhang, Xiaobing
;
Hao, Qiang
;
Zhang, Zhun
;
Xu, Bin
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
embedded system
data security
confidentiality
integrity
hardware-enhanced protection
A PCA and Mahalanobis distance-based detection method for logical hardware Trojan
期刊论文
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 卷号: 31
作者:
Huang, Jiaoying
;
Yang, Daming
;
Gao, Cheng
;
Fu, Chengcheng
收藏
  |  
浏览/下载:9/0
  |  
提交时间:2019/12/30
detection methods
hardware security
hardware trojans
side-channel analysis
©版权所有 ©2017 CSpace - Powered by
CSpace