消息
×
loading..
×
验证码:
换一张
忘记密码?
记住我
×
统一认证登录
登录
中文版
|
English
上海科技大学知识管理系统
ShanghaiTech University Knowledge Management System
统一认证登录
登录
注册
ALL
ORCID
题名
作者
发表日期
关键词
文献类型
DOI
出处
存缴日期
收录类别
出版者
学习讨论厅
图片搜索
粘贴图片网址
首页
研究单元&专题
作者
文献类型
学科分类
知识图谱
知识整合
学习讨论厅
在结果中检索
研究单元&专题
信息科学与技术学院 [8]
作者
何静竹 [2]
陈宇奇 [2]
杨智策 [1]
哈亚军 [1]
姜伟雄 [1]
谭惠予 [1]
更多...
文献类型
期刊论文 [6]
会议论文 [3]
发表日期
2025 [3]
2024 [3]
2023 [1]
2022 [1]
2020 [1]
出处
ACM TRANSA... [1]
COMPUTER N... [1]
IACR TRANS... [1]
IEEE INTER... [1]
IEEE TRANS... [1]
PROCEEDING... [1]
更多...
语种
英语 [9]
资助项目
NSA Scienc... [2]
Distinguis... [1]
Fundamenta... [1]
National N... [1]
Shanghai S... [1]
State Key ... [1]
更多...
资助机构
收录类别
EI [9]
CPCI-S [2]
SCI [2]
状态
已发表 [9]
×
知识图谱
KMS
反馈留言
浏览/检索结果:
共9条,第1-9条
帮助
已选(
0
)
清除
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
发表日期升序
发表日期降序
期刊影响因子升序
期刊影响因子降序
提交时间升序
提交时间降序
WOS被引频次升序
WOS被引频次降序
作者升序
作者降序
MMJ-Bench: A Comprehensive Study on Jailbreak Attacks and Defenses for Vision Language Models
会议论文
PROCEEDINGS OF THE AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE, Philadelphia, PA, United states, February 25, 2025 - March 4, 2025
作者:
Weng, Fenghua
;
Xu, Yue
;
Fu, Chengyan
;
Wang, Wenjie
Adobe PDF(818Kb)
|
收藏
|
浏览/下载:3/1
|
提交时间:2025/06/17
Visual languages
Comprehensive evaluation
Information channels
Language model
Model response
Modeling process
Multi-modal
Performance
Real-world task
Security challenges
Various attacks
SFACIF: A safety function attack and anomaly industrial condition identified framework
期刊论文
COMPUTER NETWORKS, 2025, 卷号: 257
作者:
Liu, Kaixiang
;
Xie, Yongfang
;
Chen, Yuqi
;
Xie, Shiwen
Adobe PDF(2049Kb)
|
收藏
|
浏览/下载:231/3
|
提交时间:2024/12/13
Cyber attacks
Network security
Anomaly detection
Basic process control systems
Benchmark data
Industrial conditions
Physical faults
Process industries
Safety and stabilities
Safety function attack
Safety functions
Safety instrumented systems
A Deep Investigation on Stealthy DVFS Fault Injection Attacks at DNN Hardware Accelerators
期刊论文
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, 2025, 卷号: 44, 期号: 1, 页码: 39-51
作者:
Junge Xu
;
Fan Zhang
;
Wenguang Jin
;
Kun Yang
;
Zeke Wang
Adobe PDF(2572Kb)
|
收藏
|
浏览/下载:325/4
|
提交时间:2024/07/15
Acceleration
Deep neural networks
Dynamic frequency scaling
Field programmable gate arrays (FPGA)
Frequency converters
Image recognition
Network security
Software testing
Timing circuits
Voltage scaling
Circuit faults
Deep learning
Deep learning accelerator
Digital converters
Dynamic voltage and frequency scaling
Fault injection attacks
Field programmable gate array
Field programmables
Hardware acceleration
Programmable gate array
Time-to-digital
Time-to-digital converter
SAT-based Formal Verification of Fault Injection Countermeasures for Cryptographic Circuits∗
期刊论文
IACR TRANSACTIONS ON CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS, 2024, 卷号: 2024, 期号: 4, 页码: 1-39
作者:
Tan, Huiyu
;
Gao, Pengfei
;
Song, Fu
;
Chen, Taolue
Adobe PDF(1591Kb)
|
收藏
|
浏览/下载:209/1
|
提交时间:2024/10/11
Benchmarking
Network security
Open source software
Systems analysis
Cryptographic circuit
CryptoGraphics
Design and implementations
Error prones
Fault injection
Fault injection attacks
Fault resistances
Physical attacks
Satisfiability
Verification problems
Self-Supervised Machine Learning Framework for Online Container Security Attack Detection
期刊论文
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2024, 卷号: 19, 期号: 3
作者:
Tunde-Onadele, Olufogorehan
;
Lin, Yuhang
;
Gu, Xiaohui
Adobe PDF(22391Kb)
|
收藏
|
浏览/下载:249/3
|
提交时间:2024/10/25
Adversarial machine learning
Contrastive Learning
Federated learning
Semi-supervised learning
Unsupervised learning
Additional key word and phrasesperformance debugging
Attack detection
Causal analysis
Hybrid learning
Key words
Learning frameworks
Learning schemes
Microservice
Security attacks
Supervised machine learning
Detecting Cyber-Attacks Against Cyber-Physical Manufacturing System: A Machining Process Invariant Approach
期刊论文
IEEE INTERNET OF THINGS JOURNAL, 2024, 卷号: 11, 期号: 10, 页码: 17602-17614
作者:
Li, Zedong
Adobe PDF(4650Kb)
|
收藏
|
浏览/下载:1474/1
|
提交时间:2024/02/23
Industrial Internet of Things
Cyber-Physical Manufacturing Systems
Computer Numerical Control
Intrusion Detection
Cyber Attack
Codes (symbols)
Computer control systems
Computer crime
Crime
Cyber attacks
Internet of things
Machining centers
Network security
Numerical control systems
Process control
Code
Computer numerical control
Cybe-physical manufacturing system
Cyber physicals
Cyber-attacks
Industrial internet of thing
Intrusion-Detection
Numerical control
Spoofing Real-world Face Authentication Systems through Optical Synthesis
会议论文
PROCEEDINGS - IEEE SYMPOSIUM ON SECURITY AND PRIVACY, Hybrid, San Francisco, CA, United states, May 22, 2023 - May 25, 2023
作者:
Yueli Yan
;
Zhice Yang
Adobe PDF(2840Kb)
|
收藏
|
浏览/下载:384/0
|
提交时间:2023/08/18
Authentication
Display devices
Security systems
Authorized users
Camera view
Face authentication system
Multi-modal
Multiple modalities
Optical-
Physical aspects
Real-world
Scene generator
Spoofing attacks
SHIL: Self-Supervised Hybrid Learning for Security Attack Detection in Containerized Applications
会议论文
PROCEEDINGS - 2022 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS, ACSOS 2022, Virtual, Online, United states, September 19, 2022 - September 23, 2022
作者:
Lin, Yuhang
;
Tunde-Onadele, Olufogorehan
;
Gu, Xiaohui
Adobe PDF(1358Kb)
|
收藏
|
浏览/下载:385/0
|
提交时间:2022/12/02
Errors
Learning systems
Supervised learning
Attack detection
Container security
Data labelling
Hybrid learning
Hybrid machine learning
Learning schemes
Security attack detection
Security attacks
Supervised machine learning
Unsupervised machine learning
BTDS: Bayesian-based trust decision scheme for intelligent connected vehicles in VANETs
期刊论文
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 卷号: 31, 期号: 12
作者:
Adobe PDF(1024Kb)
|
收藏
|
浏览/下载:183/0
|
提交时间:2022/12/09
Vehicular ad hoc networks
Sensor networks
Bayesian networks
Network security
Cybersecurity
Automotive industry
Beta distributions
Cyber security
Internal attacks
Security attacks
Simulation studies
Trust
Trust management model
Vehicle ad-hoc networks
首页
上一页
1
下一页
末页