Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Survey of research on confidential computing
D Feng, Y Qin, W Feng, W Li, K Shang… - IET …, 2024 - Wiley Online Library
As the global data strategy deepens and data elements accelerate integrating and flowing
more rapidly, the demand for data security and privacy protection has become increasingly …
more rapidly, the demand for data security and privacy protection has become increasingly …
A survey of recent attacks and mitigation on FPGA systems
The emergence of a large variety of compute-intensive applications has made hardware
accelerators a new necessity to deploy the corresponding high-complexity algorithms, such …
accelerators a new necessity to deploy the corresponding high-complexity algorithms, such …
CRONUS: Fault-isolated, secure and high-performance heterogeneous computing for trusted execution environment
With the trend of processing a large volume of sensitive data on PaaS services (eg, DNN
training), a TEE architecture that supports general heterogeneous accelerators, enables …
training), a TEE architecture that supports general heterogeneous accelerators, enables …
A survey on FPGA cybersecurity design strategies
This article presents a critical literature review on the security aspects of field-programmable
gate array (FPGA) devices. FPGA devices present unique challenges to cybersecurity …
gate array (FPGA) devices. FPGA devices present unique challenges to cybersecurity …
Building your own trusted execution environments using fpga
Despite of their benefits, existing Trusted Execution Environments (TEE) or enclaves have
been criticized for lack of transparency, vulnerabilities, and various restrictions. A significant …
been criticized for lack of transparency, vulnerabilities, and various restrictions. A significant …
Securing AI Inference in the Cloud: Is CPU-GPU Confidential Computing Ready?
Many applications have been offloaded onto cloud environments to achieve higher agility,
access to more powerful computational resources, and obtain better infrastructure …
access to more powerful computational resources, and obtain better infrastructure …
Machine learning with confidential computing: A systematization of knowledge
Privacy and security challenges in Machine Learning (ML) have become increasingly
severe, along with ML's pervasive development and the recent demonstration of large attack …
severe, along with ML's pervasive development and the recent demonstration of large attack …
[HTML][HTML] Enhancing the security and privacy in the IoT supply chain using blockchain and federated learning with trusted execution environment
L Zhu, S Hu, X Zhu, C Meng, M Huang - Mathematics, 2023 - mdpi.com
Federated learning has emerged as a promising technique for the Internet of Things (IoT) in
various domains, including supply chain management. It enables IoT devices to …
various domains, including supply chain management. It enables IoT devices to …
Decentralized translator of trust: Supporting heterogeneous tee for critical infrastructure protection
Trusted execution environment (TEE) technology has found many applications in mitigating
various security risks in an efficient manner, which is attractive for critical infrastructure …
various security risks in an efficient manner, which is attractive for critical infrastructure …
Run-Time Self Attestation of FPGA Based IoT Devices
Flexibility and reconfigurability make field-programmable gate arrays (FPGAs) ideal for IoT
applications because they enable efficient customization and optimization of hardware …
applications because they enable efficient customization and optimization of hardware …