[PDF][PDF] Downrange: A Survey of China's Cyber Ranges

D Cary - Center for Security and Emerging Technology …, 2022 - app-us-east-1.t-cdn.net
… Zhejiang Lab’s work is varied, including both traditional cybersecurity work and more
cutting-edge research at the intersection of AI and software security. Job postings on the Zhejiang …

[PDF][PDF] Security Testing of Visual Perception Module in Autonomous Driving System

W Hao, W Hao, S Xing, L Minghao… - Journal of Computer …, 2021 - suxnju.github.io
… Aiming at testing the security of the visual perception module of autonomous driving, we …
-driven security testing system. Our work proposes a flexible scene description method that …

3.5 層人工智慧邊緣運算物聯網閘道器及其在步態辨識和行人重識別的應用

劉肇資 - 2022 - ir.lib.ncu.edu.tw
… and scales, and the software cannot connect to the cloud because of privacy and … can run
AI applications is required. We propose a 3.5-tier AI Internet of Things (AIoT) edge computing (…

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… Then the authors systematically study the three primary technology Machine learnArtificial
intelligence ing(ML), Artificial intelligence (AI), and Blockchain for addressing the security

煤矿安全生产视频AI 识别关键技术研究综述

程德强, 钱建生, 郭星歌, 寇旗旗, 徐飞翔, 顾军… - 煤炭科学技术, 2023 - mtkxjs.com.cn
… database security, inconsistent evaluationtechnologies and theories of video AI recognition,
establish and improve intelligent terminal hardware specifications and applicable systems

[PDF][PDF] Addressing Security and Computation TS Challenges in IoT Using Machine 醫官Learning

BK Mohanta, U Satapathy, D Jena - researchgate.net
… and computing. So, some related technique like fog computing and cloud computing is used
to … based on machine learning: how do IoT devices use AI to enhance security? IEEE Signal …

應用於先進輔助駕駛系統之即時影像處理積體電路與系統設計

TK CHI - 中原大學電子工程學系學位論文, 2023 - airitilibrary.com
… Deep Learning Processing Unit (DPU) for AI model computation, as well as the UART interface
… verified, ensuring the stable operation of the system. The evaluation methods and design …

[PDF][PDF] 移动边缘计算中计算卸载方案研究综述

张依琳, 梁玉珠, 尹沐君, 全韩彧, 王田, 贾维嘉 - 计算机学报, 2021 - cjc.ict.ac.cn
computation offloading schemes based on the underlying Artificial Intelligence (AI) technologies.
… which include mobility of end devices, edge servers, security, user privacy data, and …

元宇宙技术综述

王文喜, 周芳, 万月亮, 宁焕生 - 工程科学学报, 2022 - cje.ustb.edu.cn
… 元宇宙将会大量使用人工智能( Artificial intelligence, AI)算法(如机器学习,深度学习,强 化学习
等). AI 三要素,即数据,算法及算力,对元 宇宙的建立及发展具有关键性的作用,助力实现 超越现实…

矿边智能: 智能矿山边缘侧建设新趋势

赵子瑜, 毕林 - 黄金科学技术, 2024 - goldsci.ac.cn
… of advanced communication technologies and network … and secure data transmission
between the “cloud”,“edge” and “end”.The edge security technology focuses on protecting edge