Edge Network Routing Protocol Base on Target Tracking Scenario
Zhang, Zhongyi, Zhao, Weihua, Huang, Ouhan, Jia, Gangyong, Li, Youhuizi, Mei, Songzhu, Zhao, Duan
Published in Mobile networks and applications (01.12.2021)
Published in Mobile networks and applications (01.12.2021)
Get full text
Journal Article
Astrape: An Efficient Concurrent Cloud Attestation with Ciphertext-Policy Attribute-Based Encryption
Ba, Haihe, Zhou, Huaizhe, Mei, Songzhu, Qiao, Huidong, Hong, Tie, Wang, Zhiying, Ren, Jiangchun
Published in Symmetry (Basel) (01.10.2018)
Published in Symmetry (Basel) (01.10.2018)
Get full text
Journal Article
Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing
Mei, Songzhu, Wang, Zhiying, Cheng, Yong, Ren, Jiangchun, Wu, Jiangjiang, Zhou, Jie
Published in International journal of computational intelligence systems (01.09.2012)
Published in International journal of computational intelligence systems (01.09.2012)
Get full text
Journal Article
RiskQ: Risk-sensitive Multi-Agent Reinforcement Learning Value Factorization
Shen, Siqi, Ma, Chennan, Li, Chao, Liu, Weiquan, Fu, Yongquan, Songzhu Mei, Liu, Xinwang, Wang, Cheng
Published in arXiv.org (21.03.2024)
Published in arXiv.org (21.03.2024)
Get full text
Paper
Journal Article
Optimizing Irregular-Shaped Matrix-Matrix Multiplication on Multi-Core DSPs
Yin, Shangfei, Wang, Qinglin, Ruochen Hao, Zhou, Tianyang, Songzhu Mei, Liu, Jie
Published in arXiv.org (11.08.2022)
Published in arXiv.org (11.08.2022)
Get full text
Paper
Journal Article
Towards Effective Depthwise Convolutions on ARMv8 Architecture
Ruochen Hao, Wang, Qinglin, Yin, Shangfei, Zhou, Tianyang, Shen, Siqi, Songzhu Mei, Liu, Jie
Published in arXiv.org (24.06.2022)
Published in arXiv.org (24.06.2022)
Get full text
Paper
Journal Article
Dynamic Trusted Domain: Preventing Data Leakage of Trusted Subjects
Cheng, Yong, Wu, Jiang Jiang, Ma, Jun, Ren, Jiang Chun, Wang, Zhi Ying, Mei, Song Zhu
Published in Applied Mechanics and Materials (01.02.2011)
Published in Applied Mechanics and Materials (01.02.2011)
Get full text
Journal Article
Evaluating FFT-based algorithms for strided convolutions on ARMv8 architectures
Huang, Xiandong, Wang, Qinglin, Lu, Shuyu, Hao, Ruochen, Mei, Songzhu, Liu, Jie
Published in Performance evaluation (01.12.2021)
Published in Performance evaluation (01.12.2021)
Get full text
Journal Article
High performance dilated convolutions on multi-core DSPs
Wang, Yang, Wang, Qinglin, Pei, Xiangdong, Mei, Songzhu, Li, Rongchun, Liu, Jie
Published in CCF transactions on high performance computing (Online) (01.02.2024)
Published in CCF transactions on high performance computing (Online) (01.02.2024)
Get full text
Journal Article
Optimizing Irregular-Shaped Matrix-Matrix Multiplication on Multi-Core DSPs
Yin, Shangfei, Wang, Qinglin, Hao, Ruochen, Zhou, Tianyang, Mei, Songzhu, Liu, Jie
Published in 2022 IEEE International Conference on Cluster Computing (CLUSTER) (01.09.2022)
Published in 2022 IEEE International Conference on Cluster Computing (CLUSTER) (01.09.2022)
Get full text
Conference Proceeding
Attributes Union in CP-ABE Algorithm for Large Universe Cryptographic Access Control
Yong Cheng, Jiangchun Ren, Zhiying Wang, Songzhu Mei, Jie Zhou
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Get full text
Conference Proceeding
TETPA: A case for trusted third party auditor in Cloud environment
Songzhu Mei, Cong Liu, Cheng, Yong, Wu, Jiangjiang, Wang, Zhiying
Published in IEEE Conference Anthology (01.01.2013)
Published in IEEE Conference Anthology (01.01.2013)
Get full text
Conference Proceeding
An Active Data Leakage Prevention Model for Insider Threat
Jiangjiang Wu, Jie Zhou, Jun Ma, Songzhu Mei, Jiangchun Ren
Published in 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (01.10.2011)
Published in 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing (01.10.2011)
Get full text
Conference Proceeding
Re-encryption Optimization in CP-ABE Based Cryptographic Cloud Storage
Yong Cheng, Jiangchun Ren, Zhiying Wang, Songzhu Mei, Jie Zhou
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Published in 2012 Second International Conference on Cloud and Green Computing (01.11.2012)
Get full text
Conference Proceeding