咨询与建议

限定检索结果

文献类型

  • 31 篇 会议
  • 29 篇 期刊文献

馆藏范围

  • 60 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 41 篇 工学
    • 25 篇 计算机科学与技术...
    • 20 篇 软件工程
    • 8 篇 信息与通信工程
    • 5 篇 电子科学与技术(可...
    • 3 篇 机械工程
    • 3 篇 电气工程
    • 3 篇 控制科学与工程
    • 3 篇 生物医学工程(可授...
    • 2 篇 冶金工程
    • 2 篇 土木工程
    • 2 篇 交通运输工程
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 光学工程
    • 1 篇 动力工程及工程热...
  • 17 篇 理学
    • 10 篇 数学
    • 4 篇 生物学
    • 2 篇 物理学
    • 1 篇 化学
    • 1 篇 海洋科学
  • 10 篇 管理学
    • 7 篇 管理科学与工程(可...
    • 2 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 3 篇 法学
    • 1 篇 法学
    • 1 篇 社会学
    • 1 篇 公安学
  • 3 篇 医学
    • 3 篇 基础医学(可授医学...
    • 3 篇 临床医学
    • 3 篇 药学(可授医学、理...
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 农学

主题

  • 6 篇 cryptography
  • 5 篇 hardware
  • 4 篇 public key crypt...
  • 3 篇 deep learning
  • 3 篇 computer archite...
  • 3 篇 security
  • 3 篇 software
  • 2 篇 conferences
  • 2 篇 parallel process...
  • 2 篇 smart contract
  • 2 篇 computers
  • 2 篇 semantics
  • 2 篇 complexity theor...
  • 2 篇 concrete
  • 2 篇 polynomials
  • 2 篇 codes (symbols)
  • 2 篇 explosions
  • 2 篇 single cycle t-f...
  • 2 篇 delay
  • 1 篇 internet of thin...

机构

  • 11 篇 state key labora...
  • 4 篇 university of ch...
  • 4 篇 school of scienc...
  • 4 篇 key laboratory o...
  • 3 篇 school of comput...
  • 3 篇 computer archite...
  • 3 篇 department of ma...
  • 3 篇 security enginee...
  • 3 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 key laboratory o...
  • 2 篇 key laboratory o...
  • 2 篇 zhejiang police ...
  • 2 篇 key laboratory o...
  • 2 篇 huawei
  • 2 篇 institute of mic...
  • 2 篇 data security go...
  • 2 篇 institute of inf...
  • 2 篇 department of co...
  • 2 篇 international op...

作者

  • 6 篇 szefer jakub
  • 5 篇 biedermann sebas...
  • 4 篇 wang yan
  • 3 篇 guan xianglong
  • 3 篇 simha sethumadha...
  • 3 篇 zhang zhifei
  • 3 篇 katzenbeisser st...
  • 3 篇 chen cui
  • 3 篇 hu yu-pu
  • 3 篇 huang yunyou
  • 3 篇 xiaowei li
  • 3 篇 miao xiuxia
  • 3 篇 ma li
  • 2 篇 jing zhang
  • 2 篇 yuan feng
  • 2 篇 hui yu
  • 2 篇 jing ye
  • 2 篇 yang yang
  • 2 篇 xiaochun ye
  • 2 篇 tang suqin

语言

  • 58 篇 英文
  • 2 篇 中文
检索条件"机构=Computer Architecture and Security Laboratory"
60 条 记 录,以下是1-10 订阅
排序:
Block-gram:Mining knowledgeable features for efficiently smart contract vulnerability detection
收藏 引用
Digital Communications and Networks 2025年 第1期11卷 1-12页
作者: Xueshuo Xie Haolong Wang Zhaolong Jian Yaozheng Fang Zichun Wang Tao Li Tianjin Key Laboratory of Network and Data Security Technology TianjinChina College of Computer Science Nankai UniversityTianjinChina Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province China State Key Laboratory of Computer Architecture Institute of Computing TechnologyChinese Academy of SciencesChina
Smart contracts are widely used on the blockchain to implement complex transactions,such as decentralized applications on *** vulnerability detection of large-scale smart contracts is critical,as attacks on smart cont... 详细信息
来源: 评论
An alert-situation text data augmentation method based on MLM
收藏 引用
High Technology Letters 2024年 第4期30卷 389-396页
作者: DING Weijie MAO Tingyun CHEN Lili ZHOU Mingwei YUAN Ying HU Wentao Department of Computer and Information Security Zhejiang Police CollegeHangzhou 310053P.R.China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityHangzhou 310053P.R.China Zhejiang Dahua Technology Co. LtdHangzhou 310053P.R.China
The performance of deep learning models is heavily reliant on the quality and quantity of train-ing *** training data will lead to ***,in the task of alert-situation text classification,it is usually difficult to obta... 详细信息
来源: 评论
Source Camera Identification Algorithm Based on Multi-Scale Feature Fusion
收藏 引用
computers, Materials & Continua 2024年 第8期80卷 3047-3065页
作者: Jianfeng Lu Caijin Li Xiangye Huang Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Shangyu Institute of Science and Engineering Hangzhou Dianzi UniversityShaoxing312300China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
The widespread availability of digital multimedia data has led to a new challenge in digital *** source camera identification algorithms usually rely on various traces in the capturing ***,these traces have become inc... 详细信息
来源: 评论
Image inpainting via Smooth Tucker decomposition and Low-rank Hankel constraint
收藏 引用
International Journal of computers and Applications 2023年 第6期45卷 421-432页
作者: Cai, Jing Jiang, Jiawei Wang, Yibing Zheng, Jianwei Xu, Honghui Department of Forensic Science Zhejiang Police College Hangzhou China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Hangzhou China College of Computer Science and Technology Zhejiang University of Technology Hangzhou China
Image inpainting, aiming at exactly recovering missing pixels from partially observed entries, is typically an ill-posed problem. As a powerful constraint, low-rank priors have been widely applied in image inpainting ... 详细信息
来源: 评论
Rail Transit Event Extraction based on the Fusion of Semantic and Local Dependency Features  15
Rail Transit Event Extraction based on the Fusion of Semanti...
收藏 引用
15th IEEE International Conference on Knowledge Graph, ICKG 2024
作者: Chen, Qiang Meng, Haining Bao, Yihao Yang, Mingsong Tong, Xinyu Zhao, Qin Khan, Muhammad Bilal Hei, Xinhong Xi'an University of Technology School of Computer Science and Engineering Xi'an China Xi'an University of Technology School of Computer Science and Engineering Shaanxi Key Laboratory of Network Computing and Security Technology Xi'an China Xi'an University of Technology School of Civil Engineering and Architecture Xi'an China
Event extraction in rail transit plays a vital role in all stages of design, construction, and final acceptance. Event extraction is a key part of building event logic graph (ELG). However, the difficulty in obtaining... 详细信息
来源: 评论
Block-gram: Mining Knowledgeable Features for Smart Contract Vulnerability Detection  7th
Block-gram: Mining Knowledgeable Features for Smart Contrac...
收藏 引用
7th International Conference on Smart Computing and Communication, SmartCom 2022
作者: Li, Tao Wang, Haolong Fang, Yaozheng Jian, Zhaolong Wang, Zichun Xie, Xueshuo Tianjin Key Laboratory of Network and Data Security Technology Tianjin China College of Computer Science Nankai University Tianjin China Key Laboratory of Blockchain and Cyberspace Governance of Zhejiang Province Hangzhou China State Key Laboratory of Computer Architecture Institute of Computing Technology Chinese Academy of Sciences Beijing China
Effective vulnerability detection of large-scale smart contracts is critical because smart contract attacks frequently bring about tremendous economic loss. However, code analysis requiring traversal paths and learnin... 详细信息
来源: 评论
A Sketch-Based Generation Model for Diverse Ceramic Tile Images Using Generative Adversarial Network
收藏 引用
Intelligent Automation & Soft Computing 2023年 第9期37卷 2865-2882页
作者: Jianfeng Lu Xinyi Liu Mengtao Shi Chen Cui Mahmoud Emam School of Computer Science and Technology Hangzhou Dianzi UniversityHangzhou310018China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310000China Faculty of Artificial Intelligence Menoufia UniversityShebin El-Koom32511Egypt
Ceramic tiles are one of the most indispensable materials for interior *** ceramic patterns can’t match the design requirements in terms of diversity and interactivity due to their natural *** this paper,we propose a... 详细信息
来源: 评论
The differential fault analysis on block cipher FeW
收藏 引用
Cybersecurity 2023年 第2期6卷 62-74页
作者: Haiyan Xiao Lifang Wang Jinyong Chang School of Computer Science Northwestern Polytechnical UniversityXiAn 710055People's Republic of China Engineering University of PAP XiAn 710055People's Republic of China School of Information and Control Engineering XiAn University of Architecture and TechnologyXi'An 710055People's Republic of China State Key Laboratory of Information Security(SKLOIS) Institute of Information EngineeringChinese Academy of SciencesBeijing 100089People's Republic of China
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achi... 详细信息
来源: 评论
A Lightweight Convolutional Neural Network with Representation Self-challenge for Fingerprint Liveness Detection
收藏 引用
computers, Materials & Continua 2022年 第10期73卷 719-733页
作者: Jie Chen Chengsheng Yuan Chen Cui Zhihua Xia Xingming Sun Thangarajah Akilan School of Computer Science Nanjing University of Information Science and TechnologyNanjing210044China Key Laboratory of Public Security Information Application Based on Big-Data Architecture Ministry of Public SecurityZhejiang Police CollegeHangzhou310053China Jiangsu Yuchi Blockchain Research Institute Nanjing210044China Department of Software Engineering Lakehead UniversityThunder BayON P7B 5E1Canada
Fingerprint identification systems have been widely deployed in many occasions of our daily ***,together with many advantages,they are still vulnerable to the presentation attack(PA)by some counterfeit *** address cha... 详细信息
来源: 评论
Discrete Jaya algorithm to solve the police resource deployment problem in emergency traffic accident  10
Discrete Jaya algorithm to solve the police resource deploym...
收藏 引用
10th IEEE Joint International Information Technology and Artificial Intelligence Conference, ITAIC 2022
作者: Jing, Zhang Weijie, Ding Zhejiang Police College Department of Computer and Information Security Hangzhou310053 China Big-data and Network Security Research Institute Zhejiang Police College Hangzhou310053 China College of Information Engineering Zhejiang University of Technology Hangzhou310023 China Key Laboratory of Public Security Information Application Based on Big-data Architecture Ministry of Public Security Hangzhou310053 China
Aiming at the high frequency of urban traffic accidents and the relative shortage of police resources, a multi-objective discrete Jaya algorithm is proposed to solve the problem of police resource deployment in emerge... 详细信息
来源: 评论