咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 85 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 45 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 14 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 5 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 动力工程及工程热...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 20 篇 理学
    • 17 篇 数学
    • 7 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 12 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 blockchain
  • 5 篇 data privacy
  • 5 篇 security
  • 5 篇 game theory
  • 5 篇 cloud computing
  • 5 篇 privacy
  • 4 篇 authentication
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 computational mo...
  • 3 篇 smart contract
  • 3 篇 feature extracti...
  • 3 篇 protocols
  • 3 篇 encryption
  • 3 篇 robustness
  • 2 篇 smart contracts
  • 2 篇 deep learning
  • 2 篇 channel capacity
  • 2 篇 graph neural net...
  • 2 篇 differential pri...

机构

  • 17 篇 state key labora...
  • 11 篇 advanced cryptog...
  • 8 篇 guangxi key labo...
  • 8 篇 institute of cry...
  • 7 篇 guizhou universi...
  • 6 篇 school of cybers...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 5 篇 state key labora...
  • 5 篇 weifang universi...
  • 4 篇 dazhou key labor...
  • 4 篇 fujian provincia...
  • 4 篇 guangxi key labo...
  • 4 篇 blockchain labor...
  • 3 篇 guangxi key labo...
  • 3 篇 school of cyber ...
  • 3 篇 institute of cry...
  • 3 篇 institute of cry...
  • 2 篇 college of big d...
  • 2 篇 school of crypto...

作者

  • 12 篇 chen yuling
  • 12 篇 tian youliang
  • 9 篇 youliang tian
  • 5 篇 huang yuanyuan
  • 5 篇 wu yongtang
  • 5 篇 li tao
  • 5 篇 yuanyuan huang
  • 4 篇 xiong jinbo
  • 3 篇 tan weijie
  • 3 篇 lu jiazhong
  • 3 篇 ma jianfeng
  • 3 篇 yang kedi
  • 3 篇 qian xiaobin
  • 3 篇 changgen peng
  • 3 篇 wang yilei
  • 3 篇 zhou huiyu
  • 2 篇 wang chenli
  • 2 篇 min tang
  • 2 篇 baohua qiang
  • 2 篇 jiazhong lu

语言

  • 81 篇 英文
  • 4 篇 其他
检索条件"机构=Cryptography and Data Security Laboratory"
85 条 记 录,以下是1-10 订阅
排序:
A verifiable essential secret image sharing scheme based on HLRs(VESIS-(t,s,k,n))
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第2期9卷 388-410页
作者: Massoud Hadian Dehkordi Seyed Taghi Farahi Samaneh Mashhadi Cryptography and Data Security Laboratory School of MathematicsIran University of Science and TechnologyNarmakTehranIran
In traditional secret image sharing schemes,a secret image is shared among shareholders who have the same *** if the shareholders have two different positions,essential and non‐essential,it is necessary to use essent... 详细信息
来源: 评论
Integer wavelet transform-based secret image sharing using rook polynomial and hamming code with authentication
收藏 引用
CAAI Transactions on Intelligence Technology 2024年 第6期9卷 1435-1450页
作者: Sara Charoghchi Zahra Saeidi Samaneh Mashhadi Cryptography and Data Security Laboratory School of Mathematics and Computer ScienceIran University of Science&TechnologyTehranIran
As an effective way to securely transfer secret images,secret image sharing(SIS)has been a noteworthy area of *** in a SIS scheme,a secret image is shared via shadows and could be reconstructed by having the required ... 详细信息
来源: 评论
Blockchain and signcryption enabled asynchronous federated learning framework in fog computing
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 442-454页
作者: Zhou Zhou Youliang Tian Jinbo Xiong Changgen Peng Jing Li Nan Yang State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang 550025China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber SecurityFujian Normal UniversityFuzhou 350117China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China
Federated learning combines with fog computing to transform data sharing into model sharing,which solves the issues of data isolation and privacy disclosure in fog ***,existing studies focus on centralized single-laye... 详细信息
来源: 评论
Enhanced Privacy-Preserving WiFi Fingerprint Localization from CL Encryption
收藏 引用
Chinese Journal of Electronics 2024年 第6期33卷 1435-1446页
作者: Zhiwei WANG Qiuchi ZHU Zhenqi ZHANG School of Computer Nanjing University of Posts and Telecommunications State Key Laboratory of Public Big Data Guizhou University Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu University of Information Engineering Key Laboratory of Computational Science and Application of Hainan Province Hainan Normal University
The WiFi fingerprint-based localization method is considered one of the most popular techniques for indoor localization. In INFOCOM'14, Li et al. proposed a wireless fidelity(WiFi) fingerprint localization system ... 详细信息
来源: 评论
DBKEM-AACS: a distributed key escrow model in blockchain with anonymous authentication and committee selection
收藏 引用
Science China(Information Sciences) 2023年 第3期66卷 289-290页
作者: Axin XIANG Hongfeng GAO Youliang TIAN Liang WAN College of Computer Science and Technology Guizhou University Institute of Cryptography and Data Security Guizhou University Network and Information Management Center Guizhou University State Key Laboratory of Public Big Data Guizhou University Institute of Computer Software and Theory Guizhou University
Dear editor, Key security is of great practical significance and demand to guarantee the security of digital assets in the blockchain system. At present, users prefer to escrow their assets on centralized institutions...
来源: 评论
Vertical Federated Learning Based on Consortium Blockchain for data Sharing in Mobile Edge Computing
收藏 引用
Computer Modeling in Engineering & Sciences 2023年 第10期137卷 345-361页
作者: Yonghao Zhang Yongtang Wu Tao Li Hui Zhou Yuling Chen State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang262700China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin541004China
The data in Mobile Edge Computing(MEC)contains tremendousmarket value,and data sharing canmaximize the usefulness of the ***,certain data is quite sensitive,and sharing it directly may violate *** Federated Learning(V... 详细信息
来源: 评论
An insider user authentication method based on improved temporal convolutional network
收藏 引用
High-Confidence Computing 2023年 第4期3卷 87-95页
作者: Xiaoling Tao Yuelin Yu Lianyou Fu Jianxiang Liu Yunhao Zhang Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin 541004China Guangxi Cooperative Innovation Center of Cloud Computing and Big Data Guilin University of Electronic TechnologyGuilin 541004China
With the rapid development of information technology,information system security and insider threat detection have become important topics for organizational *** the current network environment,user behavioral bio-dat... 详细信息
来源: 评论
Differential Privacy Face Image Publishing Method Based on Neighboring Pixels Merging  21
Differential Privacy Face Image Publishing Method Based on N...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Lang, Ming Yongli, Wang Yuanyuan, Huang Junyu, Chen School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Dazhou Key Laboratory of Government Data Security Dazhou635000 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China
Face images contain rich and sensitive personal information. Direct release of facial images on the Internet may lead to the disclosure of personal information. In order to protect the privacy information in facial im... 详细信息
来源: 评论
An Embedding-Based Multi-Modal Few-Shot Learning Method for Network Intrusion Detection  21
An Embedding-Based Multi-Modal Few-Shot Learning Method for ...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Qiulin, He Jinquan, Zhang Yuanyuan, Huang School of Cybersecurity Xin Gu Industrial College Chengdu University of Information Technology Chengdu610225 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Dazhou Key Laboratory Government Data Security Dazhou635000 China
In this paper, we introduce an embedding-based few-shot learning framework, aiming to achieve classification by calculating the similarity measure between unknown samples and known samples in the embedding space. This... 详细信息
来源: 评论
Attacks Against Cross-Chain Systems and Defense Approaches:A Contemporary Survey
收藏 引用
IEEE/CAA Journal of Automatica Sinica 2023年 第8期10卷 1647-1667页
作者: Li Duan Yangyang Sun Wei Ni Weiping Ding Jiqiang Liu Wei Wang IEEE the Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing 100044China the Guangxi Key Laboratory of Cryptography and Information Security Guilin 541004China the Communications and Signal Processing Team Data61 Business UnitCommonwealth Scientific and Industrial Research Organisation(CSIRO)Sydney NSW 2109Australia the School of Information Science and Technology Nantong UniversityNantong 226019China
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain ***-chain overcomes the“information island”problem of the closed blockchain networ... 详细信息
来源: 评论