咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 35 篇 期刊文献

馆藏范围

  • 85 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 54 篇 工学
    • 45 篇 计算机科学与技术...
    • 29 篇 软件工程
    • 14 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 5 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 动力工程及工程热...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
    • 1 篇 土木工程
  • 20 篇 理学
    • 17 篇 数学
    • 7 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 12 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 7 篇 blockchain
  • 5 篇 data privacy
  • 5 篇 security
  • 5 篇 game theory
  • 5 篇 cloud computing
  • 5 篇 privacy
  • 4 篇 authentication
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 computational mo...
  • 3 篇 smart contract
  • 3 篇 feature extracti...
  • 3 篇 protocols
  • 3 篇 encryption
  • 3 篇 robustness
  • 2 篇 smart contracts
  • 2 篇 deep learning
  • 2 篇 channel capacity
  • 2 篇 graph neural net...
  • 2 篇 differential pri...

机构

  • 17 篇 state key labora...
  • 11 篇 advanced cryptog...
  • 8 篇 guangxi key labo...
  • 8 篇 institute of cry...
  • 7 篇 guizhou universi...
  • 6 篇 school of cybers...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 5 篇 state key labora...
  • 5 篇 weifang universi...
  • 4 篇 dazhou key labor...
  • 4 篇 fujian provincia...
  • 4 篇 guangxi key labo...
  • 4 篇 blockchain labor...
  • 3 篇 guangxi key labo...
  • 3 篇 school of cyber ...
  • 3 篇 institute of cry...
  • 3 篇 institute of cry...
  • 2 篇 college of big d...
  • 2 篇 school of crypto...

作者

  • 12 篇 chen yuling
  • 12 篇 tian youliang
  • 9 篇 youliang tian
  • 5 篇 huang yuanyuan
  • 5 篇 wu yongtang
  • 5 篇 li tao
  • 5 篇 yuanyuan huang
  • 4 篇 xiong jinbo
  • 3 篇 tan weijie
  • 3 篇 lu jiazhong
  • 3 篇 ma jianfeng
  • 3 篇 yang kedi
  • 3 篇 qian xiaobin
  • 3 篇 changgen peng
  • 3 篇 wang yilei
  • 3 篇 zhou huiyu
  • 2 篇 wang chenli
  • 2 篇 min tang
  • 2 篇 baohua qiang
  • 2 篇 jiazhong lu

语言

  • 81 篇 英文
  • 4 篇 其他
检索条件"机构=Cryptography and Data Security Laboratory"
85 条 记 录,以下是11-20 订阅
排序:
Spiderweb Protector: Biomimetic Defense Against Targeted Attacks on Graph Neural Networks  21
Spiderweb Protector: Biomimetic Defense Against Targeted Att...
收藏 引用
21st International Computer Conference on Wavelet Active Media Technology and Information Processing, ICCWAMTIP 2024
作者: Zhou, Zeyu Huang, Yuanyuan Wang, Yongli Li, Siyu Lu, Jiazhong He, Peilin Chengdu University of Information Technology Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610225 China Dazhou Key Laboratory Government Data Security Dazhou635000 China University of Pittsburgh Department of Informatics and Networked Systems Pittsburgh15260 United States
Graph Neural Networks (GNNs) have emerged as powerful tools across diverse applications, including social networks, bioinformatics, and recommendation systems. However, their susceptibility to adversarial attacks, par... 详细信息
来源: 评论
VFLF: A verifiable federated learning framework against malicious aggregators in Industrial Internet of Things
VFLF: A verifiable federated learning framework against mali...
收藏 引用
作者: Zhou, Zhou Tian, Youliang Peng, Changgen Yang, Nan Long, Shigong State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang China Institute of Cryptography and Data Security Guizhou University Guizhou Guiyang China
As an important approach to overcome data silos and privacy concerns in deep learning, federated learning, which can jointly train the global model and keep data local, has shown remarkable performance in a range of i... 详细信息
来源: 评论
Sharing of Encrypted Lock Keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption
收藏 引用
China Communications 2022年 第5期19卷 164-177页
作者: Zhiwei Wang Liping Qian Danwei Chen Guozi sun School of Computer Nanjing University of Posts and TelecommunicationsNanjing 210023China Jiangsu Key Laboratory of Big Data Security and Intelligent Processing Nanjing 210023China Guangxi Key Laboratory of Cryptography and Information Security Department of Computer SciencesGuilin University of Electronic TechnologyGuilin 541004China
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain *** CPA secure TIPRE ... 详细信息
来源: 评论
Finite groups with the most Chermak-Delgado measures of subgroups
arXiv
收藏 引用
arXiv 2025年
作者: Liu, Guojie Qu, Haipeng An, Lijian Shanxi Key Laboratory of Cryptography and Data Security Shanxi Normal University Shanxi Taiyuan030031 China
Let G be a finite group and H ≤ G. The Chermak-Delgado measure of H is defined as the number |H| · |CG(H)|. In this paper, we identify finite groups that exhibit the maximum number of Chermak-Delgado measures un...
来源: 评论
Resisting Membership Inference Attacks by Dynamically Adjusting Loss Targets
Resisting Membership Inference Attacks by Dynamically Adjust...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Ma, Xihua Tian, Youliang Ding, Zehua Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China Institute of Cryptography and Data Security Guizhou University Guiyang550025 China
Machine learning (ML) models are susceptible to membership inference attacks (MIAs), which aim to infer whether a particular sample was involved in model training. Previous research suggests that the difference in los... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
An Effective security Comparison Protocol in Cloud Computing
收藏 引用
Computers, Materials & Continua 2023年 第6期75卷 5141-5158页
作者: Yuling Chen Junhong Tao Tao Li Jiangyuan Cai Xiaojun Ren State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550000China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic TechnologyGuilin550000China POWERCHINA Guizhou Electric Power Engineering Co. Ltd.Guiyang550000China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and TechnologyWeifang261000China
With the development of cloud computing technology,more and more data owners upload their local data to the public cloud server for storage and *** this can save customers’operating costs,it also poses privacy and se... 详细信息
来源: 评论
An Efficient Blockchain-Based Certificateless Anonymous Authentication Scheme for VANETs
An Efficient Blockchain-Based Certificateless Anonymous Auth...
收藏 引用
2023 International Conference on Networking and Network Applications, NaNA 2023
作者: Bi, Changbing Tian, Youliang Li, Ta Wu, Shihong Zhou, Hua Guizhou University State Key Laboratory of Public Big Data Guiyang550025 China College of Computer Science and Technology Guizhou University Guiyang550025 China Guizhou University Guizhou Province Key Laboratory of Cryptography and Block Chain Technology Guiyang550025 China Institute of Cryptography & Data Security Guizhou University Guiyang550025 China College of Big Data and Information Engineering Guizhou University Guiyang550025 China
Vehicle ad-hoc networks (VANETs) play a critical role in providing security and privacy protection for intelligent transportation systems. However, the limited network bandwidth and computing capacity within VANETs ha... 详细信息
来源: 评论
A C/C++ Smart Contract Vulnerability Detection Method Based on Intermediate Value Transformation  4
A C/C++ Smart Contract Vulnerability Detection Method Based ...
收藏 引用
4th International Conference on Blockchain Technology and Information security, ICBCTIS 2024
作者: Li, Yushu Xing, Ying Lu, Siqi Deng, Xiang Pan, Heng Si, Xueming Zhongyuan University of Technology Cyber Security Academy Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China Henan Key Laboratory of Network Cryptography Zhengzhou China College of Spatiotemporal Big Data Industry Henan Vocational College of Surveying and Mapping Zhengzhou China
Smart contracts have brought new developments to Blockchain technology, quickly finding widespread application in finance, law, and business sectors upon their emergence. However, security vulnerabilities in smart con... 详细信息
来源: 评论
Understanding User Passwords through Parsing Tree
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Wang, Ding Shan, Xuan Wu, Yuxuan Jia, Chunfu Nankai University College of Cryptology and Cyber Science Tianjin300350 China Ministry of Education of China Henan Key Laboratory of Network Cryptography Key Laboratory of Cyberspace Security China Nankai University Tianjin Key Laboratory of Network and Data Security Technology Tianjin300350 China
Passwords are today's dominant form of authentication, and password guessing is the most effective method for evaluating password strength. Most password guessing models (e.g., PCFG, Markov, and RFGuess) regard pa... 详细信息
来源: 评论