咨询与建议

限定检索结果

文献类型

  • 50 篇 会议
  • 36 篇 期刊文献

馆藏范围

  • 86 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 55 篇 工学
    • 46 篇 计算机科学与技术...
    • 30 篇 软件工程
    • 14 篇 信息与通信工程
    • 10 篇 网络空间安全
    • 5 篇 电气工程
    • 5 篇 控制科学与工程
    • 4 篇 电子科学与技术(可...
    • 3 篇 动力工程及工程热...
    • 2 篇 机械工程
    • 2 篇 仪器科学与技术
    • 2 篇 石油与天然气工程
    • 2 篇 环境科学与工程(可...
    • 2 篇 生物工程
    • 2 篇 安全科学与工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 建筑学
  • 20 篇 理学
    • 17 篇 数学
    • 7 篇 统计学(可授理学、...
    • 2 篇 物理学
    • 2 篇 生物学
    • 2 篇 系统科学
  • 12 篇 管理学
    • 12 篇 管理科学与工程(可...
    • 3 篇 工商管理
    • 2 篇 图书情报与档案管...
  • 4 篇 法学
    • 2 篇 法学
    • 2 篇 社会学
  • 3 篇 军事学
    • 2 篇 军队指挥学
  • 2 篇 文学
    • 2 篇 新闻传播学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 7 篇 blockchain
  • 5 篇 data privacy
  • 5 篇 security
  • 5 篇 game theory
  • 5 篇 cloud computing
  • 5 篇 privacy
  • 4 篇 authentication
  • 4 篇 cryptography
  • 4 篇 training
  • 3 篇 computational mo...
  • 3 篇 smart contract
  • 3 篇 feature extracti...
  • 3 篇 protocols
  • 3 篇 encryption
  • 3 篇 robustness
  • 2 篇 smart contracts
  • 2 篇 deep learning
  • 2 篇 channel capacity
  • 2 篇 graph neural net...
  • 2 篇 differential pri...

机构

  • 18 篇 state key labora...
  • 11 篇 advanced cryptog...
  • 9 篇 institute of cry...
  • 8 篇 guangxi key labo...
  • 7 篇 guizhou universi...
  • 6 篇 school of cybers...
  • 6 篇 guilin universit...
  • 6 篇 college of compu...
  • 5 篇 state key labora...
  • 5 篇 weifang universi...
  • 4 篇 dazhou key labor...
  • 4 篇 fujian provincia...
  • 4 篇 guangxi key labo...
  • 4 篇 blockchain labor...
  • 3 篇 guangxi key labo...
  • 3 篇 school of cyber ...
  • 3 篇 institute of cry...
  • 3 篇 institute of cry...
  • 2 篇 college of big d...
  • 2 篇 school of crypto...

作者

  • 13 篇 tian youliang
  • 12 篇 chen yuling
  • 9 篇 youliang tian
  • 5 篇 huang yuanyuan
  • 5 篇 wu yongtang
  • 5 篇 li tao
  • 5 篇 yuanyuan huang
  • 4 篇 xiong jinbo
  • 3 篇 tan weijie
  • 3 篇 lu jiazhong
  • 3 篇 ma jianfeng
  • 3 篇 yang kedi
  • 3 篇 qian xiaobin
  • 3 篇 changgen peng
  • 3 篇 wang yilei
  • 3 篇 zhou huiyu
  • 2 篇 wang chenli
  • 2 篇 min tang
  • 2 篇 baohua qiang
  • 2 篇 jiazhong lu

语言

  • 80 篇 英文
  • 6 篇 其他
检索条件"机构=Cryptography and Data Security Laboratory"
86 条 记 录,以下是51-60 订阅
排序:
A C/C++ Smart Contract Vulnerability Detection Method Based on Intermediate Value Transformation
A C/C++ Smart Contract Vulnerability Detection Method Based ...
收藏 引用
Blockchain Technology and Information security (ICBCTIS), International Conference on
作者: Yushu Li Ying Xing Siqi Lu Xiang Deng Heng Pan Xueming Si Cyber Security Academy Zhongyuan University of Technology Zhengzhou China Software College Zhongyuan University of Technology Zhengzhou China Henan Key Laboratory of Network cryptography Zhengzhou China College of Spatiotemporal Big Data Industry Henan Vocational College of Surveying and Mapping Zhengzhou China
Smart contracts have brought new developments to Blockchain technology, quickly finding widespread application in finance, law, and business sectors upon their emergence. However, security vulnerabilities in smart con... 详细信息
来源: 评论
THC-DL: Three-Party Homomorphic Computing Delegation Learning for Secure Optimization
收藏 引用
IEEE Internet of Things Journal 2025年
作者: Yang, Ze Tian, Youliang Xiong, Jinbo Niu, Kun Li, Mengqian Zhang, Xinyu Ma, Jianfeng Guizhou University Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology College of Computer Science and Technology Guiyang550025 China Guizhou University College of Big Data and Information Engineering Guiyang550025 China Fujian Normal University Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fuzhou350117 China Xidian University State Key Laboratory of Integrated Services Network Xi’an710071 China Xidian University State Key Laboratory of Integrated Services Network School of Cyber Engineering Xi’an710071 China
Delegation Learning(DL) flourishes data sharing, enabling agents to delegate data to the cloud for model training. To preserve privacy, homomorphic encryption (HE) offers an effective solution for privacy-preserving m... 详细信息
来源: 评论
A Botnet data Collection Method for Industrial Internet
A Botnet Data Collection Method for Industrial Internet
收藏 引用
International Conference on Wavelet Active Media Technology and Information Processing (ICWAMTIP)
作者: Shu Jian Xian Bo Wang Chenli Lu Jiazhong Huang Yuanyuan Han Shuo School of Cybersecurity Chengdu University of Information Technology Chengdu Sichuan China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu Sichuan China Department of Statistics and Data Sciences Northwestern University Evanston IL USA
Industrial internet security is related to industrial production operations and national economic security. Network intrusion detection dataset in industrial control environment can effectively train detection models ...
来源: 评论
Dbfl: Dynamic Byzantine-Robust Privacy Preserving Federated Learning in Heterogeneous data Scenario
SSRN
收藏 引用
SSRN 2024年
作者: Chen, Xiaoli Tian, Youliang Wang, Shuai Yang, Kedi Zhao, Wei Xiong, Jinbo State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology Guizhou University Guizhou Guiyang550025 China College of Mathematics and Statistics Guizhou University Guizhou Guiyang550025 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China
Privacy Preserving Federated Learning (PPFL) protects the clients' local data privacy by securely uploading encrypted gradients to the server. However, in real-world scenarios, heterogeneous client data distributi... 详细信息
来源: 评论
Hydamc: A Hybrid Detection Approach for Misuse of Cryptographic Algorithms in Closed-Source Software
Hydamc: A Hybrid Detection Approach for Misuse of Cryptograp...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Haoling Fan Fangyu Zheng Jingqiang Lin Lingjia Meng Mingyu Wang Qiang Wang Shijie Jia Yuan Ma State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing China Data Assurance and Communication Security Research Center Chinese Academy of Sciences Beijing China School of Cyber Security University of Chinese Academy of Sciences Beijing China School of Cryptography University of Chinese Academy of Sciences Beijing China School of Cyber Security University of Science and Technology of China Hefei China
Cryptographic algorithms are fundamental to secure software development, but security vulnerabilities can arise during implementation, usage, and when calling third-party libraries. As security standards continue to e... 详细信息
来源: 评论
TaintSE: Dynamic Taint Analysis Combined with Symbolic Execution and Constraint Association
TaintSE: Dynamic Taint Analysis Combined with Symbolic Execu...
收藏 引用
IEEE International Conference on Software Engineering and Service Sciences (ICSESS)
作者: Chenghua Tang Xiaolong Guan Mengmeng Yang Baohua Qiang Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin Guangxi China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin Guangxi China Data61 Commonwealth Scientific and Industrial Research Organization Melbourne VIC Australia School of Computer Science and Information Security Guilin University of Electronic Technology Guilin Guangxi China
In order to solve the problem of under-tainting caused by insufficient coverage in dynamic taint analysis and the inability to perform fine-grained level analysis, a dynamic taint analysis method combining symbolic ex...
来源: 评论
A Multidimensional data Utility Evaluation and Pricing Scheme in the Big data Market
收藏 引用
Wireless Communications and Mobile Computing 2023年 第1期2023卷
作者: Chen, Yuling Bai, Rui Wu, Yongtang Li, Tao Zhou, Hui State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China Blockchain Laboratory of Agricultural Vegetables Weifang University of Science and Technology Shandong Weifang262700 China Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guangxi Guilin541004 China Weifang Key Laboratory of Blockchain on Agricultural Vegetables Shandong Weifang262700 China
Big data as a derivative of information technology facilitates the birth of data trading. The technology surrounding the business value of big data has come into focus. However, most of the current research focuses on... 详细信息
来源: 评论
A Secure Authentication Framework to Guarantee the Traceability of Avatars in Metaverse
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Kedi Zhang, Zhenyong Tian, Youliang Ma, Jianfeng The State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guiyang550025 China The Institute of Cryptography & Data Security GuiZhou University Guiyang550025 China The School of Cyber Engineering Xidian University Xi’an710126 China
Metaverse is a vast virtual environment parallel to the physical world in which users enjoy a variety of services acting as an avatar. To build a secure living habitat, it’s vital to ensure the virtual-physical trace... 详细信息
来源: 评论
Attribute-Based Key Management for Patient-Centric and Trusted data Access in Blockchain-Enabled IoMT
SSRN
收藏 引用
SSRN 2023年
作者: Xiang, Axin Gao, Hongfeng Tian, Youliang Wang, Linjie Xiong, Jinbo State Key Laboratory of Public Big Data College of Computer Science and Technology Guizhou University Guizhou Guiyang550025 China Guizhou Provincial Key Laboratory of Cryptography and Blockchain Technology Guizhou University Guizhou Guiyang550025 China Network and Information Management Center Guizhou University Guizhou Guiyang550025 China School of Data Science Tongren University Guizhou Tongren554300 China Fujian Provincial Key Laboratory of Network Security and Cryptology College of Computer and Cyber Security Fujian Normal University Fujian Fuzhou350117 China
Internet of Medical Things (IoMT) provides real-time data collection and access services to medical entities by connecting their devices to Internet. However, within such a complex architecture, achieving patient-cent... 详细信息
来源: 评论
The Chebyshev Collocation Least Squares Approximation Method for the Audio data  2021
The Chebyshev Collocation Least Squares Approximation Method...
收藏 引用
2nd International Conference on Computing and data Science, CONF-CDS 2021
作者: Zhang, Qian Qin, Yonghui Chen, Ziqiang Wen, Nengxiang Guilin University of Electronic Technology Guilin541004 China College of Mathematics and Computing Science Guangxi Colleges and Universities Key Laboratory of Data Analysis and Computation Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin541004 China Cognitive Radio and Information Processing Key Laboratory of Ministry of Education Guilin University of Electronic Technology Guilin541004 China
The Chebyshev collocation least squares configuration fitting method is investigated for the fitting of audio data. This method couples the least squares method with the Chebyshev-Gauss points. Numerical examples are ... 详细信息
来源: 评论