咨询与建议

限定检索结果

文献类型

  • 120 篇 期刊文献
  • 95 篇 会议
  • 1 册 图书

馆藏范围

  • 216 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 133 篇 工学
    • 87 篇 计算机科学与技术...
    • 75 篇 软件工程
    • 37 篇 信息与通信工程
    • 27 篇 控制科学与工程
    • 21 篇 电气工程
    • 14 篇 生物工程
    • 10 篇 电子科学与技术(可...
    • 9 篇 光学工程
    • 8 篇 机械工程
    • 8 篇 安全科学与工程
    • 7 篇 建筑学
    • 7 篇 化学工程与技术
    • 7 篇 航空宇航科学与技...
    • 5 篇 力学(可授工学、理...
    • 5 篇 土木工程
    • 5 篇 生物医学工程(可授...
    • 5 篇 网络空间安全
    • 4 篇 仪器科学与技术
    • 4 篇 动力工程及工程热...
    • 4 篇 交通运输工程
  • 75 篇 理学
    • 38 篇 数学
    • 20 篇 物理学
    • 16 篇 生物学
    • 14 篇 统计学(可授理学、...
    • 13 篇 系统科学
    • 9 篇 化学
  • 29 篇 管理学
    • 16 篇 图书情报与档案管...
    • 15 篇 管理科学与工程(可...
    • 9 篇 工商管理
  • 6 篇 法学
  • 3 篇 农学
  • 3 篇 军事学
  • 2 篇 经济学
  • 2 篇 医学
  • 1 篇 教育学

主题

  • 11 篇 federated learni...
  • 6 篇 deep learning
  • 6 篇 robustness
  • 5 篇 neural networks
  • 5 篇 training
  • 4 篇 robust control
  • 4 篇 interference
  • 4 篇 sliding mode con...
  • 4 篇 security
  • 4 篇 sensors
  • 4 篇 australia
  • 3 篇 sensor systems
  • 3 篇 reinforcement le...
  • 3 篇 computational mo...
  • 3 篇 real-time system...
  • 3 篇 visualization
  • 3 篇 control systems
  • 3 篇 semantics
  • 3 篇 surveillance
  • 3 篇 synthetic apertu...

机构

  • 10 篇 department of in...
  • 9 篇 department of in...
  • 9 篇 state key labora...
  • 8 篇 china industrial...
  • 6 篇 institute of inf...
  • 6 篇 cyber-defence ca...
  • 4 篇 school of cyber ...
  • 4 篇 department of co...
  • 4 篇 school of inform...
  • 4 篇 school of artifi...
  • 4 篇 communication sy...
  • 4 篇 state key labora...
  • 4 篇 department of in...
  • 4 篇 school of comput...
  • 4 篇 cyber space inst...
  • 4 篇 institute of cyb...
  • 3 篇 columbia univers...
  • 3 篇 jinan university...
  • 3 篇 climatic researc...
  • 3 篇 scripps institut...

作者

  • 13 篇 stiller burkhard
  • 13 篇 bovet gérôme
  • 12 篇 celdrán alberto ...
  • 11 篇 choo kim-kwang r...
  • 8 篇 feng chao
  • 8 篇 gregorio martíne...
  • 8 篇 alberto huertas ...
  • 8 篇 dong daoyi
  • 8 篇 burkhard stiller
  • 8 篇 gérôme bovet
  • 7 篇 pan yu
  • 7 篇 sánchez pedro mi...
  • 7 篇 pérez gregorio m...
  • 5 篇 wang yue
  • 5 篇 kim-kwang raymon...
  • 5 篇 beltrán enrique ...
  • 4 篇 pedro miguel sán...
  • 4 篇 jan von der asse...
  • 4 篇 xiong rong
  • 4 篇 ge shiming

语言

  • 204 篇 英文
  • 11 篇 其他
  • 1 篇 中文
检索条件"机构=Cyber and Information Systems Defence Science and Technology Laboratory"
216 条 记 录,以下是1-10 订阅
排序:
CRP2-VCS: Contrast-Oriented Region-based Progressive Probabilistic Visual Cryptography Schemes
收藏 引用
IEEE Transactions on Circuits and systems for Video technology 2025年 第6期35卷 5501-5517页
作者: Wu, Xiaotian Song, Bofan Fang, Jia Yan, WeiQi Peng, Qing-Yu Jinan University Guangdong Key Laboratory of Data Security and Privacy Preserving College of Cyber Security College of Information Science and Technology Guangzhou China Auckland University of Technology Department of Computer and Information Systems Auckland New Zealand Jinan University Sino-French Joint Laboratory for Astrometry Dynamics and Space Science Guangzhou China
Most visual cryptography schemes (VCSs) are condition-oriented which implies their designs focus on satisfying the contrast and security conditions in VCS. In this paper, we explore a new architecture of VCS: contrast... 详细信息
来源: 评论
Review of data security within energy blockchain:A comprehensive analysis of storage,management,and utilization
收藏 引用
High-Confidence Computing 2024年 第3期4卷 82-102页
作者: Yunhua He Zhihao Zhou Yan Pan Fahui Chong Bin Wu Ke Xiao Hong Li School of Information Science and Technology North China University of TechnologyBeijing 100144China China Industrial Control Systems Cyber Emergency Response Team Beijing 100040China Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology Beijing 100040China Institute of Information Engineering Chinese Academy of Sciences Beijing 100195China
Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization,decentralization,democratization,and *** this evolving context,energy blockchain,aiming to enhance effici... 详细信息
来源: 评论
MMH-FE:AMulti-Precision and Multi-Sourced Heterogeneous Privacy-Preserving Neural Network Training Based on Functional Encryption
收藏 引用
Computers, Materials & Continua 2025年 第3期82卷 5387-5405页
作者: Hao Li Kuan Shao Xin Wang Mufeng Wang Zhenyong Zhang The State Key Laboratory of Public Big Data College of Computer Science and TechnologyGuizhou UniversityGuiyang550025China Key Laboratory of Computing Power Network and Information Security Ministry of EducationShandong Computer Science CenterQilu University of Technology(Shandong Academy of Sciences)Jinan250014China China Industrial Control Systems Cyber Emergency Response Team Beijing100040China
Due to the development of cloud computing and machine learning,users can upload their data to the cloud for machine learning model ***,dishonest clouds may infer user data,resulting in user data *** schemes have achie... 详细信息
来源: 评论
Residual Tensor Train: A Quantum-Inspired Approach for Learning Multiple Multilinear Correlations
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2023年 第5期4卷 1101-1113页
作者: Chen, Yiwei Pan, Yu Dong, Daoyi Zhejiang University Institute of Cyber-Systems and Control College of Control Science and Engineering Hangzhou310027 China Zhejiang University State Key Laboratory of Industrial Control Technology Institute of Cyber-Systems and Control College of Control Science and Engineering Hangzhou310027 China University of New South Wales School of Engineering and Information Technology CanberraACT2600 Australia
States of quantum many-body systems are defined in a high-dimensional Hilbert space, where rich and complex interactions among subsystems can be modeled. In machine learning, complex multiple multilinear correlations ... 详细信息
来源: 评论
Stone Soup: No Longer Just an Appetiser  26
Stone Soup: No Longer Just an Appetiser
收藏 引用
26th International Conference on information Fusion, FUSION 2023
作者: Hiscocks, Steven Barr, Jordi Perree, Nicola Wright, James Pritchett, Henry Rosoman, Oliver Harris, Michael Gorman, Roisín Pike, Sam Carniglia, Peter Vladimirov, Lyudmil Oakes, Benedict Defence Science and Technology Laboratory Cyber and Information Systems Salisbury United Kingdom Defence Research and Development Canada Radar Sensing and Exploitation Ottawa Canada University of Liverpool Electrical Engineering & Electronics Cdt in Distributed Algorithms Liverpool United Kingdom
This paper announces version 1.0 of Stone Soup: the open-source tracking and state estimation framework. We highlight key elements of the framework and outline example applications and community *** Soup is engineered... 详细信息
来源: 评论
Delegatable Multi-Authority Attribute-based Anonymous Credentials
收藏 引用
IEEE Transactions on Cloud Computing 2025年 第02期13卷 655-666页
作者: Sun, Meng Lai, Junzuo Mo, Xiaohan Wu, Chi Li, Peng Chu, Cheng-Kang Deng, Robert H. Jinan University College of Cyber Security Guangzhou510632 China Jinan University College of Information Science and Technology Guangzhou510632 China Tsinghua University Institute of Trustworthy Networks and Systems School of Software Beijing100084 China Digital Identity and Trustworthiness Laboratory Huawei Singapore 138588 Singapore Singapore Management University School of Computing and Information Systems 188065 Singapore
In cloud computing, users need to authenticate to access various resources. Attribute-based anonymous credentials (ABCs) provide a tool for privacy-preserving authentication, allowing users to prove possession of a se... 详细信息
来源: 评论
Implementation of Non-Gaussian Motion Models Within Stone Soup
Implementation of Non-Gaussian Motion Models Within Stone So...
收藏 引用
International Conference on information Fusion
作者: Zhen Yuen Chong Henry Pritchett Qing Li Runze Gan Yaman Kındap Simon Godsill Department of Engineering University of Cambridge Cambridge UK Cyber and Information Systems Defence Science and Technology Laboratory Salisbury UK
In recent years, state-space models for highly manoeuvrable objects have been proposed based on non-Gaussian, continuous time, jump-based Lévy processes, the so-called Lévy state-space model [1]–[4]. In the... 详细信息
来源: 评论
Protecting Multi-Domain Command and Control information System Network Traffic with Segment Routing  1
收藏 引用
10th China Conference on Command and Control, C2 2022
作者: Yuan, Zongyang Chen, Tao Ren, Bangbang Luo, Lailong The Science and Technology on Information Systems Engineering Laboratory National University of Defence Technology Changsha China
In the Multi-Domain Command and Control information System (MDCCIS), data security and privacy protection play key roles in improving network security. However, some network devices may be illegally hijacked, which ma... 详细信息
来源: 评论
PpNNT: Multiparty Privacy-Preserving Neural Network Training System
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第1期5卷 370-383页
作者: Feng, Qi He, Debiao Shen, Jian Luo, Min Choo, Kim-Kwang Raymond Wuhan University School of Cyber Science and Engineering Wuhan430072 China Shandong Provincial Key Laboratory of Computer Networks Jinan250014 China School of Information Science and Technology Zhejiang Sci-Tech University Hangzhou310018 China Shanghai Technology Innovation Centre of Distributed Privacy-Preserving Artificial Intelligence Matrix Elements Technologies Shanghai201204 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
By leveraging smart devices [e.g., industrial Internet of Things (IIoT)] and real-time data analytics, organizations, such as production plants can benefit from increased productivity, reduced costs, enhanced self-mon... 详细信息
来源: 评论
Temporal Refinement Graph Convolutional Network for Skeleton-Based Action Recognition
IEEE Transactions on Artificial Intelligence
收藏 引用
IEEE Transactions on Artificial Intelligence 2024年 第4期5卷 1586-1598页
作者: Zhuang, Tianming Qin, Zhen Ding, Yi Deng, Fuhu Chen, Leduo Qin, Zhiguang Raymond Choo, Kim-Kwang University of Electronic Science and Technology of China Network and Data Security Key Laboratory of Sichuan Province Chengdu Sichuan610054 China University of Electronic Science and Technology of China School of Information and Software Engineering Chengdu Sichuan610054 China School of Advanced Technology Suzhou Jiangsu215123 China University of Texas at San Antonio Department of Information Systems and Cyber Security San AntonioTX78249 United States
Human skeleton data, which has served in the aspect of human activity recognition, ought to be the most representative biometric characteristics due to its intuitivity and visuality. The state-of-the-art approaches ma... 详细信息
来源: 评论