咨询与建议

限定检索结果

文献类型

  • 14 篇 期刊文献
  • 4 篇 会议

馆藏范围

  • 18 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 15 篇 工学
    • 14 篇 计算机科学与技术...
    • 13 篇 软件工程
    • 5 篇 信息与通信工程
    • 3 篇 控制科学与工程
    • 2 篇 电气工程
    • 1 篇 机械工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 动力工程及工程热...
    • 1 篇 建筑学
    • 1 篇 生物医学工程(可授...
    • 1 篇 生物工程
    • 1 篇 网络空间安全
  • 5 篇 理学
    • 3 篇 数学
    • 1 篇 物理学
    • 1 篇 大气科学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 3 篇 医学
    • 3 篇 临床医学
    • 2 篇 基础医学(可授医学...
    • 1 篇 公共卫生与预防医...
    • 1 篇 药学(可授医学、理...
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 军事学
    • 1 篇 军队指挥学

主题

  • 3 篇 blockchain
  • 2 篇 internet of thin...
  • 1 篇 standard model
  • 1 篇 access control
  • 1 篇 smart contracts
  • 1 篇 public-key encry...
  • 1 篇 deep learning
  • 1 篇 regression
  • 1 篇 computation offl...
  • 1 篇 generative adver...
  • 1 篇 lattice
  • 1 篇 self-feedback ls...
  • 1 篇 spatial crowdsou...
  • 1 篇 chosen ciphertex...
  • 1 篇 optical fiber co...
  • 1 篇 data mining
  • 1 篇 authentication
  • 1 篇 internet
  • 1 篇 normal distribut...
  • 1 篇 remuneration

机构

  • 4 篇 guangdong provin...
  • 3 篇 college of infor...
  • 2 篇 school of comput...
  • 2 篇 school of comput...
  • 2 篇 college of mathe...
  • 2 篇 guangdong provin...
  • 2 篇 college of infor...
  • 2 篇 guizhou provinci...
  • 2 篇 guangdong key la...
  • 2 篇 school of manage...
  • 1 篇 national&local j...
  • 1 篇 department of el...
  • 1 篇 the school of el...
  • 1 篇 trusted ai syste...
  • 1 篇 fujian provincia...
  • 1 篇 department of co...
  • 1 篇 the city univers...
  • 1 篇 guangdong-hongko...
  • 1 篇 school of electr...
  • 1 篇 guangdong key la...

作者

  • 6 篇 weng jian
  • 4 篇 weng jiasi
  • 4 篇 wu yongdong
  • 3 篇 luo weiqi
  • 3 篇 li ming
  • 3 篇 zhang yue
  • 2 篇 lu yong
  • 2 篇 jinpeng chen
  • 2 篇 yang yang
  • 2 篇 wei kaimin
  • 2 篇 deng robert h.
  • 2 篇 qian jin
  • 2 篇 bao huan
  • 2 篇 kaimin wei
  • 2 篇 huang hongwei
  • 1 篇 wenzhong guo
  • 1 篇 jiang zhang
  • 1 篇 tianqi li
  • 1 篇 mei li
  • 1 篇 wang shiguo

语言

  • 17 篇 英文
  • 1 篇 其他
检索条件"机构=Guangdong Provincial Key Laboratory of Data Security and Privacy Protection"
18 条 记 录,以下是1-10 订阅
排序:
Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning
收藏 引用
IEEE Transactions on Information Forensics and security 2025年
作者: Bao, Huan Wei, Kaimin Wu, Yongdong Qian, Jin Deng, Robert H. Jinan University College of Cyber Security Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangdong Institute of Smart Education Guangzhou510632 China Singapore Management University School of Information Systems 178902 Singapore
Model Inversion (MI) attacks based on Generative Adversarial Networks (GAN) aim to recover private training data from complex deep learning models by searching codes in the latent space. However, this method merely se... 详细信息
来源: 评论
Improved lattice-based CCA2-secure PKE in the standard model
收藏 引用
Science China(Information Sciences) 2020年 第8期63卷 147-168页
作者: Jiang ZHANG Yu YU Shuqin FAN Zhenfeng ZHANG State Key Laboratory of Cryptology Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Jinan University Department of Computer Science and Engineering Shanghai Jiao Tong University Trusted Computing and Information Assurance Laboratory Institute of SoftwareChinese Academy of Sciences
Based on the identity-based encryption(IBE) from lattices by Agrawal et al.(Eurocrypt’10),Micciancio and Peikert(Eurocrypt’12) presented a CCA1-secure public-key encryption(PKE), which has the best known efficiency ... 详细信息
来源: 评论
Aggregation-based dual heterogeneous task allocation in spatial crowdsourcing
收藏 引用
Frontiers of Computer Science 2024年 第6期18卷 215-227页
作者: Xiaochuan LIN Kaimin WEI Zhetao LI Jinpeng CHEN Tingrui PEI College of Information Science and Technology&Cyberspace Security Jinan UniversityGuangzhou 510632China National&Local Joint Engineering Research Center of Network Security Detection and Protection Technology Guangzhou 510632China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Computer Science Beijing University of Posts and TelecommunicationsBeijing 100876China
Spatial crowdsourcing(SC)is a popular data collection paradigm for numerous *** the increment of tasks and workers in SC,heterogeneity becomes an unavoidable difficulty in task *** researches only focus on the single-... 详细信息
来源: 评论
Cancer classification with data augmentation based on generative adversarial networks
收藏 引用
Frontiers of Computer Science 2022年 第2期16卷 69-79页
作者: Kaimin WEI Tianqi LI Feiran HUANG Jinpeng CHEN Zefan HE College of Information Science and Technology Jinan UniversityGuangzhou 510632China Guangdong Key Laboratory of Data Security and Privacy Protection Guangzhou 510632China School of Software Engineering Beijing University of Posts and TelecommunicationsBeijing 100876China
Accurate diagnosis is a significant step in cancer *** learning can support doctors in prognosis decision-making,and its performance is always weakened by the high dimension and small quantity of genetic ***,deep lear... 详细信息
来源: 评论
Iterative Bounded Distance Decoding with Random Flipping for Product-Like Codes
收藏 引用
IEEE Transactions on Communications 2024年 第5期73卷 2864-2875页
作者: Li, Guorong Wang, Shiguo Zhao, Shancheng Jinan University National and Local Joint Research Center of Network Security Detection and Protection Technology College of Information Science and Technology Guangzhou510632 China Guangdong Key Laboratory of Data Security and Privacy Preserving The Guangzhou Key Laboratory of Data Security and Privacy Preserving Guangzhou510632 China Changsha University of Science and Technology Computer and Communication Engineering Institute Changsha410114 China
Product-like codes are widely used in high-speed communication systems since they can be decoded with low-complexity hard decision decoders (HDDs). To meet the growing demand of data rates, enhanced HDDs are required.... 详细信息
来源: 评论
An identity-based anonymous signcryption for vehicular ad hoc networks  2nd
An identity-based anonymous signcryption for vehicular ad ho...
收藏 引用
2nd International Cognitive Cities Conference, IC3 2019
作者: Lu, Yong Yang, Huijie School of Management Science and Engineering Nanjing University of Information Science and Technology Nanjing China Guizhou Provincial Key Laboratory of Public Big Data Guizhou University Guiyang China School of Computer and Software Nanjing University of Information Science and Technology Nanjing China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China
The vehicular ad hoc networks (VANETs) can share information of vehicles’ location, speed and route within a certain range by interconnecting vehicles, roadside units (RSU) and the cloud. As people’s daily traffic t... 详细信息
来源: 评论
A mutual authentication lightweight rfid protocol for iot devices  2nd
A mutual authentication lightweight rfid protocol for iot de...
收藏 引用
2nd International Cognitive Cities Conference, IC3 2019
作者: Lu, Yong Wang, Anxi Liu, Shuai School of Management Science and Engineering Nanjing University of Information Science and Technology Nanjing210044 China Guizhou Provincial Key Laboratory of Public Big Data GuiZhou University GuiyangGuizhou550025 China School of Computer and Software Nanjing University of Information Science and Technology Nanjing210044 China Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou510632 China
The IoT data security is a hot topic at a data time. Personal privacy data may be easily leaked to data collectors in an open network environment. If the collectors get enough data, they can analyze the habit and inte... 详细信息
来源: 评论
Self-feedback LSTM regression model for real-time particle source apportionment
收藏 引用
Journal of Environmental Sciences 2022年 第4期34卷 10-20页
作者: Wei Wang Weiman Xu Shuai Deng Yimeng Chai Ruoyu Ma Guoliang Shi Bo Xu Mei Li Yue Li Trusted AI System Laboratory College of Computer ScienceNankai UniversityTianjin 300350China KLMDASR Tianjin Key Laboratory of Network and Data Security TechnologyTianjin 300350China State Environmental Protection Key Laboratory of Urban Ambient Air Particulate Matter Pollution Prevention and Control College of Environmental Science and EngineeringNankai UniversityTianjin 300071China Institute of Mass Spectrometry and Atmospheric Environment Guangdong Provincial Engineering Research Center for on-line source apportionment system of air pollution Jinan UniversityGuangzhou 510632China Guangdong-Hongkong-Macao Joint Laboratory of Collaborative Innovation for Environmental Quality Guangzhou 510632China
Atmospheric particulate matter pollution has attracted much wider attention *** recent years,the development of atmospheric particle collection techniques has put forwards new demands on the real-time source apportion... 详细信息
来源: 评论
DAMIA: Leveraging domain adaptation as a defense against membership inference attacks
arXiv
收藏 引用
arXiv 2020年
作者: Huang, Hongwei Luo, Weiqi Zeng, Guoqiang Weng, Jian Zhang, Yue Yang, Anjia College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China
Deep Learning (DL) techniques allow one to train a model from a dataset, and the model can be adopted to solve tasks. DL has attracted much interest given its fancy performance and potential market value, while securi... 详细信息
来源: 评论
Onionchain: Towards balancing privacy and traceability of blockchain-based applications
arXiv
收藏 引用
arXiv 2019年
作者: Zhang, Yue Weng, Jian Weng, Jiasi Li, Ming Luo, Weiqi College of Informatin Science and Technology College of Cyber security National Joint Engineering Research Center of Network Security Detection and Protection Technology Guangdong Key Laboratory of Data Security and Privacy Preserving Jinan University Guangzhou510632 China
With the popularity of Blockchain comes grave security related concerns. Achieving privacy and traceability simultaneously remains an open question. Efforts have been made to address the issues, while they may subject... 详细信息
来源: 评论