咨询与建议

限定检索结果

文献类型

  • 9 篇 期刊文献
  • 2 篇 会议

馆藏范围

  • 11 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 9 篇 工学
    • 8 篇 计算机科学与技术...
    • 5 篇 软件工程
    • 2 篇 电气工程
    • 1 篇 机械工程
    • 1 篇 光学工程
    • 1 篇 信息与通信工程
    • 1 篇 控制科学与工程
    • 1 篇 建筑学
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 船舶与海洋工程
    • 1 篇 网络空间安全
  • 3 篇 管理学
    • 3 篇 管理科学与工程(可...
    • 1 篇 工商管理
    • 1 篇 图书情报与档案管...
  • 2 篇 理学
    • 2 篇 数学
    • 1 篇 统计学(可授理学、...
  • 1 篇 教育学
    • 1 篇 教育学

主题

  • 2 篇 privacy protecti...
  • 2 篇 blockchain
  • 1 篇 customized priva...
  • 1 篇 reinforcement le...
  • 1 篇 homomorphic encr...
  • 1 篇 data privacy
  • 1 篇 libraries
  • 1 篇 generative adver...
  • 1 篇 wages
  • 1 篇 lattice
  • 1 篇 software enginee...
  • 1 篇 heterogeneous in...
  • 1 篇 resilience
  • 1 篇 public encryptio...
  • 1 篇 law
  • 1 篇 software reusabi...
  • 1 篇 smart contract
  • 1 篇 lightweight
  • 1 篇 semantics
  • 1 篇 resource allocat...

机构

  • 2 篇 department of co...
  • 2 篇 state key lab on...
  • 2 篇 information secu...
  • 2 篇 key laboratory o...
  • 2 篇 college of compu...
  • 2 篇 school of inform...
  • 2 篇 department of co...
  • 2 篇 school of commun...
  • 1 篇 no. 3501 daxue r...
  • 1 篇 aerospace tianmu...
  • 1 篇 zhejiang univers...
  • 1 篇 itai haihe lab
  • 1 篇 the advanced net...
  • 1 篇 rabat morocco
  • 1 篇 inria bretagne r...
  • 1 篇 school of comput...
  • 1 篇 school of comput...
  • 1 篇 department of co...
  • 1 篇 state key labora...
  • 1 篇 xi'an jiaotong u...

作者

  • 2 篇 xiu-bo chen
  • 2 篇 haseeb ahmad
  • 2 篇 ruyan wang
  • 2 篇 dapeng wu
  • 2 篇 gang xu
  • 2 篇 xinqi lin
  • 1 篇 shen meng
  • 1 篇 kharmoum nassim
  • 1 篇 zhu xiaoqiang
  • 1 篇 an jianlong
  • 1 篇 xin liu
  • 1 篇 zhang ji
  • 1 篇 qu wenyu
  • 1 篇 sijun wu
  • 1 篇 li tao
  • 1 篇 tong tang
  • 1 篇 jia-shun zhang
  • 1 篇 xu guangquan
  • 1 篇 han yufei
  • 1 篇 qiu tie

语言

  • 9 篇 英文
  • 2 篇 其他
检索条件"机构=Intelligent Computer Networking and Security Laboratory"
11 条 记 录,以下是1-10 订阅
排序:
The Role of Generative AI in Deepfake Detection: A Systematic Literature Review
The Role of Generative AI in Deepfake Detection: A Systemati...
收藏 引用
International Conference on Smart Business and technology, ICSBT 2024
作者: Acim, Btissam Kharmoum, Nassim Lagmiri, Souad Najoua Ziti, Soumia Department of Computer Science Intelligent Processing & Security of Systems Faculty of Sciences Mohammed V University in Rabat Rabat Morocco Rabat Morocco IT Networking Security and Management Laboratory Higher Institute of Management Administration and Computer Engineering Rabat Morocco
There is a possibility that deepfakes will increase a great deal of false information in a very realistic way, but it seems that today such technology appears to be extremely dangerous. While generative Artificial Int... 详细信息
来源: 评论
C-privacy:A social relationship-driven image customization sharing method in cyber-physical networks
收藏 引用
Digital Communications and Networks 2025年 第2期11卷 563-573页
作者: Dapeng Wu Jian Liu Yangliang Wan Zhigang Yang Ruyan Wang Xinqi Lin School of Communications and Information Engineering Chongqing University of Posts and TelecommunicationsChongqing 400065China Aerospace Tianmu Satellite Technology Company Limited Chongqing401332China School of Cyber Security and Information Law Chongqing University of Posts and TelecommunicationsChongqing400065China College of Computer and Cyber Security Fujian Normal UniversityFujian350117China The Advanced Network and Intelligent Connection Technology Key Laboratory Chongqing400065China Key Laboratory of Ubiquitous Sensing and Networking Chongqing400065China
Cyber-Physical Networks(CPN)are comprehensive systems that integrate information and physical domains,and are widely used in various fields such as online social networking,smart grids,and the Internet of Vehicles(IoV... 详细信息
来源: 评论
RobustPFL: Robust Personalized Federated Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年
作者: Chen, Guorong Wang, Wei Wu, Yufang Li, Chao Xu, Guangquan Ji, Shouling Li, Tao Shen, Meng Han, Yufei Xi'an Jiaotong University Ministry of Education Key Lab for Intelligent Networks and Network Security Xi'an China Beijing Jiaotong University 3 Shangyuancun Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University Tianjin Key Laboratory of Advanced Networking College of Intelligence and Computing Tianjin300350 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China ITAI Haihe Lab Tianjin China Nankai University College of Computer Science Tianjin300350 China Beijing Institute of Technology School of Cyberspace Security Beijing100081 China Peng Cheng Laboratory Cyberspace Security Research Center Shenzhen518066 China INRIA Bretagne Rennes35042 France
Conventional federated learning (FL) coordinated by a central server focuses on training a global model and protecting the privacy of clients' training data by storing it locally. However, the statistical heteroge... 详细信息
来源: 评论
Dynamic Radio Map Construction With Minimal Manual Intervention: A State Space Model-Based Approach With Imitation Learning
收藏 引用
IEEE Transactions on Big Data 2024年
作者: Zhu, Xiaoqiang Qiu, Tie Qu, Wenyu Zhou, Xiaobo Shi, Tuo Xu, Tianyi Beijing Jiaotong University School of Cyberspace Science and Technology Beijing100044 China Beijing Jiaotong University Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing100044 China Tianjin University School of Computer Science and Technology College of Intelligence and Computing Tianjin300350 China Tianjin Key Laboratory of Advanced Networking Tianjin300350 China
Fingerprint localization methods typically require a substantial amount of manual effort to collect fingerprint data from various scenarios to construct an accurate radio map. While some existing research has attempte... 详细信息
来源: 评论
A Certificateless Homomorphic Encryption Scheme for Protecting Transaction Data Privacy of Post-Quantum Blockchain
收藏 引用
Journal of Cyber security 2022年 第1期4卷 29-39页
作者: Meng-Wei Zhang Xiu-Bo Chen Haseeb Ahmad Gang Xu Yi-Xian Yang Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China Department of Computer Science National Textile University Faisalabad37610Pakistan School of Information Science and Technology North China University of TechnologyBeijing100144China Beijing Key Laboratory of Security and Privacy in Intelligent Transportation Beijing Jiaotong UniversityBeijing100044China
Blockchain has a profound impact on all areas of society by virtue of its immutability,decentralization and other ***,blockchain faces the problem of data privacy leakage during the application process,and the rapid d... 详细信息
来源: 评论
Towards Privacy-Preserving Cloud Storage:A Blockchain Approach
收藏 引用
computers, Materials & Continua 2021年 第12期69卷 2903-2916页
作者: Jia-Shun Zhang Gang Xu Xiu-Bo Chen Haseeb Ahmad Xin Liu Wen Liu Information Security Center State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijing100876China School of Information Science and Technology North China University of TechnologyBeijing100144China Department of Computer Science National Textile UniversityFaisalabad37610Pakistan Inner Mongolia University of Science&Technology School of Information EngineeringBaotou014010China State Key Laboratory of Media Convergence and Communication Communication University of China School of Computer Science and Cybersecurity Communication University of China Key Laboratory of Convergent Media and Intelligent Technology Communication University of China Ministry of EducationBeijing102204China
With the rapid development of cloud computing technology,cloud services have now become a new business model for information *** cloud server provides the IT resources required by customers in a selfservice manner thr... 详细信息
来源: 评论
A survey on security attacks and defense techniques for Connected and Autonomous Vehicles
arXiv
收藏 引用
arXiv 2020年
作者: Pham, Minh Xiong, Kaiqi Department of Computer Science and Engineering University of South Florida United States Intelligent Computer Networking and Security Laboratory University of South Florida United States
Autonomous Vehicle has been transforming intelligent transportation systems. As telecommunication technology improves, autonomous vehicles are getting connected to each other and to infrastructures, forming Connected ... 详细信息
来源: 评论
A two-phase approach for locally differentially private fuzzy co-clustering
收藏 引用
Information Sciences 2025年 718卷
作者: Zhang, Pengfei An, Jianlong Cheng, Xiang Zhu, Youwen Zhang, Ji Zhang, Zhikun State Key Laboratory of Digital Intelligent Technology for Unmanned Coal Mining No. 168 Shungeng Road Tianjiaan District Huainan232001 China School of Computer Science and Engineering Anhui University of Science and Technology No. 168 Shungeng Road Tianjiaan District Huainan232001 China Yunnan Key Laboratory of Service Computing Yunnan University of Finance and Economics No. 237 Longquan Road Yunnan Kunming650221 China No. 3501 Daxue Road Shandong Jinan255020 China Key Laboratory of Equipment Data Security and Guarantee Technology Guilin University of Electronic Technology No. 1 Jinji Road Guangxi Guilin541010 China State Key Laboratory of Networking and Switching Technology No. 10 Xitucheng Road Haidian District Beijing100876 China Beijing University of Posts and Telecommunications No. 10 Xitucheng Road Haidian District Beijing100876 China College of Computer and Data Science Nanjing University of Aeronautics and Astronautics No. 29 Yudao Street Qinhuai District Jiangsu Nanjing210016 China School of Mathematics Physics and Computing University of Southern Queensland West Street ToowoombaQLD4350 Australia College of Computer Science and Technology Zhejiang University No. 38 Zheda Road Xihu District Hangzhou310027 China
Clustering analysis is important for providing personalized services across various user experience optimization. As an advanced clustering technique, Fuzzy Co-Clustering (FCC) excels at handling high-dimensional data... 详细信息
来源: 评论
Lightweight deep reinforcement learning for dynamic resource allocation in vehicular edge computing
收藏 引用
Digital Communications and Networks 2025年
作者: Dapeng Wu Sijun Wu Yaping Cui Ailing Zhong Tong Tang Ruyan Wang Xinqi Lin School of Communications and Information Engineering Chongqing University of Posts and Telecommunications Chongqing 400065 China Advanced Network and Intelligent Connection Technology Key Laboratory of Chongqing Education Commission of China Chongqing 400065 China Chongqing Key Laboratory of Ubiquitous Sensing and Networking Chongqing 400065 China College of Computer and Cyber Security Fujian Normal University Fuzhou 350117 China
Vehicular Edge Computing (VEC) enhances the quality of user services by deploying wealth of resources near vehicles. However, due to highly dynamic and complex nature of vehicular networks, centralized decision-making... 详细信息
来源: 评论
Interpretation-Enabled Software Reuse Detection Based on a Multi-level Birthmark Model
Interpretation-Enabled Software Reuse Detection Based on a M...
收藏 引用
International Conference on Software Engineering (ICSE)
作者: Xi Xu Qinghua Zheng Zheng Yan Ming Fan Ang Jia Ting Liu Key Laboratory of Intelligent Networks and Network Security Ministry of Education China School of Computer Science and Technology Xi’an Jiaotong University China State Key Lab on Integrated Services Networks School of Cyber Engineering Xidian University China Department of Communications and Networking Aalto University Finland School of Cyber Science and Engineering Xi’an Jiaotong University China
Software reuse, especially partial reuse, poses legal and security threats to software development. Since its source codes are usually unavailable, software reuse is hard to be detected with interpretation. On the oth... 详细信息
来源: 评论