咨询与建议

限定检索结果

文献类型

  • 109 篇 会议
  • 84 篇 期刊文献

馆藏范围

  • 193 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 134 篇 工学
    • 85 篇 计算机科学与技术...
    • 67 篇 软件工程
    • 45 篇 信息与通信工程
    • 20 篇 电气工程
    • 19 篇 电子科学与技术(可...
    • 16 篇 控制科学与工程
    • 15 篇 仪器科学与技术
    • 12 篇 船舶与海洋工程
    • 10 篇 网络空间安全
    • 9 篇 机械工程
    • 7 篇 生物工程
    • 4 篇 动力工程及工程热...
    • 4 篇 安全科学与工程
    • 3 篇 光学工程
    • 3 篇 材料科学与工程(可...
    • 3 篇 交通运输工程
    • 3 篇 环境科学与工程(可...
    • 3 篇 生物医学工程(可授...
  • 59 篇 理学
    • 32 篇 数学
    • 30 篇 物理学
    • 12 篇 统计学(可授理学、...
    • 8 篇 生物学
    • 7 篇 系统科学
    • 4 篇 海洋科学
  • 33 篇 管理学
    • 26 篇 管理科学与工程(可...
    • 11 篇 图书情报与档案管...
    • 7 篇 工商管理
  • 9 篇 法学
    • 5 篇 社会学
    • 4 篇 法学
  • 3 篇 文学
  • 2 篇 经济学
    • 2 篇 应用经济学
  • 2 篇 医学
  • 1 篇 哲学
  • 1 篇 艺术学

主题

  • 7 篇 data privacy
  • 7 篇 costs
  • 7 篇 blockchain
  • 6 篇 oceans
  • 6 篇 signal to noise ...
  • 6 篇 time-frequency a...
  • 6 篇 semantics
  • 6 篇 feature extracti...
  • 6 篇 security
  • 6 篇 federated learni...
  • 6 篇 accuracy
  • 6 篇 privacy
  • 5 篇 underwater acous...
  • 5 篇 protocols
  • 5 篇 cryptography
  • 4 篇 simulation
  • 4 篇 target tracking
  • 4 篇 wireless sensor ...
  • 4 篇 computational mo...
  • 4 篇 estimation

机构

  • 48 篇 college of under...
  • 23 篇 acoustic science...
  • 19 篇 the state key la...
  • 19 篇 key laboratory o...
  • 18 篇 national key lab...
  • 8 篇 state key labora...
  • 8 篇 key laboratory o...
  • 8 篇 key laboratory o...
  • 7 篇 institute of blo...
  • 7 篇 state key labora...
  • 6 篇 guilin universit...
  • 6 篇 harbin engineeri...
  • 6 篇 guizhou universi...
  • 5 篇 school of comput...
  • 5 篇 weifang universi...
  • 5 篇 college of compu...
  • 5 篇 harbin engineeri...
  • 5 篇 state key labora...
  • 4 篇 school of comput...
  • 4 篇 beijing key labo...

作者

  • 11 篇 chen yuling
  • 9 篇 qiao gang
  • 5 篇 liu zhenguang
  • 5 篇 wu yongtang
  • 5 篇 jiao yingying
  • 4 篇 yin yifang
  • 4 篇 liu songzuo
  • 4 篇 wu sifan
  • 4 篇 chen haipeng
  • 4 篇 yao yanqing
  • 3 篇 yin jingwei
  • 3 篇 yang ziqi
  • 3 篇 liu xin
  • 3 篇 li yong
  • 3 篇 xiao han
  • 3 篇 xie jinhuai
  • 3 篇 xia xin
  • 3 篇 shang zhigang
  • 3 篇 zhang haigang
  • 3 篇 qin zhan

语言

  • 183 篇 英文
  • 8 篇 其他
  • 2 篇 中文
检索条件"机构=Key Laboratory in Blockchain and Data Security by Ministry of Industry and Information Technology"
193 条 记 录,以下是1-10 订阅
排序:
Defending data Inference Attacks Against Machine Learning Models by Mitigating Prediction Distinguishability
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 2687-2704页
作者: Yang, Ziqi Zhu, Yiran Wan, Jie Xiang, ChuXiao Tang, Tong Wang, Yilin Xu, Ruite Wang, Lijin Zhang, Fan Xu, Jiarong Qin, Zhan Zhejiang University State Key Laboratory of Blockchain and Data Security Hangzhou310027 China Institute of Blockchain and Data Security Hangzhou310027 China Zhejiang University College of Computer Science and Technology Hangzhou310027 China Fudan University Department of Information Management and Business Intelligence Shanghai200437 China
Neural networks are vulnerable to data inference attacks, including the membership inference attack, the model inversion attack, and the attribute inference attack. In this paper, we propose PURIFIER to defend against... 详细信息
来源: 评论
Sequential Indifferentiability of 7-Round Misty Structures
Sequential Indifferentiability of 7-Round Misty Structures
收藏 引用
Cryptographers’ Track at the RSA Conference, CT-RSA 2025
作者: Ai, Jiayi Guo, Chun School of Cyber Science and Technology Shandong University Qingdao China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education Shandong University Shandong Qingdao266237 China Shandong Research Institute of Industrial Technology Shandong Jinan250102 China
We investigate the Misty structure with respect to the security notion of sequential indifferentiability of Mandal et al. (TCC 2012). As our main result, we prove sequential indifferentiability for 7-round Misty struc...
来源: 评论
Location Privacy Preservation Crowdsensing With Federated Reinforcement Learning
收藏 引用
IEEE Transactions on Dependable and Secure Computing 2025年 第3期22卷 1877-1894页
作者: You, Zhichao Dong, Xuewen Liu, Ximeng Gao, Sheng Wang, Yongzhi Shen, Yulong Xidian University School of Computer Science and Technology The Engineering Research Center of Blockchain Technology Application and Evaluation Ministry of Education Xi'an710071 China Shaanxi Key Laboratory of Blockchain and Secure Computing Xi'an710071 China Fuzhou University College of Computer and Data Science Fuzhou350025 China Central University of Finance and Economics School of Information Beijing102206 China California State Polytechnic University Pomona Department of Computer Information Systems PomonaCA91768 United States Xidian University School of Computer Science and Technology Xi'an710071 China Shaanxi Key Laboratory of Network and System Security Xi'an710071 China
Crowdsensing has become a popular method of sensing data collection while facing the problem of protecting participants' location privacy. Existing location-privacy crowdsensing mechanisms focus on static tasks an... 详细信息
来源: 评论
DOA Estimation Exploiting a Single Moving Acoustic Vector Sensor: A Cramér-Rao Bound-Based Study
收藏 引用
IEEE Transactions on Vehicular technology 2025年 第5期74卷 7508-7523页
作者: Qu, Xinghao Shang, Zhigang Qiao, Gang Liu, Songzuo National Key Laboratory of Underwater Acoustic Technology Harbin Engineering University Harbin150001 China Harbin Engineering University Ministry of Industry and Information Technology Key Laboratory of Marine Information Acquisition and Security Harbin150001 China Harbin Engineering University College of Underwater Acoustic Engineering Harbin150001 China Sanya Nanhai Innovation and Development Base of Harbin Engineering University Sanya572024 China
Motivated by the emerging interest in direction-of-arrival (DOA) estimation exploiting array motions, this paper investigates a practical application scenario involving a single moving acoustic vector sensor (AVS). By... 详细信息
来源: 评论
A circuit area optimization of MK-3 S-box
收藏 引用
Cybersecurity 2025年 第1期8卷 61-71页
作者: Yanjun Li Weiguo Zhang Yiping Lin Jian Zou Jian Liu Information Industry Information Security Evaluation Center The 15th Research Institute of China Electronic Technology Group CorporationBeijing 100083China Henan Key Laboratory of Network Cryptography Technology Zhengzhou 450001China Beijing Electronic Science and Technology Institute No.7 Fufeng RoadFengtai DistricBeijing 100083China College of Computer and Data Science Fuzhou UniversityFuzhou 350108China
In MILCOM 2015,Kelly et *** the authentication encryption algorithm MK-3,which applied the 16-bit *** paper aims to implement the 16-bit S-box with less circuit ***,we classifed the irreducible polynomials over F_(2n)... 详细信息
来源: 评论
EPRFL:An Efficient Privacy-Preserving and Robust Federated Learning Scheme for Fog Computing
收藏 引用
China Communications 2025年 第4期22卷 202-222页
作者: Ke Zhijie Xie Yong Syed Hamad Shirazi Li Haifeng School of Computer Technology and Application Qinghai UniversityXining 810016China School of Computer and Information Science Qinghai Institute of TechnologyXining 810016China Guangdong Key Laboratory of Blockchain Security Guangzhou UniversityGuangzhou 510006China Department of Information Technology Hazara UniversityBaffa 21110Pakistan Qinghai Provincial Key Laboratory of Big Data in Finance and Artificial Intelligence Application Technology Xining 810016China
Federated learning(FL)is a distributed machine learning paradigm that excels at preserving data privacy when using data from multiple *** combined with Fog Computing,FL offers enhanced capabilities for machine learnin... 详细信息
来源: 评论
PFDF: Privacy Preserving Federated Decision Forest for Classification  24th
PFDF: Privacy Preserving Federated Decision Forest for Clas...
收藏 引用
24th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2024
作者: Li, Tongyaqi Qi, Qingqiang Hu, Chengyu Li, Xuelei Tang, Peng Guo, Shanqing School of Cyber Science and Technology Shandong University Shandong Qingdao266237 China Quan Cheng Laboratory Shandong Jinan250103 China The Key Laboratory of Cryptologic Technology and Information Security Ministry of Education Shandong University Shandong Jinan250100 China Electronic Information Industry Co. Ltd. Beijing China
The rapid development of data analysis technology and easily accessible datasets enable the construction of comprehensive analysis models, promoting decision-making processes in various fields. Decision trees, known f... 详细信息
来源: 评论
Optimizing Human Pose Estimation Through Focused Human and Joint Regions
arXiv
收藏 引用
arXiv 2025年
作者: Jiao, Yingying Wang, Zhigang Liu, Zhenguang Fan, Shaojing Wu, Sifan Wu, Zheqi Xu, Zhuoyue College of Computer Science and Technology Jilin University China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University China College of Computer Science and Technology Zhejiang Gongshang University China The State Key Laboratory of Blockchain and Data Security Zhejiang University China Institute of Blockchain and Data Security China School of Computing National University of Singapore Singapore
Human pose estimation has given rise to a broad spectrum of novel and compelling applications, including action recognition, sports analysis, as well as surveillance. However, accurate video pose estimation remains an... 详细信息
来源: 评论
HVIS: A Human-like Vision and Inference System for Human Motion Prediction
arXiv
收藏 引用
arXiv 2025年
作者: Lyu, Kedi Chen, Haipeng Liu, Zhenguang Yin, Yifang Lin, Yukang Jiao, Yingying College of Computer Science and Technology Jilin University Changchun China Key Laboratory of Symbolic Computation and Knowledge Engineering of Ministry of Education Jilin University Changchun China The State Key Laboratory of Blockchain and Data Security Zhejiang University Hangzhou China Institute of Blockchain and Data Security Hangzhou China A*STAR Singapore Tsinghua Shenzhen International Graduate School Nanshan District Shenzhen China
Grasping the intricacies of human motion, which involve perceiving spatio-temporal dependence and multi-scale effects, is essential for predicting human motion. While humans inherently possess the requisite skills to ... 详细信息
来源: 评论
An Image Semantic Communication System Based on GAN and Relative Position-Encoding
收藏 引用
IEEE Communications Letters 2025年
作者: Zhang, Ziqi Tan, Weijie Li, Chunguo Guizhou University College of Big Data and Information Engineering Guiyang550025 China Guizhou University State Key Laboratory of Public Big Data College of Computer Science and Technology Guiyang550025 China Advanced Cryptography and System Security Key Laboratory of Sichuan Province Chengdu610025 China Ministry of Industry and Information Technology Laboratory of Cryptography Application Technology Innovation and Testing Verification Beijing100015 China Southeast University School of Information Science and Engineering Nanjing210096 China
In image semantic communication, the complex wireless channel environment leads to the loss of image details and performance degradation during transmission. To address this issue, we propose an image semantic communi... 详细信息
来源: 评论